[May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID hash .= Ni[16] = 0x08118a32 e88eb007 e1c3825c dc075de5 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID hash .= Nr[32] = 0x0ef50659 7df3f9c9 afd915ad 1719b50f ae26f8f2 b [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of SKEYID hash[20] = 0x8aaf2227 8878874d 73389a0d d54a8ce8 adffb5 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_d hash .= g^xy[128] = 0xc7445d87 ab91b578 6eb8ff66 f2d39599 aa959 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-I[8] = 0xad2a2219 3d763722 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-R[8] = 0x6a32ea36 94f9d80d [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_d hash .= 0[1] = 0x00 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of SKEYID_d hash[20] = 0x721f5cd3 24151663 25dadfe1 dfdfaedf 9fbe [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_a hash .= SKEYID_d[20] = 0x721f5cd3 24151663 25dadfe1 dfdfaedf 9f [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_a hash .= g^xy[128] = 0xc7445d87 ab91b578 6eb8ff66 f2d39599 aa959 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-I[8] = 0xad2a2219 3d763722 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-R[8] = 0x6a32ea36 94f9d80d [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_a hash .= 1[1] = 0x01 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of SKEYID_a hash[20] = 0x9cf465be fb832c49 b3436abf cd7223a8 d285 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_e hash .= SKEYID_a[20] = 0x9cf465be fb832c49 b3436abf cd7223a8 d2 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_e hash .= g^xy[128] = 0xc7445d87 ab91b578 6eb8ff66 f2d39599 aa959 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-I[8] = 0xad2a2219 3d763722 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-R[8] = 0x6a32ea36 94f9d80d [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; SKEYID_e hash .= 2[1] = 0x02 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output SKEYID_e hash[20] = 0xdb956682 83ac6969 1ac8210a be7f25d9 aa6ffd0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; K1 hash .= 0[1] = 0x00 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of K1 hash[20] = 0x5be2803b 43aa4f59 2f5a6f22 2615e95c e8c92ed4 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; K2 hash .= K1[20] = 0x5be2803b 43aa4f59 2f5a6f22 2615e95c e8c92ed4 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of K2 hash[20] = 0x1c7efba6 3948d543 39d64a56 6c3dff69 0d8f942a [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Final encryption key[24] = 0x5be2803b 43aa4f59 2f5a6f22 2615e95c e8c92ed [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; IV hash .= g^xi[128] = 0xd43cdd2e 14e53932 47cee236 67b7edae dd771925 62 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; IV hash .= g^xr[128] = 0xc7660e3e 23f3514e a6d007a2 84f2be6e f1eddc45 14 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of IV hash[8] = 0xf797fcf4 e82078d2 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; HASH_I hash .= g^xi[128] = 0xd43cdd2e 14e53932 47cee236 67b7edae dd77192 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; HASH_I hash .= g^xr[128] = 0xc7660e3e 23f3514e a6d007a2 84f2be6e f1eddc4 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; HASH_I hash .= CKY-I[8] = 0xad2a2219 3d763722 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; HASH_I hash .= CKY-R[8] = 0x6a32ea36 94f9d80d [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; HASH_I hash .= SAi_b[60] = 0x00000001 00000001 00000034 01010801 ad2a221 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; HASH_I hash .= IDii_b[8] = 0x01000000 325431e2 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Output of HASH_I hash[20] = 0x7a5d3893 1d0d0e72 b16492db 5def9680 35a691 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_status_n [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[3] = ike_st_o_private [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 5 ike_sa eea400 (neg eee800) [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[4] = ike_st_o_encrypt [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, nego = -1 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000001 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encode ID: packet[8] = 0x01000000 325431e2 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 12 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encode HASH: hash[20] = 0x7a5d3893 1d0d0e72 b16492db 5def9680 35a691d2 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 24 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encode N: doi = 1, proto = 1, type = 24578, spi[16] = 0xad2a2219 3d76372 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encode N: data[0] [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 28 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 92 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encoded packet[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 05100201 0000 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; dec->enc IV[8] = 0xf797fcf4 e82078d2 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; enc->dec IV[8] = 0x1f1af94f 5032cc48 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Encrypted packet[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 05100201 00 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Sending packet[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 05100201 0000 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb1000/deadbeee] Destructor [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb1000/deadbeee] Freeing [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 92, on Interface: fe-0/0/0.0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb1400/0] Processing received [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb1400/deadbeee] Packet to existing v1 SA [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..92] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / f501a37f, remote = 1.1.1.1:500 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d} [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New informational negotiation message_id = f501a37f initialized using slot 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; New informational negotiation [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = f501a37f, slot 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Packet to old negotiation [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Received packet[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 08100501 f501a37f [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Packet received[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 08100501 f501a37f [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d} / f501a37f, nego = 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:8. [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Trying to decrypt, but no decryption context initialized [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_process_packet: Error, send notify [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Error = No SA established (8194) [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Notification to informational exchange ignored [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Deleting negotiation [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb1400/deadbeee] Destructor [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb1400/deadbeee] Freeing [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb1800/0] Processing received [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb1800/deadbeee] Packet to existing v1 SA [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb1800/deadbeee] Destructor [May 22 09:35:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb1800/deadbeee] Freeing [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb1c00/0] Processing received [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb1c00/deadbeee] Packet to existing v1 SA [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb1c00/deadbeee] Destructor [May 22 09:35:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb1c00/deadbeee] Freeing [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] VPNM tunnel (131073) ping count (11) > threshold 10, tunnel down [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] kmd_sa_cfg_children_sa_free: processing SA Colo_VPN [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Retransmitting packet, retries = 5 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Sending packet[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 05100201 0000 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:35:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372137 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb2000/0] Processing received [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb2000/deadbeee] Packet to existing v1 SA [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb2000/deadbeee] Destructor [May 22 09:35:08][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb2000/deadbeee] Freeing [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb2400/0] Processing received [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb2400/deadbeee] Packet to existing v1 SA [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb2400/deadbeee] Destructor [May 22 09:35:12][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb2400/deadbeee] Freeing [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2640 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] P1 SA 2372137 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb2800/0] Processing received [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb2800/deadbeee] Packet to existing v1 SA [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb2800/deadbeee] Destructor [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb2800/deadbeee] Freeing [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Retransmitting packet, retries = 4 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Sending packet[92] = 0xad2a2219 3d763722 6a32ea36 94f9d80d 05100201 0000 [May 22 09:35:16][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb2c00/0] Processing received [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb2c00/deadbeee] Packet to existing v1 SA [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb2c00/deadbeee] Destructor [May 22 09:35:20][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb2c00/deadbeee] Freeing [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb3000/0] Processing received [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [eb3000/deadbeee] Packet to existing v1 SA [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = ad2a2219 3d763722 6a32ea36 94f9d80d ... [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb3000/deadbeee] Destructor [May 22 09:35:24][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb3000/deadbeee] Freeing [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2641 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] P1 SA 2372137 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x30. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_ha_check_ike_sa_activeness_by_rg_id:RG 0 is active on this chassiss [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 2372137 delete. curr ref count 2, del flags 0x3 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 2372137, ref cnt 2, status: Error ok [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Removing negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_negotiation_done_isakmp: Entered IKE error code Timeout (8197), IKE SA eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_ike_negotiation_cb: Connect IKE done callback, status Timeout (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d}, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Deleting negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { ad2a2219 3d763722 - 6a32ea36 94f9d80d } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA eea400 is freed [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Clearing p1_info from fallback negotiation eee800 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation result [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_done [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: UNUSABLE p1_sa 2372137 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] IKEv1 Error : Timeout [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation failed, error unknown (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed eef028. status: Timed out [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Detach ed eef028 from P1 SA 2372137, slot 0. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (2) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] IPSec Rekey for SPI 0x0 failed [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback called for sa-cfg Colo_VPN local:2.2.2.2, remote:1.1.1.1 IKEv1 with status Timed out [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_delete [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 2372137 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] P1 SA 2372137 stop timer. timer duration 30, reason 0. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372137 to ref count 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] P1 SA 2372137 reference count is not zero (1). Delaying deletion of SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation eee800 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (1) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a40, ref_cnt 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Calling exchange_data_free [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Freeing P2 Ed for sa-cfg Colo_VPN [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_unset_sa_cfg_p2_ed unset_sa_cfg_p2_ed, sa_cfg=Colo_VPN [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_free: Successfully removed pm_ed eec800 from list for sa_cfg N/A [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Successfully freed exchange data from SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372137 to ref count 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] No more references to IKE SA 2372137 and waiting for delete. Deleting IKE SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 2372137 (ref cnt 0), waiting_for_del 0xe78a60 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 2372137 from peer entry 0xef0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_delete_peer_entry: Requested for peer-entry 0xef0000 deletion for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xef0000 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Deleting p1 sa (2372137) node from IKE p1 SA P-tree [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] The tunnel id: 2372137 doesn't exist in P1 SA P-tree [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_uninit: Freeing transmission windows for SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0x0 Not FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_allocate: Allocating IKE SA 1.1.1.1;500/4500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] chassis 0 fpc 0 pic 0 kmd-instance 0 current tunnel id 2372137 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Allocated IKE SA index 2372138, ref cnt 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 start timer. timer duration 30, reason 1. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_ike_sa_alloc_cb: Allocated IKE SA eea400 I4936bfd7 9c91bb27 (1.1.1.1;500/4500) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_init: Allocating transmission windows for SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Calling exchange_data_alloc [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed eec800 into list for sa_cfg N/A [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Exchange data allocated for IKE SA 2372138. VR 65535 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_create_sa: State = IKE_INIT_SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA eea400 ED eef028 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA eea400 ED eef028 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA eea400 ED eef028 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA eea400 ED eef028 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372138 to ref count 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 2372138 in peer entry 0xef0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe02420, ref_cnt 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a40, ref_cnt 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation eee800 (now 1 references) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation eee800 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372138 to ref count 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_initiate_ipsec_sa: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Attach ed eef028 to P1 SA 2372138, slot 0. op handle eef2a0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_reference_exchange_data: Taking reference to exchange data eef028 (to 2) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a40, ref_cnt 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_start: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_i_p1_negotiation_start: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_local_address_request: FB; Calling v2 policy function get_local_address_list [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_id_request: FB; Calling v2 policy function id [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_id_request_cb: Local id payload is ID(type = ipv4 (1), len = 4, value = 2.2.2.2) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 2.2.2.2) to IKEv1 ID [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_notify_request: FB; Calling v2 policy function notify_request [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_psk_request: FB; Calling v2 policy function shared_key [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_pre_shared_key Start... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate NO remote ID, skip validation. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key_cb: Found preshared key [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_sa_request: FB; Calling v2 policy function fill_ike_sa [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Initiator's proposing IKE SA payload SA() [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_conf_request: FB; Calling v2 policy function conf_request [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Sending Initial Contact notification [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate_half: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 4936bfd7 9c91bb27 - 00000000 00000000 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; SA: Number of proposals = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0]: Number of protocols = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0]: Number of transforms = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0][0]: ISAKMP protocol [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 4936bfd7 9c91bb27 - 00000000 00000000}, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Start isakmp sa negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = Start sa negotiation I (1) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_sa_proposal [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_vids [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: Request vendor ID's policy call entered, IKE SA eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: FB; Calling v2 policy function vendor_id_request [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 16 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID RFC 3706 (Dead Peer Detection) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 28 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID NetScreen Technologies [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: No more VIDs [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 1 ike_sa eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x4936bfd7 9c91bb27 - 00000000 00000000 } / 00000000, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: doi = 1, sit = 0x1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[8] = [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: trans[0] = 0, id = 1, # sa = 6 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 1 (0x0001), len = 2, value = 0005 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 4 (0x0004), len = 2, value = 0002 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[1], type = 4, value[2] = 0x0002 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 2 (0x0002), len = 2, value = 0002 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[2], type = 2, value[2] = 0x0002 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 11 (0x000b), len = 2, value = 0001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[3], type = 11, value[2] = 0x0001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode V: type = 12 (0x000c), len = 4 (0x0004), value = 00007080 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[4], type = 12, value[4] = 0x00007080 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 3 (0x0003), len = 2, value = 0001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[5], type = 3, value[2] = 0x0001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 64 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[28] = 0x69936922 8741c6d4 ca094c93 e242c9de 19e7b7 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 32 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 144 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Encoded packet[144] = 0x4936bfd7 9c91bb27 00000000 00000000 01100200 000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 4936bfd7 9c91bb27 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 00000000 00000000 [-1] / 0x00000000 } IP; Sending packet[144] = 0x4936bfd7 9c91bb27 00000000 00000000 01100200 000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 156, on Interface: fe-0/0/0.0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [eb3400/0] Processing received [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Failed to find IKEv1 SA for given spi [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_create_sa: [eb3400/0] No IKE SA for packet; requesting permission to create one. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_rate_limit: Soft limit for p1 negotiation 100.Current active p1 negotiations 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] New connection from 1.1.1.1:500 allowed [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_connect_decision: [eb3400/0] Pad allows connection [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..156] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Start, SA = { 4936bfd7 9c91bb27 - 00000000 00000000 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 4936bfd7 9c91bb27 - 00000000 00000000 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 4936bfd7 9c91bb27 - 00000000 00000000 } -> { ... - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Received packet[156] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 01100200 00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet received[156] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 01100200 00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7} / 00000000, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:1. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[0] [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 2 (0x0002), size = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 2 (0x0002), size = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 1, id = 1, # sa = #6 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 2, value[2] = 0x0002 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 4, value[2] = 0x0002 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 3, value[2] = 0x0001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 11, value[2] = 0x0001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 12, value[2] = 0x7080 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode VID: data[28] = 0x9436e8d6 7174ef9a ed068d5a d5213f18 7a3f8ba6 00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode VID: data[20] = 0x48656172 74426561 745f4e6f 74696679 386b0100 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM SA I (3) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_sa_value [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_cr [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cert [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_status_n [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_vid [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 28, IKE SA eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for NetScreen Technologies [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 20, IKE SA eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_private [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_ke [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6095] [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_nonce [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_nonce_data_len: Entered [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Nonce data[16] = 0x1662fc61 b0e55d4c 55ad8cb0 84e21074 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 3 ike_sa eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode KE: ke[128] = 0x9f37d9e3 e07036af fcbdcece 970b263e d36c5a19 f125 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 132 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode NONCE: nonce[16] = 0x1662fc61 b0e55d4c 55ad8cb0 84e21074 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 180 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encoded packet[180] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 04100200 000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Sending packet[180] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 04100200 000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [eb3400/0] Destructor [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [eb3400/0] Freeing [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e20800/0] Processing received [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e20800/deadbeee] Packet to existing v1 SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Received packet[196] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 04100200 00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet received[196] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 04100200 00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7} / 00000000, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:4. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:10. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode KE: ke[128] = 0x51e707a7 e7b25e30 44b78984 25ac0518 14669951 1c1e [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Decode NONCE: nonce[32] = 0xf15536d7 82cfbf6f 09976b1b 10a365f9 fb22dbfd [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0012 KE NONCE [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM KE I (5) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_nonce [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = f15536d7 82cfbf6f ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_ke [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 51e707a7 e7b25e30 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cr [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_cert [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_status_n [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_vid [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[6] = ike_st_i_private [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_id [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_hash [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5223] [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Diffie-hellman secret g^xy[128] = 0x4058a143 de36eb90 812bf8af 5f8cc761 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key: Find pre-shared key policy call entered, IKE SA eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Hash algorithm = hmac-sha1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Prf key[13] = 0x5549743b 3553795c 5c35793f 67 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Calculating SKEYID [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID hash .= Ni[16] = 0x1662fc61 b0e55d4c 55ad8cb0 84e21074 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID hash .= Nr[32] = 0xf15536d7 82cfbf6f 09976b1b 10a365f9 fb22dbfd 6 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of SKEYID hash[20] = 0x5fb1add6 8cb7ca19 6081796f 71e80128 b20e8b [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_d hash .= g^xy[128] = 0x4058a143 de36eb90 812bf8af 5f8cc761 d9cb2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-I[8] = 0x4936bfd7 9c91bb27 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-R[8] = 0x09cdf719 105cc9f7 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_d hash .= 0[1] = 0x00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of SKEYID_d hash[20] = 0xa7bc39fb a674a1c3 a4aed763 8c3f93e8 11cc [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_a hash .= SKEYID_d[20] = 0xa7bc39fb a674a1c3 a4aed763 8c3f93e8 11 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_a hash .= g^xy[128] = 0x4058a143 de36eb90 812bf8af 5f8cc761 d9cb2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-I[8] = 0x4936bfd7 9c91bb27 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-R[8] = 0x09cdf719 105cc9f7 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_a hash .= 1[1] = 0x01 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of SKEYID_a hash[20] = 0xbe6c9362 48ae9f55 7074ee0f 06382027 add4 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_e hash .= SKEYID_a[20] = 0xbe6c9362 48ae9f55 7074ee0f 06382027 ad [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_e hash .= g^xy[128] = 0x4058a143 de36eb90 812bf8af 5f8cc761 d9cb2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-I[8] = 0x4936bfd7 9c91bb27 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-R[8] = 0x09cdf719 105cc9f7 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; SKEYID_e hash .= 2[1] = 0x02 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output SKEYID_e hash[20] = 0x84079fdf f9d4a690 b9247374 c96c8383 ae41afa [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; K1 hash .= 0[1] = 0x00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of K1 hash[20] = 0xd3277fc0 8fe0d3ef de3a9759 0256dd28 2ce31108 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; K2 hash .= K1[20] = 0xd3277fc0 8fe0d3ef de3a9759 0256dd28 2ce31108 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of K2 hash[20] = 0x51f668e1 002da861 a9dd9b53 4fcdcb63 02db849b [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Final encryption key[24] = 0xd3277fc0 8fe0d3ef de3a9759 0256dd28 2ce3110 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; IV hash .= g^xi[128] = 0x9f37d9e3 e07036af fcbdcece 970b263e d36c5a19 f1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; IV hash .= g^xr[128] = 0x51e707a7 e7b25e30 44b78984 25ac0518 14669951 1c [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of IV hash[8] = 0x62188cfb a1b40e42 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; HASH_I hash .= g^xi[128] = 0x9f37d9e3 e07036af fcbdcece 970b263e d36c5a1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; HASH_I hash .= g^xr[128] = 0x51e707a7 e7b25e30 44b78984 25ac0518 1466995 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; HASH_I hash .= CKY-I[8] = 0x4936bfd7 9c91bb27 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; HASH_I hash .= CKY-R[8] = 0x09cdf719 105cc9f7 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; HASH_I hash .= SAi_b[60] = 0x00000001 00000001 00000034 01010801 4936bfd [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; HASH_I hash .= IDii_b[8] = 0x01000000 325431e2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Output of HASH_I hash[20] = 0x8cc0cbb2 09fdba91 304d94c1 ba28fbf0 5cb932 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_status_n [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[3] = ike_st_o_private [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 5 ike_sa eea400 (neg eee800) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[4] = ike_st_o_encrypt [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, nego = -1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000001 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode ID: packet[8] = 0x01000000 325431e2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 12 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode HASH: hash[20] = 0x8cc0cbb2 09fdba91 304d94c1 ba28fbf0 5cb93276 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 24 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode N: doi = 1, proto = 1, type = 24578, spi[16] = 0x4936bfd7 9c91bb2 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encode N: data[0] [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 28 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 92 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encoded packet[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 05100201 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; dec->enc IV[8] = 0x62188cfb a1b40e42 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; enc->dec IV[8] = 0xce743a89 d0995b8a [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Encrypted packet[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 05100201 00 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Sending packet[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 05100201 0000 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e20800/deadbeee] Destructor [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e20800/deadbeee] Freeing [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 92, on Interface: fe-0/0/0.0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e20c00/0] Processing received [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e20c00/deadbeee] Packet to existing v1 SA [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..92] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / f940c156, remote = 1.1.1.1:500 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7} [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New informational negotiation message_id = f940c156 initialized using slot 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; New informational negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = f940c156, slot 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; Packet to old negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; Received packet[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 08100501 f940c156 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; Packet received[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 08100501 f940c156 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7} / f940c156, nego = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:8. [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; Trying to decrypt, but no decryption context initialized [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_process_packet: Error, send notify [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; Error = No SA established (8194) [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Notification to informational exchange ignored [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [0] / 0xf940c156 } Info; Deleting negotiation [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e20c00/deadbeee] Destructor [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e20c00/deadbeee] Freeing [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e36000/0] Processing received [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e36000/deadbeee] Packet to existing v1 SA [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e36000/deadbeee] Destructor [May 22 09:35:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e36000/deadbeee] Freeing [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e36400/0] Processing received [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e36400/deadbeee] Packet to existing v1 SA [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e36400/deadbeee] Destructor [May 22 09:35:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e36400/deadbeee] Freeing [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2642 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Retransmitting packet, retries = 5 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Sending packet[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 05100201 0000 [May 22 09:35:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e36800/0] Processing received [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e36800/deadbeee] Packet to existing v1 SA [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e36800/deadbeee] Destructor [May 22 09:35:38][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e36800/deadbeee] Freeing [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e36c00/0] Processing received [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e36c00/deadbeee] Packet to existing v1 SA [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e36c00/deadbeee] Destructor [May 22 09:35:42][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e36c00/deadbeee] Freeing [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2643 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e37000/0] Processing received [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e37000/deadbeee] Packet to existing v1 SA [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e37000/deadbeee] Destructor [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e37000/deadbeee] Freeing [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Retransmitting packet, retries = 4 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Sending packet[92] = 0x4936bfd7 9c91bb27 09cdf719 105cc9f7 05100201 0000 [May 22 09:35:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e37400/0] Processing received [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e37400/deadbeee] Packet to existing v1 SA [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e37400/deadbeee] Destructor [May 22 09:35:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e37400/deadbeee] Freeing [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e37800/0] Processing received [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e37800/deadbeee] Packet to existing v1 SA [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 4936bfd7 9c91bb27 09cdf719 105cc9f7 ... [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } / 00000000, remote = 1.1.1.1:500 [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e37800/deadbeee] Destructor [May 22 09:35:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e37800/deadbeee] Freeing [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2644 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x30. [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_ha_check_ike_sa_activeness_by_rg_id:RG 0 is active on this chassiss [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 2372138 delete. curr ref count 2, del flags 0x3 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 2372138, ref cnt 2, status: Error ok [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Removing negotiation [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_negotiation_done_isakmp: Entered IKE error code Timeout (8197), IKE SA eea400 (neg eee800) [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_ike_negotiation_cb: Connect IKE done callback, status Timeout (neg eee800) [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7}, nego = -1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 [-1] / 0x00000000 } IP; Deleting negotiation [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 4936bfd7 9c91bb27 - 09cdf719 105cc9f7 } [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA eea400 is freed [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Clearing p1_info from fallback negotiation eee800 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation result [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_done [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: UNUSABLE p1_sa 2372138 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] IKEv1 Error : Timeout [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation failed, error unknown (neg eee800) [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed eef028. status: Timed out [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Detach ed eef028 from P1 SA 2372138, slot 0. [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (2) [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] IPSec Rekey for SPI 0x0 failed [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback called for sa-cfg Colo_VPN local:2.2.2.2, remote:1.1.1.1 IKEv1 with status Timed out [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_delete [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 2372138 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 stop timer. timer duration 30, reason 0. [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372138 to ref count 1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] P1 SA 2372138 reference count is not zero (1). Delaying deletion of SA [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation eee800 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (1) [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA eea400 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a40, ref_cnt 1 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA eea400 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA eea400 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA eea400 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Calling exchange_data_free [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Freeing P2 Ed for sa-cfg Colo_VPN [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_unset_sa_cfg_p2_ed unset_sa_cfg_p2_ed, sa_cfg=Colo_VPN [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_free: Successfully removed pm_ed eec800 from list for sa_cfg N/A [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Successfully freed exchange data from SA eea400 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372138 to ref count 0 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] No more references to IKE SA 2372138 and waiting for delete. Deleting IKE SA [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 2372138 (ref cnt 0), waiting_for_del 0xe78a60 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 2372138 from peer entry 0xef0000 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_delete_peer_entry: Requested for peer-entry 0xef0000 deletion for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xef0000 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] Deleting p1 sa (2372138) node from IKE p1 SA P-tree [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] The tunnel id: 2372138 doesn't exist in P1 SA P-tree [May 22 09:35:56][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_uninit: Freeing transmission windows for SA eea400 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2645 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0x0 Not FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_allocate: Allocating IKE SA 1.1.1.1;500/4500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] chassis 0 fpc 0 pic 0 kmd-instance 0 current tunnel id 2372138 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Allocated IKE SA index 2372139, ref cnt 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 start timer. timer duration 30, reason 1. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_ike_sa_alloc_cb: Allocated IKE SA eea400 I028dcaad 9d40b966 (1.1.1.1;500/4500) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_init: Allocating transmission windows for SA eea400 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Calling exchange_data_alloc [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed eec800 into list for sa_cfg N/A [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Exchange data allocated for IKE SA 2372139. VR 65535 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA eea400 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_create_sa: State = IKE_INIT_SA [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA eea400 ED eef028 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA eea400 ED eef028 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA eea400 ED eef028 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA eea400 ED eef028 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372139 to ref count 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 2372139 in peer entry 0xef0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a20, ref_cnt 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a60, ref_cnt 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation eee800 (now 1 references) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation eee800 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372139 to ref count 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_initiate_ipsec_sa: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Attach ed eef028 to P1 SA 2372139, slot 0. op handle eef2a0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_reference_exchange_data: Taking reference to exchange data eef028 (to 2) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a20, ref_cnt 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a60, ref_cnt 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_start: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_i_p1_negotiation_start: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_local_address_request: FB; Calling v2 policy function get_local_address_list [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_id_request: FB; Calling v2 policy function id [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_id_request_cb: Local id payload is ID(type = ipv4 (1), len = 4, value = 2.2.2.2) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 2.2.2.2) to IKEv1 ID [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_notify_request: FB; Calling v2 policy function notify_request [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_psk_request: FB; Calling v2 policy function shared_key [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_pre_shared_key Start... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate NO remote ID, skip validation. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key_cb: Found preshared key [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_sa_request: FB; Calling v2 policy function fill_ike_sa [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Initiator's proposing IKE SA payload SA() [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_conf_request: FB; Calling v2 policy function conf_request [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Sending Initial Contact notification [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate_half: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 028dcaad 9d40b966 - 00000000 00000000 } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; SA: Number of proposals = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0]: Number of protocols = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0]: Number of transforms = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0][0]: ISAKMP protocol [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 028dcaad 9d40b966 - 00000000 00000000}, nego = -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Start isakmp sa negotiation [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = Start sa negotiation I (1) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_sa_proposal [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_vids [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: Request vendor ID's policy call entered, IKE SA eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: FB; Calling v2 policy function vendor_id_request [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 16 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID RFC 3706 (Dead Peer Detection) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 28 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID NetScreen Technologies [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: No more VIDs [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 1 ike_sa eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x028dcaad 9d40b966 - 00000000 00000000 } / 00000000, nego = -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: doi = 1, sit = 0x1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[8] = [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: trans[0] = 0, id = 1, # sa = 6 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 1 (0x0001), len = 2, value = 0005 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 4 (0x0004), len = 2, value = 0002 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[1], type = 4, value[2] = 0x0002 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 2 (0x0002), len = 2, value = 0002 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[2], type = 2, value[2] = 0x0002 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 11 (0x000b), len = 2, value = 0001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[3], type = 11, value[2] = 0x0001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode V: type = 12 (0x000c), len = 4 (0x0004), value = 00007080 ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[4], type = 12, value[4] = 0x00007080 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 3 (0x0003), len = 2, value = 0001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[5], type = 3, value[2] = 0x0001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 64 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[28] = 0x69936922 8741c6d4 ca094c93 e242c9de 19e7b7 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 32 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 144 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Encoded packet[144] = 0x028dcaad 9d40b966 00000000 00000000 01100200 000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 028dcaad 9d40b966 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 00000000 00000000 [-1] / 0x00000000 } IP; Sending packet[144] = 0x028dcaad 9d40b966 00000000 00000000 01100200 000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 156, on Interface: fe-0/0/0.0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e37c00/0] Processing received [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Failed to find IKEv1 SA for given spi [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_create_sa: [e37c00/0] No IKE SA for packet; requesting permission to create one. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_rate_limit: Soft limit for p1 negotiation 100.Current active p1 negotiations 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] New connection from 1.1.1.1:500 allowed [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_connect_decision: [e37c00/0] Pad allows connection [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..156] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Start, SA = { 028dcaad 9d40b966 - 00000000 00000000 } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 028dcaad 9d40b966 - 00000000 00000000 } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 028dcaad 9d40b966 - 00000000 00000000 } -> { ... - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Received packet[156] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 01100200 00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet received[156] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 01100200 00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c} / 00000000, nego = -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:1. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[0] [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 2 (0x0002), size = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 2 (0x0002), size = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: trans[0] = 1, id = 1, # sa = #6 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: da[1], type = 2, value[2] = 0x0002 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: da[2], type = 4, value[2] = 0x0002 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: da[3], type = 3, value[2] = 0x0001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: da[4], type = 11, value[2] = 0x0001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode SA: da[5], type = 12, value[2] = 0x7080 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode VID: data[28] = 0x9436e8d6 7174ef9a ed068d5a d5213f18 7a3f8ba6 00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode VID: data[20] = 0x48656172 74426561 745f4e6f 74696679 386b0100 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM SA I (3) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_sa_value [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_cr [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cert [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_status_n [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_vid [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 28, IKE SA eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for NetScreen Technologies [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 20, IKE SA eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_private [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_ke [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6144] [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_nonce [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_nonce_data_len: Entered [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Nonce data[16] = 0xcc469b5f 542411cf 80655806 0c7b7c10 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 3 ike_sa eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, nego = -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode KE: ke[128] = 0xb1813b76 639da5bc c968a7c7 919afce9 f53b8f9b 4fb6 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 132 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode NONCE: nonce[16] = 0xcc469b5f 542411cf 80655806 0c7b7c10 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 180 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encoded packet[180] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 04100200 000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Sending packet[180] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 04100200 000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e37c00/0] Destructor [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e37c00/0] Freeing [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e38000/0] Processing received [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e38000/deadbeee] Packet to existing v1 SA [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Received packet[196] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 04100200 00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet received[196] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 04100200 00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c} / 00000000, nego = -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:4. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:10. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode KE: ke[128] = 0xbe38d9c4 99988c56 298a2c22 ca1d055a 636fdd6b e5d0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Decode NONCE: nonce[32] = 0x9d505151 3f29eef3 58861ef3 1c22259c 6da736cb [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0012 KE NONCE [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM KE I (5) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_nonce [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 9d505151 3f29eef3 ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_ke [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = be38d9c4 99988c56 ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cr [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_cert [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_status_n [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_vid [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[6] = ike_st_i_private [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_id [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_hash [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5239] [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Diffie-hellman secret g^xy[128] = 0xdf537e55 9a75da25 4113f7fc 24ee2e71 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key: Find pre-shared key policy call entered, IKE SA eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Hash algorithm = hmac-sha1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Prf key[13] = 0x5549743b 3553795c 5c35793f 67 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Calculating SKEYID [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID hash .= Ni[16] = 0xcc469b5f 542411cf 80655806 0c7b7c10 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID hash .= Nr[32] = 0x9d505151 3f29eef3 58861ef3 1c22259c 6da736cb e [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of SKEYID hash[20] = 0xc4903963 0b80da94 06eeda0a e1d39584 cfbfbc [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_d hash .= g^xy[128] = 0xdf537e55 9a75da25 4113f7fc 24ee2e71 83ddf [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-I[8] = 0x028dcaad 9d40b966 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-R[8] = 0x3d26831b 4bf1600c [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_d hash .= 0[1] = 0x00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of SKEYID_d hash[20] = 0x1de11e28 08dd1914 bfed4b02 c992ff2f bb67 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_a hash .= SKEYID_d[20] = 0x1de11e28 08dd1914 bfed4b02 c992ff2f bb [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_a hash .= g^xy[128] = 0xdf537e55 9a75da25 4113f7fc 24ee2e71 83ddf [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-I[8] = 0x028dcaad 9d40b966 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-R[8] = 0x3d26831b 4bf1600c [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_a hash .= 1[1] = 0x01 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of SKEYID_a hash[20] = 0x753f0094 08c6d1bc 123a31f3 a1b097b2 701d [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_e hash .= SKEYID_a[20] = 0x753f0094 08c6d1bc 123a31f3 a1b097b2 70 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_e hash .= g^xy[128] = 0xdf537e55 9a75da25 4113f7fc 24ee2e71 83ddf [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-I[8] = 0x028dcaad 9d40b966 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-R[8] = 0x3d26831b 4bf1600c [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; SKEYID_e hash .= 2[1] = 0x02 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output SKEYID_e hash[20] = 0x5528662a 77e47938 31a9dc6d 1883fe91 7a20537 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; K1 hash .= 0[1] = 0x00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of K1 hash[20] = 0x91fcfec6 0f74e7c5 187771ad 186bf64b 2cb7fdac [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; K2 hash .= K1[20] = 0x91fcfec6 0f74e7c5 187771ad 186bf64b 2cb7fdac [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of K2 hash[20] = 0x0be62847 98302f81 3b649636 1e8893b4 dd428cee [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Final encryption key[24] = 0x91fcfec6 0f74e7c5 187771ad 186bf64b 2cb7fda [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; IV hash .= g^xi[128] = 0xb1813b76 639da5bc c968a7c7 919afce9 f53b8f9b 4f [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; IV hash .= g^xr[128] = 0xbe38d9c4 99988c56 298a2c22 ca1d055a 636fdd6b e5 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of IV hash[8] = 0x4c8e07c9 2ee02100 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; HASH_I hash .= g^xi[128] = 0xb1813b76 639da5bc c968a7c7 919afce9 f53b8f9 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; HASH_I hash .= g^xr[128] = 0xbe38d9c4 99988c56 298a2c22 ca1d055a 636fdd6 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; HASH_I hash .= CKY-I[8] = 0x028dcaad 9d40b966 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; HASH_I hash .= CKY-R[8] = 0x3d26831b 4bf1600c [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; HASH_I hash .= SAi_b[60] = 0x00000001 00000001 00000034 01010801 028dcaa [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; HASH_I hash .= IDii_b[8] = 0x01000000 325431e2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Output of HASH_I hash[20] = 0x25db23b8 29c69249 8dc69639 10041c6a d91434 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_status_n [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[3] = ike_st_o_private [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 5 ike_sa eea400 (neg eee800) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[4] = ike_st_o_encrypt [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, nego = -1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000001 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode ID: packet[8] = 0x01000000 325431e2 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 12 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode HASH: hash[20] = 0x25db23b8 29c69249 8dc69639 10041c6a d9143499 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 24 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode N: doi = 1, proto = 1, type = 24578, spi[16] = 0x028dcaad 9d40b96 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encode N: data[0] [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 28 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 92 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encoded packet[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 05100201 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; dec->enc IV[8] = 0x4c8e07c9 2ee02100 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; enc->dec IV[8] = 0xb1bec33a 5428a9d4 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Encrypted packet[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 05100201 00 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Sending packet[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 05100201 0000 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e38000/deadbeee] Destructor [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e38000/deadbeee] Freeing [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 92, on Interface: fe-0/0/0.0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e38400/0] Processing received [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e38400/deadbeee] Packet to existing v1 SA [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..92] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 830db45a, remote = 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c} [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New informational negotiation message_id = 830db45a initialized using slot 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; New informational negotiation [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 830db45a, slot 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; Packet to old negotiation [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; Received packet[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 08100501 830db45a [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; Packet received[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 08100501 830db45a [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c} / 830db45a, nego = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:8. [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; Trying to decrypt, but no decryption context initialized [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_process_packet: Error, send notify [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; Error = No SA established (8194) [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Notification to informational exchange ignored [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [0] / 0x830db45a } Info; Deleting negotiation [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e38400/deadbeee] Destructor [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e38400/deadbeee] Freeing [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:36:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e38800/0] Processing received [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e38800/deadbeee] Packet to existing v1 SA [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e38800/deadbeee] Destructor [May 22 09:36:10][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e38800/deadbeee] Freeing [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e38c00/0] Processing received [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e38c00/deadbeee] Packet to existing v1 SA [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e38c00/deadbeee] Destructor [May 22 09:36:14][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e38c00/deadbeee] Freeing [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2646 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Retransmitting packet, retries = 5 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Sending packet[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 05100201 0000 [May 22 09:36:16][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e39000/0] Processing received [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e39000/deadbeee] Packet to existing v1 SA [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e39000/deadbeee] Destructor [May 22 09:36:18][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e39000/deadbeee] Freeing [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e39400/0] Processing received [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e39400/deadbeee] Packet to existing v1 SA [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e39400/deadbeee] Destructor [May 22 09:36:22][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e39400/deadbeee] Freeing [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2647 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e39800/0] Processing received [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e39800/deadbeee] Packet to existing v1 SA [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e39800/deadbeee] Destructor [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e39800/deadbeee] Freeing [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Retransmitting packet, retries = 4 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Sending packet[92] = 0x028dcaad 9d40b966 3d26831b 4bf1600c 05100201 0000 [May 22 09:36:26][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e39c00/0] Processing received [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e39c00/deadbeee] Packet to existing v1 SA [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e39c00/deadbeee] Destructor [May 22 09:36:30][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e39c00/deadbeee] Freeing [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3a000/0] Processing received [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3a000/deadbeee] Packet to existing v1 SA [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 028dcaad 9d40b966 3d26831b 4bf1600c ... [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3a000/deadbeee] Destructor [May 22 09:36:34][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3a000/deadbeee] Freeing [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x30. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_ha_check_ike_sa_activeness_by_rg_id:RG 0 is active on this chassiss [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 2372139 delete. curr ref count 2, del flags 0x3 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 2372139, ref cnt 2, status: Error ok [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Removing negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_negotiation_done_isakmp: Entered IKE error code Timeout (8197), IKE SA eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_ike_negotiation_cb: Connect IKE done callback, status Timeout (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c}, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 028dcaad 9d40b966 - 3d26831b 4bf1600c [-1] / 0x00000000 } IP; Deleting negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 028dcaad 9d40b966 - 3d26831b 4bf1600c } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA eea400 is freed [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Clearing p1_info from fallback negotiation eee800 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2648 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation result [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_done [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: UNUSABLE p1_sa 2372139 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] IKEv1 Error : Timeout [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation failed, error unknown (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed eef028. status: Timed out [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Detach ed eef028 from P1 SA 2372139, slot 0. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (2) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] IPSec Rekey for SPI 0x0 failed [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback called for sa-cfg Colo_VPN local:2.2.2.2, remote:1.1.1.1 IKEv1 with status Timed out [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_delete [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 2372139 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 stop timer. timer duration 30, reason 0. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372139 to ref count 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372139 reference count is not zero (1). Delaying deletion of SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation eee800 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (1) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a20, ref_cnt 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a60, ref_cnt 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Calling exchange_data_free [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Freeing P2 Ed for sa-cfg Colo_VPN [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_unset_sa_cfg_p2_ed unset_sa_cfg_p2_ed, sa_cfg=Colo_VPN [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_free: Successfully removed pm_ed eec800 from list for sa_cfg N/A [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Successfully freed exchange data from SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372139 to ref count 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] No more references to IKE SA 2372139 and waiting for delete. Deleting IKE SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 2372139 (ref cnt 0), waiting_for_del 0xe02420 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 2372139 from peer entry 0xef0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_delete_peer_entry: Requested for peer-entry 0xef0000 deletion for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xef0000 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Deleting p1 sa (2372139) node from IKE p1 SA P-tree [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] The tunnel id: 2372139 doesn't exist in P1 SA P-tree [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_uninit: Freeing transmission windows for SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0x0 Not FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_allocate: Allocating IKE SA 1.1.1.1;500/4500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] chassis 0 fpc 0 pic 0 kmd-instance 0 current tunnel id 2372139 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Allocated IKE SA index 2372140, ref cnt 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372140 start timer. timer duration 30, reason 1. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_ike_sa_alloc_cb: Allocated IKE SA eea400 Ifa811e1c 1baa6626 (1.1.1.1;500/4500) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_init: Allocating transmission windows for SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Calling exchange_data_alloc [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed eec800 into list for sa_cfg N/A [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Exchange data allocated for IKE SA 2372140. VR 65535 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_create_sa: State = IKE_INIT_SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA eea400 ED eef028 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA eea400 ED eef028 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA eea400 ED eef028 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA eea400 ED eef028 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372140 to ref count 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 2372140 in peer entry 0xef0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe02420, ref_cnt 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a20, ref_cnt 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation eee800 (now 1 references) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation eee800 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372140 to ref count 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_initiate_ipsec_sa: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Attach ed eef028 to P1 SA 2372140, slot 0. op handle eef2a0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_reference_exchange_data: Taking reference to exchange data eef028 (to 2) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a20, ref_cnt 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_start: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_i_p1_negotiation_start: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_local_address_request: FB; Calling v2 policy function get_local_address_list [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_id_request: FB; Calling v2 policy function id [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_id_request_cb: Local id payload is ID(type = ipv4 (1), len = 4, value = 2.2.2.2) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 2.2.2.2) to IKEv1 ID [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_notify_request: FB; Calling v2 policy function notify_request [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_psk_request: FB; Calling v2 policy function shared_key [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_pre_shared_key Start... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate NO remote ID, skip validation. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key_cb: Found preshared key [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_sa_request: FB; Calling v2 policy function fill_ike_sa [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Initiator's proposing IKE SA payload SA() [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_conf_request: FB; Calling v2 policy function conf_request [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Sending Initial Contact notification [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate_half: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { fa811e1c 1baa6626 - 00000000 00000000 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; SA: Number of proposals = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0]: Number of protocols = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0]: Number of transforms = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0][0]: ISAKMP protocol [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { fa811e1c 1baa6626 - 00000000 00000000}, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Start isakmp sa negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = Start sa negotiation I (1) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_sa_proposal [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_vids [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: Request vendor ID's policy call entered, IKE SA eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: FB; Calling v2 policy function vendor_id_request [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 16 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID RFC 3706 (Dead Peer Detection) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 28 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID NetScreen Technologies [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: No more VIDs [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 1 ike_sa eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfa811e1c 1baa6626 - 00000000 00000000 } / 00000000, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: doi = 1, sit = 0x1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[8] = [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: trans[0] = 0, id = 1, # sa = 6 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 1 (0x0001), len = 2, value = 0005 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 4 (0x0004), len = 2, value = 0002 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[1], type = 4, value[2] = 0x0002 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 2 (0x0002), len = 2, value = 0002 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[2], type = 2, value[2] = 0x0002 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 11 (0x000b), len = 2, value = 0001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[3], type = 11, value[2] = 0x0001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode V: type = 12 (0x000c), len = 4 (0x0004), value = 00007080 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[4], type = 12, value[4] = 0x00007080 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 3 (0x0003), len = 2, value = 0001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[5], type = 3, value[2] = 0x0001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 64 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[28] = 0x69936922 8741c6d4 ca094c93 e242c9de 19e7b7 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 32 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 144 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Encoded packet[144] = 0xfa811e1c 1baa6626 00000000 00000000 01100200 000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fa811e1c 1baa6626 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 00000000 00000000 [-1] / 0x00000000 } IP; Sending packet[144] = 0xfa811e1c 1baa6626 00000000 00000000 01100200 000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 156, on Interface: fe-0/0/0.0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3a400/0] Processing received [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Failed to find IKEv1 SA for given spi [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_create_sa: [e3a400/0] No IKE SA for packet; requesting permission to create one. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_rate_limit: Soft limit for p1 negotiation 100.Current active p1 negotiations 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] New connection from 1.1.1.1:500 allowed [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_connect_decision: [e3a400/0] Pad allows connection [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..156] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Start, SA = { fa811e1c 1baa6626 - 00000000 00000000 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { fa811e1c 1baa6626 - 00000000 00000000 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { fa811e1c 1baa6626 - 00000000 00000000 } -> { ... - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Received packet[156] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 01100200 00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet received[156] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 01100200 00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651} / 00000000, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:1. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[0] [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 2 (0x0002), size = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 2 (0x0002), size = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 1, id = 1, # sa = #6 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 2, value[2] = 0x0002 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 4, value[2] = 0x0002 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 3, value[2] = 0x0001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 11, value[2] = 0x0001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 12, value[2] = 0x7080 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode VID: data[28] = 0x9436e8d6 7174ef9a ed068d5a d5213f18 7a3f8ba6 00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode VID: data[20] = 0x48656172 74426561 745f4e6f 74696679 386b0100 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM SA I (3) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_sa_value [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_cr [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cert [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_status_n [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_vid [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 28, IKE SA eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for NetScreen Technologies [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 20, IKE SA eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_private [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_ke [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6618] [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_nonce [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_nonce_data_len: Entered [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Nonce data[16] = 0x5b5524a2 724e2ee2 e050e57d 3b104fc0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 3 ike_sa eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode KE: ke[128] = 0x84814837 f2bc749b ae7f97ff 5df9531c 66c644a5 8df6 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 132 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode NONCE: nonce[16] = 0x5b5524a2 724e2ee2 e050e57d 3b104fc0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 180 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encoded packet[180] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 04100200 000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Sending packet[180] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 04100200 000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3a400/0] Destructor [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3a400/0] Freeing [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3a800/0] Processing received [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3a800/deadbeee] Packet to existing v1 SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Received packet[196] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 04100200 00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet received[196] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 04100200 00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651} / 00000000, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:4. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:10. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode KE: ke[128] = 0x68d5fcee 31a48d79 c87247d9 20855535 d8da44fb 692e [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Decode NONCE: nonce[32] = 0x58a8a44d d78ddaee fb7be0c4 13885541 22a257eb [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0012 KE NONCE [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM KE I (5) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_nonce [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 58a8a44d d78ddaee ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_ke [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 68d5fcee 31a48d79 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cr [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_cert [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_status_n [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_vid [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[6] = ike_st_i_private [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_id [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_hash [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6006] [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Diffie-hellman secret g^xy[128] = 0xa9c97f1e 18f9d829 45e5a0a9 c413706c [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key: Find pre-shared key policy call entered, IKE SA eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Hash algorithm = hmac-sha1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Prf key[13] = 0x5549743b 3553795c 5c35793f 67 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Calculating SKEYID [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID hash .= Ni[16] = 0x5b5524a2 724e2ee2 e050e57d 3b104fc0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID hash .= Nr[32] = 0x58a8a44d d78ddaee fb7be0c4 13885541 22a257eb b [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of SKEYID hash[20] = 0x243b0501 48d133b5 318ff98a 5bdfae76 1eed10 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_d hash .= g^xy[128] = 0xa9c97f1e 18f9d829 45e5a0a9 c413706c d35d9 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-I[8] = 0xfa811e1c 1baa6626 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-R[8] = 0x6b39cce8 06a54651 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_d hash .= 0[1] = 0x00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of SKEYID_d hash[20] = 0x1859a041 802d05cd 932c18f9 bb1747cd 26f3 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_a hash .= SKEYID_d[20] = 0x1859a041 802d05cd 932c18f9 bb1747cd 26 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_a hash .= g^xy[128] = 0xa9c97f1e 18f9d829 45e5a0a9 c413706c d35d9 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-I[8] = 0xfa811e1c 1baa6626 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-R[8] = 0x6b39cce8 06a54651 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_a hash .= 1[1] = 0x01 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of SKEYID_a hash[20] = 0x717ea76e 9919b308 52af0c92 ab15731c 66d1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_e hash .= SKEYID_a[20] = 0x717ea76e 9919b308 52af0c92 ab15731c 66 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_e hash .= g^xy[128] = 0xa9c97f1e 18f9d829 45e5a0a9 c413706c d35d9 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-I[8] = 0xfa811e1c 1baa6626 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-R[8] = 0x6b39cce8 06a54651 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; SKEYID_e hash .= 2[1] = 0x02 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output SKEYID_e hash[20] = 0x26e7d292 80addde7 f7a4f0eb 84599e62 81882d9 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; K1 hash .= 0[1] = 0x00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of K1 hash[20] = 0x557ce2b0 d82bb641 ebfc8fda 8dc0606a de5db108 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; K2 hash .= K1[20] = 0x557ce2b0 d82bb641 ebfc8fda 8dc0606a de5db108 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of K2 hash[20] = 0xfc4f89c2 3a9c3c0b 3334b7e9 2880a6d6 84cb8541 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Final encryption key[24] = 0x557ce2b0 d82bb641 ebfc8fda 8dc0606a de5db10 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; IV hash .= g^xi[128] = 0x84814837 f2bc749b ae7f97ff 5df9531c 66c644a5 8d [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; IV hash .= g^xr[128] = 0x68d5fcee 31a48d79 c87247d9 20855535 d8da44fb 69 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of IV hash[8] = 0xf84e6826 e7b9a0d1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; HASH_I hash .= g^xi[128] = 0x84814837 f2bc749b ae7f97ff 5df9531c 66c644a [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; HASH_I hash .= g^xr[128] = 0x68d5fcee 31a48d79 c87247d9 20855535 d8da44f [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; HASH_I hash .= CKY-I[8] = 0xfa811e1c 1baa6626 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; HASH_I hash .= CKY-R[8] = 0x6b39cce8 06a54651 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; HASH_I hash .= SAi_b[60] = 0x00000001 00000001 00000034 01010801 fa811e1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; HASH_I hash .= IDii_b[8] = 0x01000000 325431e2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Output of HASH_I hash[20] = 0x82f99fd9 f9c8fd8c 6c620378 ae756c11 704433 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_status_n [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[3] = ike_st_o_private [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 5 ike_sa eea400 (neg eee800) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[4] = ike_st_o_encrypt [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0xfa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, nego = -1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000001 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode ID: packet[8] = 0x01000000 325431e2 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 12 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode HASH: hash[20] = 0x82f99fd9 f9c8fd8c 6c620378 ae756c11 7044333e [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 24 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode N: doi = 1, proto = 1, type = 24578, spi[16] = 0xfa811e1c 1baa662 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encode N: data[0] [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 28 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 92 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encoded packet[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 05100201 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; dec->enc IV[8] = 0xf84e6826 e7b9a0d1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; enc->dec IV[8] = 0x6e4aabc9 c2e6f646 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Encrypted packet[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 05100201 00 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Sending packet[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 05100201 0000 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3a800/deadbeee] Destructor [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3a800/deadbeee] Freeing [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 92, on Interface: fe-0/0/0.0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3ac00/0] Processing received [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3ac00/deadbeee] Packet to existing v1 SA [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..92] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 4259830d, remote = 1.1.1.1:500 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651} [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New informational negotiation message_id = 4259830d initialized using slot 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; New informational negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 4259830d, slot 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; Packet to old negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; Received packet[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 08100501 4259830d [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; Packet received[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 08100501 4259830d [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651} / 4259830d, nego = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:8. [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; Trying to decrypt, but no decryption context initialized [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_process_packet: Error, send notify [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; Error = No SA established (8194) [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Notification to informational exchange ignored [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [0] / 0x4259830d } Info; Deleting negotiation [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3ac00/deadbeee] Destructor [May 22 09:36:36][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3ac00/deadbeee] Freeing [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3b000/0] Processing received [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3b000/deadbeee] Packet to existing v1 SA [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3b000/deadbeee] Destructor [May 22 09:36:40][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3b000/deadbeee] Freeing [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3b400/0] Processing received [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3b400/deadbeee] Packet to existing v1 SA [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3b400/deadbeee] Destructor [May 22 09:36:44][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3b400/deadbeee] Freeing [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2649 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] P1 SA 2372140 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Retransmitting packet, retries = 5 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Sending packet[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 05100201 0000 [May 22 09:36:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3b800/0] Processing received [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3b800/deadbeee] Packet to existing v1 SA [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3b800/deadbeee] Destructor [May 22 09:36:48][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3b800/deadbeee] Freeing [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3bc00/0] Processing received [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3bc00/deadbeee] Packet to existing v1 SA [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3bc00/deadbeee] Destructor [May 22 09:36:52][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3bc00/deadbeee] Freeing [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] VPNM tunnel (131073) ping count (11) > threshold 10, tunnel down [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] kmd_sa_cfg_children_sa_free: processing SA Colo_VPN [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3c000/0] Processing received [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3c000/deadbeee] Packet to existing v1 SA [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3c000/deadbeee] Destructor [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3c000/deadbeee] Freeing [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Retransmitting packet, retries = 4 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Sending packet[92] = 0xfa811e1c 1baa6626 6b39cce8 06a54651 05100201 0000 [May 22 09:36:56][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3c400/0] Processing received [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3c400/deadbeee] Packet to existing v1 SA [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3c400/deadbeee] Destructor [May 22 09:37:00][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3c400/deadbeee] Freeing [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3c800/0] Processing received [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3c800/deadbeee] Packet to existing v1 SA [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = fa811e1c 1baa6626 6b39cce8 06a54651 ... [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3c800/deadbeee] Destructor [May 22 09:37:04][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3c800/deadbeee] Freeing [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2650 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372140 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372140 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x30. [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_ha_check_ike_sa_activeness_by_rg_id:RG 0 is active on this chassiss [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 2372140 delete. curr ref count 2, del flags 0x3 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 2372140, ref cnt 2, status: Error ok [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Removing negotiation [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_negotiation_done_isakmp: Entered IKE error code Timeout (8197), IKE SA eea400 (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_ike_negotiation_cb: Connect IKE done callback, status Timeout (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651}, nego = -1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { fa811e1c 1baa6626 - 6b39cce8 06a54651 [-1] / 0x00000000 } IP; Deleting negotiation [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { fa811e1c 1baa6626 - 6b39cce8 06a54651 } [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA eea400 is freed [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Clearing p1_info from fallback negotiation eee800 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation result [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_done [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: UNUSABLE p1_sa 2372140 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] IKEv1 Error : Timeout [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation failed, error unknown (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed eef028. status: Timed out [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Detach ed eef028 from P1 SA 2372140, slot 0. [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (2) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] IPSec Rekey for SPI 0x0 failed [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback called for sa-cfg Colo_VPN local:2.2.2.2, remote:1.1.1.1 IKEv1 with status Timed out [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_delete [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 2372140 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372140 stop timer. timer duration 30, reason 0. [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372140 to ref count 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372140 reference count is not zero (1). Delaying deletion of SA [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation eee800 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (1) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a20, ref_cnt 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Calling exchange_data_free [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Freeing P2 Ed for sa-cfg Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_unset_sa_cfg_p2_ed unset_sa_cfg_p2_ed, sa_cfg=Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_free: Successfully removed pm_ed eec800 from list for sa_cfg N/A [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Successfully freed exchange data from SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372140 to ref count 0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] No more references to IKE SA 2372140 and waiting for delete. Deleting IKE SA [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 2372140 (ref cnt 0), waiting_for_del 0xe78a60 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 2372140 from peer entry 0xef0000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_delete_peer_entry: Requested for peer-entry 0xef0000 deletion for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xef0000 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Deleting p1 sa (2372140) node from IKE p1 SA P-tree [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] The tunnel id: 2372140 doesn't exist in P1 SA P-tree [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_uninit: Freeing transmission windows for SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0x0 Not FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_allocate: Allocating IKE SA 1.1.1.1;500/4500 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] chassis 0 fpc 0 pic 0 kmd-instance 0 current tunnel id 2372140 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Allocated IKE SA index 2372141, ref cnt 0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 start timer. timer duration 30, reason 1. [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_ike_sa_alloc_cb: Allocated IKE SA eea400 I44af5984 8339ec43 (1.1.1.1;500/4500) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_init: Allocating transmission windows for SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Calling exchange_data_alloc [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed eec800 into list for sa_cfg N/A [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Exchange data allocated for IKE SA 2372141. VR 65535 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA eea400 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_create_sa: State = IKE_INIT_SA [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA eea400 ED eef028 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA eea400 ED eef028 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA eea400 ED eef028 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA eea400 ED eef028 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372141 to ref count 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 2372141 in peer entry 0xef0000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe02420, ref_cnt 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a20, ref_cnt 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation eee800 (now 1 references) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation eee800 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372141 to ref count 2 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_initiate_ipsec_sa: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Attach ed eef028 to P1 SA 2372141, slot 0. op handle eef2a0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_reference_exchange_data: Taking reference to exchange data eef028 (to 2) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 2 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a20, ref_cnt 2 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_start: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_i_p1_negotiation_start: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_local_address_request: FB; Calling v2 policy function get_local_address_list [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_id_request: FB; Calling v2 policy function id [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_id_request_cb: Local id payload is ID(type = ipv4 (1), len = 4, value = 2.2.2.2) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 2.2.2.2) to IKEv1 ID [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_notify_request: FB; Calling v2 policy function notify_request [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_psk_request: FB; Calling v2 policy function shared_key [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_pre_shared_key Start... [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate NO remote ID, skip validation. [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key_cb: Found preshared key [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_sa_request: FB; Calling v2 policy function fill_ike_sa [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] Initiator's proposing IKE SA payload SA() [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_conf_request: FB; Calling v2 policy function conf_request [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Sending Initial Contact notification [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate_half: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 44af5984 8339ec43 - 00000000 00000000 } [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; SA: Number of proposals = 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0]: Number of protocols = 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0]: Number of transforms = 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0][0]: ISAKMP protocol [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 44af5984 8339ec43 - 00000000 00000000}, nego = -1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Start isakmp sa negotiation [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = Start sa negotiation I (1) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_sa_proposal [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_vids [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: Request vendor ID's policy call entered, IKE SA eea400 (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: FB; Calling v2 policy function vendor_id_request [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 16 (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID RFC 3706 (Dead Peer Detection) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 28 (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID NetScreen Technologies [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: No more VIDs [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 1 ike_sa eea400 (neg eee800) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x44af5984 8339ec43 - 00000000 00000000 } / 00000000, nego = -1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: doi = 1, sit = 0x1 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[8] = [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: trans[0] = 0, id = 1, # sa = 6 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 1 (0x0001), len = 2, value = 0005 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 4 (0x0004), len = 2, value = 0002 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[1], type = 4, value[2] = 0x0002 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 2 (0x0002), len = 2, value = 0002 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[2], type = 2, value[2] = 0x0002 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 11 (0x000b), len = 2, value = 0001 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[3], type = 11, value[2] = 0x0001 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode V: type = 12 (0x000c), len = 4 (0x0004), value = 00007080 ... [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[4], type = 12, value[4] = 0x00007080 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 3 (0x0003), len = 2, value = 0001 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[5], type = 3, value[2] = 0x0001 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 64 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[28] = 0x69936922 8741c6d4 ca094c93 e242c9de 19e7b7 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 32 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 144 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Encoded packet[144] = 0x44af5984 8339ec43 00000000 00000000 01100200 000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 44af5984 8339ec43 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 00000000 00000000 [-1] / 0x00000000 } IP; Sending packet[144] = 0x44af5984 8339ec43 00000000 00000000 01100200 000 [May 22 09:37:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 156, on Interface: fe-0/0/0.0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3cc00/0] Processing received [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] Failed to find IKEv1 SA for given spi [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_create_sa: [e3cc00/0] No IKE SA for packet; requesting permission to create one. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_rate_limit: Soft limit for p1 negotiation 100.Current active p1 negotiations 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] New connection from 1.1.1.1:500 allowed [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_connect_decision: [e3cc00/0] Pad allows connection [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..156] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Start, SA = { 44af5984 8339ec43 - 00000000 00000000 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 44af5984 8339ec43 - 00000000 00000000 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 44af5984 8339ec43 - 00000000 00000000 } -> { ... - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Received packet[156] = 0x44af5984 8339ec43 56df5b64 df919cd0 01100200 00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet received[156] = 0x44af5984 8339ec43 56df5b64 df919cd0 01100200 00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0} / 00000000, nego = -1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:1. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[0] [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 2 (0x0002), size = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 2 (0x0002), size = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 1, id = 1, # sa = #6 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 2, value[2] = 0x0002 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 4, value[2] = 0x0002 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 3, value[2] = 0x0001 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 11, value[2] = 0x0001 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 12, value[2] = 0x7080 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode VID: data[28] = 0x9436e8d6 7174ef9a ed068d5a d5213f18 7a3f8ba6 00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode VID: data[20] = 0x48656172 74426561 745f4e6f 74696679 386b0100 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM SA I (3) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_sa_value [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_cr [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cert [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_status_n [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_vid [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 28, IKE SA eea400 (neg eee800) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for NetScreen Technologies [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA eea400 (neg eee800) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 20, IKE SA eea400 (neg eee800) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_private [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_ke [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6269] [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_nonce [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_nonce_data_len: Entered [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Nonce data[16] = 0xba40eee2 1b4256df 9382d72c 8ef125bb [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 3 ike_sa eea400 (neg eee800) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, nego = -1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode KE: ke[128] = 0x0bd4a70d 7f11e18a b4462805 ba9e622a b2b54f09 ec51 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 132 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode NONCE: nonce[16] = 0xba40eee2 1b4256df 9382d72c 8ef125bb [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 180 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encoded packet[180] = 0x44af5984 8339ec43 56df5b64 df919cd0 04100200 000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Sending packet[180] = 0x44af5984 8339ec43 56df5b64 df919cd0 04100200 000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3cc00/0] Destructor [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3cc00/0] Freeing [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3d000/0] Processing received [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3d000/deadbeee] Packet to existing v1 SA [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Received packet[196] = 0x44af5984 8339ec43 56df5b64 df919cd0 04100200 00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet received[196] = 0x44af5984 8339ec43 56df5b64 df919cd0 04100200 00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0} / 00000000, nego = -1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:4. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:10. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode KE: ke[128] = 0x37e70344 e0cf6a5a c675b797 d5103a05 4a23a316 53b6 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Decode NONCE: nonce[32] = 0xe7da8959 4f05ae1a acc792ba f59839d4 aa0607ad [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0012 KE NONCE [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM KE I (5) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_nonce [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = e7da8959 4f05ae1a ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_ke [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = 37e70344 e0cf6a5a ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cr [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_cert [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_status_n [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_vid [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[6] = ike_st_i_private [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_id [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_hash [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5266] [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Diffie-hellman secret g^xy[128] = 0x8add1bef afa272fe 9a3381e0 764c1089 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key: Find pre-shared key policy call entered, IKE SA eea400 (neg eee800) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Hash algorithm = hmac-sha1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Prf key[13] = 0x5549743b 3553795c 5c35793f 67 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Calculating SKEYID [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID hash .= Ni[16] = 0xba40eee2 1b4256df 9382d72c 8ef125bb [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID hash .= Nr[32] = 0xe7da8959 4f05ae1a acc792ba f59839d4 aa0607ad 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of SKEYID hash[20] = 0x98de52b9 34a03cb4 dfa8ee0a 5f2a0bdc de39d6 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_d hash .= g^xy[128] = 0x8add1bef afa272fe 9a3381e0 764c1089 9c4a7 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-I[8] = 0x44af5984 8339ec43 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-R[8] = 0x56df5b64 df919cd0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_d hash .= 0[1] = 0x00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of SKEYID_d hash[20] = 0x1f48e0c6 984dba98 c00f4d2f 77ae7819 e56c [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_a hash .= SKEYID_d[20] = 0x1f48e0c6 984dba98 c00f4d2f 77ae7819 e5 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_a hash .= g^xy[128] = 0x8add1bef afa272fe 9a3381e0 764c1089 9c4a7 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-I[8] = 0x44af5984 8339ec43 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-R[8] = 0x56df5b64 df919cd0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_a hash .= 1[1] = 0x01 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of SKEYID_a hash[20] = 0xa0ee9736 0cd281ec 66e3f86c 25ff2ece 7fb6 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_e hash .= SKEYID_a[20] = 0xa0ee9736 0cd281ec 66e3f86c 25ff2ece 7f [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_e hash .= g^xy[128] = 0x8add1bef afa272fe 9a3381e0 764c1089 9c4a7 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-I[8] = 0x44af5984 8339ec43 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-R[8] = 0x56df5b64 df919cd0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; SKEYID_e hash .= 2[1] = 0x02 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output SKEYID_e hash[20] = 0x3cba5297 51d27589 beedd232 b7f3ad9b c2b603e [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; K1 hash .= 0[1] = 0x00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of K1 hash[20] = 0xff819d96 db4dff1a f60a0a2d 82676335 05761605 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; K2 hash .= K1[20] = 0xff819d96 db4dff1a f60a0a2d 82676335 05761605 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of K2 hash[20] = 0xcbc03ebc ca6a3bc4 93432f00 15e2cb4c 245d1f51 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Final encryption key[24] = 0xff819d96 db4dff1a f60a0a2d 82676335 0576160 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; IV hash .= g^xi[128] = 0x0bd4a70d 7f11e18a b4462805 ba9e622a b2b54f09 ec [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; IV hash .= g^xr[128] = 0x37e70344 e0cf6a5a c675b797 d5103a05 4a23a316 53 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of IV hash[8] = 0x4d2abe50 190da1b7 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; HASH_I hash .= g^xi[128] = 0x0bd4a70d 7f11e18a b4462805 ba9e622a b2b54f0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; HASH_I hash .= g^xr[128] = 0x37e70344 e0cf6a5a c675b797 d5103a05 4a23a31 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; HASH_I hash .= CKY-I[8] = 0x44af5984 8339ec43 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; HASH_I hash .= CKY-R[8] = 0x56df5b64 df919cd0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; HASH_I hash .= SAi_b[60] = 0x00000001 00000001 00000034 01010801 44af598 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; HASH_I hash .= IDii_b[8] = 0x01000000 325431e2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Output of HASH_I hash[20] = 0x02a78840 195bd8bb 6d4082a3 df2e9c51 f93817 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_status_n [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[3] = ike_st_o_private [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 5 ike_sa eea400 (neg eee800) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[4] = ike_st_o_encrypt [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, nego = -1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000001 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode ID: packet[8] = 0x01000000 325431e2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 12 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode HASH: hash[20] = 0x02a78840 195bd8bb 6d4082a3 df2e9c51 f93817a2 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 24 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode N: doi = 1, proto = 1, type = 24578, spi[16] = 0x44af5984 8339ec4 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encode N: data[0] [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 28 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 92 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encoded packet[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 05100201 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; dec->enc IV[8] = 0x4d2abe50 190da1b7 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; enc->dec IV[8] = 0x7af307d9 875de374 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Encrypted packet[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 05100201 00 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Sending packet[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 05100201 0000 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3d000/deadbeee] Destructor [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3d000/deadbeee] Freeing [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 92, on Interface: fe-0/0/0.0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3d400/0] Processing received [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3d400/deadbeee] Packet to existing v1 SA [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..92] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 99347678, remote = 1.1.1.1:500 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0} [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New informational negotiation message_id = 99347678 initialized using slot 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; New informational negotiation [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 99347678, slot 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; Packet to old negotiation [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; Received packet[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 08100501 99347678 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; Packet received[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 08100501 99347678 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0} / 99347678, nego = 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:8. [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; Trying to decrypt, but no decryption context initialized [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_process_packet: Error, send notify [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; Error = No SA established (8194) [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Notification to informational exchange ignored [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [0] / 0x99347678 } Info; Deleting negotiation [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3d400/deadbeee] Destructor [May 22 09:37:07][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3d400/deadbeee] Freeing [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3d800/0] Processing received [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3d800/deadbeee] Packet to existing v1 SA [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3d800/deadbeee] Destructor [May 22 09:37:11][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3d800/deadbeee] Freeing [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3dc00/0] Processing received [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3dc00/deadbeee] Packet to existing v1 SA [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3dc00/deadbeee] Destructor [May 22 09:37:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3dc00/deadbeee] Freeing [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2651 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:16][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:37:17][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:37:17][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1 [May 22 09:37:17][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Retransmitting packet, retries = 5 [May 22 09:37:17][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:37:17][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Sending packet[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 05100201 0000 [May 22 09:37:17][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3e000/0] Processing received [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3e000/deadbeee] Packet to existing v1 SA [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3e000/deadbeee] Destructor [May 22 09:37:19][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3e000/deadbeee] Freeing [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3e400/0] Processing received [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3e400/deadbeee] Packet to existing v1 SA [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3e400/deadbeee] Destructor [May 22 09:37:23][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3e400/deadbeee] Freeing [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2652 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:26][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Retransmitting packet, retries = 4 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Sending packet[92] = 0x44af5984 8339ec43 56df5b64 df919cd0 05100201 0000 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3e800/0] Processing received [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3e800/deadbeee] Packet to existing v1 SA [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3e800/deadbeee] Destructor [May 22 09:37:27][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3e800/deadbeee] Freeing [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3ec00/0] Processing received [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3ec00/deadbeee] Packet to existing v1 SA [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3ec00/deadbeee] Destructor [May 22 09:37:31][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3ec00/deadbeee] Freeing [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3f000/0] Processing received [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3f000/deadbeee] Packet to existing v1 SA [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 44af5984 8339ec43 56df5b64 df919cd0 ... [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3f000/deadbeee] Destructor [May 22 09:37:35][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3f000/deadbeee] Freeing [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2653 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x30. [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_ha_check_ike_sa_activeness_by_rg_id:RG 0 is active on this chassiss [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Initiate IKE P1 SA 2372141 delete. curr ref count 2, del flags 0x3 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_delete_done_cb: For p1 sa index 2372141, ref cnt 2, status: Error ok [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_remove_callback: Start, delete SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Removing negotiation [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_negotiation_done_isakmp: Entered IKE error code Timeout (8197), IKE SA eea400 (neg eee800) [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_ike_negotiation_cb: Connect IKE done callback, status Timeout (neg eee800) [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0}, nego = -1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 44af5984 8339ec43 - 56df5b64 df919cd0 [-1] / 0x00000000 } IP; Deleting negotiation [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_sa_delete: Start, SA = { 44af5984 8339ec43 - 56df5b64 df919cd0 } [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_isakmp: Start, nego = -1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = -1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_packet: Start [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA eea400 is freed [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_sa_freed: Clearing p1_info from fallback negotiation eee800 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_id_payload: Start, id type = 1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ike_free_sa: Start [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation result [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_done [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: UNUSABLE p1_sa 2372141 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] IKEv1 Error : Timeout [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: Phase I negotiation failed, error unknown (neg eee800) [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed eef028. status: Timed out [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Detach ed eef028 from P1 SA 2372141, slot 0. [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (2) [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] IPSec Rekey for SPI 0x0 failed [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback called for sa-cfg Colo_VPN local:2.2.2.2, remote:1.1.1.1 IKEv1 with status Timed out [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_result: FB; Calling v2 policy function ike_sa_delete [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 2372141 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 stop timer. timer duration 30, reason 0. [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372141 to ref count 1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] P1 SA 2372141 reference count is not zero (1). Delaying deletion of SA [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Freeing fallback negotiation eee800 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Freeing exchange data from SA eea400, ED eef028 (1) [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA eea400 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe02420, ref_cnt 1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a20, ref_cnt 1 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA eea400 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA eea400 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA eea400 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Calling exchange_data_free [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Freeing P2 Ed for sa-cfg Colo_VPN [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_unset_sa_cfg_p2_ed unset_sa_cfg_p2_ed, sa_cfg=Colo_VPN [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_free: Successfully removed pm_ed eec800 from list for sa_cfg N/A [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_free_exchange_data: Successfully freed exchange data from SA eea400 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Freeing reference to P1 SA 2372141 to ref count 0 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] No more references to IKE SA 2372141 and waiting for delete. Deleting IKE SA [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 2372141 (ref cnt 0), waiting_for_del 0xe78a60 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_peer_remove_p1sa_entry: Remove p1 sa 2372141 from peer entry 0xef0000 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_delete_peer_entry: Requested for peer-entry 0xef0000 deletion for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] iked_peer_entry_patricia_delete:Peer entry 0xef0000 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] Deleting p1 sa (2372141) node from IKE p1 SA P-tree [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] The tunnel id: 2372141 doesn't exist in P1 SA P-tree [May 22 09:37:36][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_uninit: Freeing transmission windows for SA eea400 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2654 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0x0 Not FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0xef0000 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dist_table_entry_update : Dist table entry creation not needed [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw_Colo_VPN [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_allocate: Allocating IKE SA 1.1.1.1;500/4500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] chassis 0 fpc 0 pic 0 kmd-instance 0 current tunnel id 2372141 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Allocated IKE SA index 2372142, ref cnt 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] P1 SA 2372142 start timer. timer duration 30, reason 1. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_ike_sa_alloc_cb: Allocated IKE SA eea400 I7ad9d279 aca46245 (1.1.1.1;500/4500) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_init: Allocating transmission windows for SA eea400 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Calling exchange_data_alloc [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_exchange_data_alloc: Successfully inserted pm_ed eec800 into list for sa_cfg N/A [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Exchange data allocated for IKE SA 2372142. VR 65535 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA eea400 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_create_sa: State = IKE_INIT_SA [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA eea400 ED eef028 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA eea400 ED eef028 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA eea400 ED eef028 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA eea400 ED eef028 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372142 to ref count 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 2372142 in peer entry 0xef0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a40, ref_cnt 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_allocate: Allocated ts 0xe78a60, ref_cnt 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation eee800 (now 1 references) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation eee800 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Taking reference to P1 SA 2372142 to ref count 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_initiate_ipsec_sa: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Attach ed eef028 to P1 SA 2372142, slot 0. op handle eef2a0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_reference_exchange_data: Taking reference to exchange data eef028 (to 2) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a40, ref_cnt 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ts_free: ts 0xe78a60, ref_cnt 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_start: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_set_thread_debug_info: ikev2_fb_i_p1_negotiation_start: set thread debug info - local 2.2.2.2 remote 1.1.1.1 neg 0xeee800 neg->ike_sa 0xeea400 ike_sa 0x0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_local_address_request: FB; Calling v2 policy function get_local_address_list [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_id_request: FB; Calling v2 policy function id [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_id_request_cb: Local id payload is ID(type = ipv4 (1), len = 4, value = 2.2.2.2) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: Converting the IKEv2 payload ID ID(type = ipv4 (1), len = 4, value = 2.2.2.2) to IKEv1 ID [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_idv2_to_idv1: IKEv2 payload ID converted to IKEv1 payload ID ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_notify_request: FB; Calling v2 policy function notify_request [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_psk_request: FB; Calling v2 policy function shared_key [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_pre_shared_key Start... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_id_validate NO remote ID, skip validation. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key_cb: Found preshared key [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_ike_sa_request: FB; Calling v2 policy function fill_ike_sa [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Initiator's proposing IKE SA payload SA() [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_st_i_conf_request: FB; Calling v2 policy function conf_request [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fallback_negotiation_free: Fallback negotiation eee800 has still 1 references [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Sending Initial Contact notification [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_i_p1_negotiation_negotiate: Taking reference to fallback negotiation eee800 (now 2 references) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate_half: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_allocate: Start, SA = { 7ad9d279 aca46245 - 00000000 00000000 } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; SA: Number of proposals = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0]: Number of protocols = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0]: Number of transforms = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; SA[0][0][0]: ISAKMP protocol [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_connect: SA = { 7ad9d279 aca46245 - 00000000 00000000}, nego = -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Start isakmp sa negotiation [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = Start sa negotiation I (1) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_sa_proposal [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_sa_proposal: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_vids [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: Request vendor ID's policy call entered, IKE SA eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_request_vendor_ids: FB; Calling v2 policy function vendor_id_request [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 16 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID RFC 3706 (Dead Peer Detection) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: Got a VID of length 28 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_request_vendor_id: Sending VID NetScreen Technologies [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_vid_request_cb: No more VIDs [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_vendor_ids: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 1 ike_sa eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM SA I (3) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x7ad9d279 aca46245 - 00000000 00000000 } / 00000000, nego = -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: doi = 1, sit = 0x1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[8] = [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: trans[0] = 0, id = 1, # sa = 6 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 1 (0x0001), len = 2, value = 0005 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 4 (0x0004), len = 2, value = 0002 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[1], type = 4, value[2] = 0x0002 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 2 (0x0002), len = 2, value = 0002 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[2], type = 2, value[2] = 0x0002 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 11 (0x000b), len = 2, value = 0001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[3], type = 11, value[2] = 0x0001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode V: type = 12 (0x000c), len = 4 (0x0004), value = 00007080 ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[4], type = 12, value[4] = 0x00007080 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_encode_data_attribute: encode B: type = 3 (0x0003), len = 2, value = 0001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode SA: da[5], type = 3, value[2] = 0x0001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 64 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encode VID: vendor id[28] = 0x69936922 8741c6d4 ca094c93 e242c9de 19e7b7 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 32 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 144 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Encoded packet[144] = 0x7ad9d279 aca46245 00000000 00000000 01100200 000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 144 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 7ad9d279 aca46245 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 00000000 00000000 [-1] / 0x00000000 } IP; Sending packet[144] = 0x7ad9d279 aca46245 00000000 00000000 01100200 000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 156, on Interface: fe-0/0/0.0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3f400/0] Processing received [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Failed to find IKEv1 SA for given spi [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_create_sa: [e3f400/0] No IKE SA for packet; requesting permission to create one. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_rate_limit: Soft limit for p1 negotiation 100.Current active p1 negotiations 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] New connection from 1.1.1.1:500 allowed [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_connect_decision: [e3f400/0] Pad allows connection [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..156] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Not found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Start, SA = { 7ad9d279 aca46245 - 00000000 00000000 } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find_half: Found half SA = { 7ad9d279 aca46245 - 00000000 00000000 } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_get_sa: We are intiator, first response packet [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_upgrade: Start, SA = { 7ad9d279 aca46245 - 00000000 00000000 } -> { ... - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Received packet[156] = 0x7ad9d279 aca46245 339b941b f37b147b 01100200 00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet received[156] = 0x7ad9d279 aca46245 339b941b f37b147b 01100200 00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b} / 00000000, nego = -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:1. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:13. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_sa: Found 1 proposals [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 1 .protocol[0] = 1, # transforms = 1, spi[0] [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_payload_t: Start, # trans = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 2 (0x0002), size = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 2 (0x0002), size = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: trans[0] = 1, id = 1, # sa = #6 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: da[0], type = 1, value[2] = 0x0005 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: da[1], type = 2, value[2] = 0x0002 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 2 (0x0002), len = 2, used_bytes = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: da[2], type = 4, value[2] = 0x0002 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: da[3], type = 3, value[2] = 0x0001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: da[4], type = 11, value[2] = 0x0001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode SA: da[5], type = 12, value[2] = 0x7080 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode VID: data[28] = 0x9436e8d6 7174ef9a ed068d5a d5213f18 7a3f8ba6 00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode VID: data[20] = 0x48656172 74426561 745f4e6f 74696679 386b0100 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM SA I (3) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_sa_value [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_sa_value: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 4 (0x0004) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 1 (0x0001), value = 5 (0x00000005), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encryption alg = 5 (3des-cbc) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 2 (0x0002), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Hash alg = 2 (sha1) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 4 (0x0004), value = 2 (0x00000002), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Group = 2, ec6030 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 3 (0x0003), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Auth method = 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 11 (0x000b), value = 1 (0x00000001), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ssh_ike_get_data_attribute_int: get_int: type = 12 (0x000c), value = 28800 (0x00007080), len = 2 (0x0002) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Life duration 28800 secs [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_cr [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cert [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_status_n [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_vid [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 28, IKE SA eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for NetScreen Technologies [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_vid: VID[0..20] = 48656172 74426561 ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 20, IKE SA eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_check_natt_vendor_id: Start ike_sa eea400 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_private [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_ke [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_ke: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6062] [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_nonce [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_nonce: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_isakmp_nonce_data_len: Entered [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_isakmp_nonce_data_len: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Nonce data[16] = 0x35648c50 50ed010b 08f0f69a 10aca79f [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_private [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 3 ike_sa eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM KE I (5) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, nego = -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode KE: ke[128] = 0xc27c5382 8b121dd9 cb93114a 97eaf414 be204bf1 6bd3 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 132 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode NONCE: nonce[16] = 0x35648c50 50ed010b 08f0f69a 10aca79f [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 20 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 180 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encoded packet[180] = 0x7ad9d279 aca46245 339b941b f37b147b 04100200 000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 180 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Sending packet[180] = 0x7ad9d279 aca46245 339b941b f37b147b 04100200 000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3f400/0] Destructor [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3f400/0] Freeing [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3f800/0] Processing received [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3f800/deadbeee] Packet to existing v1 SA [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Received packet[196] = 0x7ad9d279 aca46245 339b941b f37b147b 04100200 00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet received[196] = 0x7ad9d279 aca46245 339b941b f37b147b 04100200 00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b} / 00000000, nego = -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:4. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:10. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: next_payload_type:0. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode KE: ke[128] = 0xebdca3cf 56a79bac 1d86d1a6 6f349966 9fdf5616 ba78 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Decode NONCE: nonce[32] = 0x2c064e4c 39cf8cb7 150e86e6 d04dba82 fd6afd83 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0012 KE NONCE [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 4, auth = 0, fields = 0017 / 06e0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 3, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 2, auth = 0, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 3, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 2, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = Start sa negotiation I (1), xchg = 4, auth = 4, fields = 0000 / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final R (8), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM done I (9), xchg = 2, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM final I (12), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM done R (13), xchg = 4, auth = 0, fields = ffff / 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 2, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 2, fields = 0012 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 2, fields = 000c / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 2, fields = 000c / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 2, fields = 001f / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 2, fields = 0008 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 3, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 3, fields = 0016 / 06e0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 3, fields = 0016 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE R (6), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM final I (7), xchg = 2, auth = 3, fields = 0020 / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA I (10), xchg = 4, auth = 3, fields = 0037 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = AM SA R (11), xchg = 4, auth = 3, fields = 0020 / 0680 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA I (3), xchg = 2, auth = 4, fields = 0001 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM SA R (4), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matching with state = MM KE I (5), xchg = 2, auth = 4, fields = 0012 / 06c0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Matched state = MM KE I (5) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[0] = ike_st_i_nonce [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_nonce: Start, nonce[0..32] = 2c064e4c 39cf8cb7 ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[1] = ike_st_i_ke [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_ke: Ke[0..128] = ebdca3cf 56a79bac ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[2] = ike_st_i_cr [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_cr: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[3] = ike_st_i_cert [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_cert: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[4] = ike_st_i_status_n [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[5] = ike_st_i_vid [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling input function[6] = ike_st_i_private [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_i_private: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[0] = ike_st_o_id [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_id: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[1] = ike_st_o_hash [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_hash: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 1024 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Peer public key has length 128 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5181] [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Diffie-hellman secret g^xy[128] = 0xc68ba38c 6f84b6a6 3902ed06 3a1dab16 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_find_pre_shared_key: Find pre-shared key policy call entered, IKE SA eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_find_pre_shared_key: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Hash algorithm = hmac-sha1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Prf key[13] = 0x5549743b 3553795c 5c35793f 67 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Calculating SKEYID [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID hash .= Ni[16] = 0x35648c50 50ed010b 08f0f69a 10aca79f [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID hash .= Nr[32] = 0x2c064e4c 39cf8cb7 150e86e6 d04dba82 fd6afd83 4 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of SKEYID hash[20] = 0x4d74ecc6 dd4c0918 4c5cbfe8 e1136b1a c08a45 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_d hash .= g^xy[128] = 0xc68ba38c 6f84b6a6 3902ed06 3a1dab16 f45de [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-I[8] = 0x7ad9d279 aca46245 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_d hash .= CKY-R[8] = 0x339b941b f37b147b [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_d hash .= 0[1] = 0x00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of SKEYID_d hash[20] = 0x70250579 8aa7c2c7 6fe3734b 24376f47 609d [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_a hash .= SKEYID_d[20] = 0x70250579 8aa7c2c7 6fe3734b 24376f47 60 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_a hash .= g^xy[128] = 0xc68ba38c 6f84b6a6 3902ed06 3a1dab16 f45de [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-I[8] = 0x7ad9d279 aca46245 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_a hash .= CKY-R[8] = 0x339b941b f37b147b [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_a hash .= 1[1] = 0x01 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of SKEYID_a hash[20] = 0x1dc88501 010bf67d ec151624 4fc2720b b0f5 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_e hash .= SKEYID_a[20] = 0x1dc88501 010bf67d ec151624 4fc2720b b0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_e hash .= g^xy[128] = 0xc68ba38c 6f84b6a6 3902ed06 3a1dab16 f45de [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-I[8] = 0x7ad9d279 aca46245 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_e hash .= CKY-R[8] = 0x339b941b f37b147b [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; SKEYID_e hash .= 2[1] = 0x02 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output SKEYID_e hash[20] = 0xd5d69216 6e8700a5 9ba80e20 8ada8229 3b70438 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; K1 hash .= 0[1] = 0x00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of K1 hash[20] = 0xbffada84 315d83a8 0dcaf6ca fd8f9109 1e402d74 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; K2 hash .= K1[20] = 0xbffada84 315d83a8 0dcaf6ca fd8f9109 1e402d74 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of K2 hash[20] = 0xfaed18ca a850d39a 11486c73 9fd6d2f9 79d3277e [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Final encryption key[24] = 0xbffada84 315d83a8 0dcaf6ca fd8f9109 1e402d7 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; IV hash .= g^xi[128] = 0xc27c5382 8b121dd9 cb93114a 97eaf414 be204bf1 6b [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; IV hash .= g^xr[128] = 0xebdca3cf 56a79bac 1d86d1a6 6f349966 9fdf5616 ba [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of IV hash[8] = 0x848ac5fe e145bcb2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_calc_mac: Start, initiator = true, local = true [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; HASH_I hash .= g^xi[128] = 0xc27c5382 8b121dd9 cb93114a 97eaf414 be204bf [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; HASH_I hash .= g^xr[128] = 0xebdca3cf 56a79bac 1d86d1a6 6f349966 9fdf561 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; HASH_I hash .= CKY-I[8] = 0x7ad9d279 aca46245 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; HASH_I hash .= CKY-R[8] = 0x339b941b f37b147b [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; HASH_I hash .= SAi_b[60] = 0x00000001 00000001 00000034 01010801 7ad9d27 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encoding ID = ipv4(any:0,[0..3]=2.2.2.2) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; HASH_I hash .= IDii_b[8] = 0x01000000 325431e2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Output of HASH_I hash[20] = 0x1760c84e eb3b7e90 9fae69d6 1a271238 a90651 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[2] = ike_st_o_status_n [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_status_n: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[3] = ike_st_o_private [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_private: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: Phase-I output: packet_number 5 ike_sa eea400 (neg eee800) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase1_pending_natt_operations: Processing pending NAT-T operations [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: NAT traversal disabled by policy [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_private_p_1_out: FB; Calling v2 policy function private_payload_request [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_policy_reply_private_payload_out: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: Calling output function[4] = ike_st_o_encrypt [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_st_o_encrypt: Marking encryption for packet [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_state_step: All done, new state = MM final I (7) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Start, SA = { 0x7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, nego = -1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode packet, version = 1.0, flags = 0x00000001 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode ID: packet[8] = 0x01000000 325431e2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 12 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode HASH: hash[20] = 0x1760c84e eb3b7e90 9fae69d6 1a271238 a906516e [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 24 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode N: doi = 1, proto = 1, type = 24578, spi[16] = 0x7ad9d279 aca4624 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encode N: data[0] [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Payload length = 28 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Packet length = 92 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encoded packet[92] = 0x7ad9d279 aca46245 339b941b f37b147b 05100201 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Encrypting packet [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; dec->enc IV[8] = 0x848ac5fe e145bcb2 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; enc->dec IV[8] = 0x5037026c b4983a13 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Encrypted packet[92] = 0x7ad9d279 aca46245 339b941b f37b147b 05100201 00 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_encode_packet: Final length = 92 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, send SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = -1, dst = 1.1.1.1:500, routing table id = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Sending packet[92] = 0x7ad9d279 aca46245 339b941b f37b147b 05100201 0000 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3f800/deadbeee] Destructor [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3f800/deadbeee] Freeing [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 92, on Interface: fe-0/0/0.0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e3fc00/0] Processing received [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e3fc00/deadbeee] Packet to existing v1 SA [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..92] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 9cca45b1, remote = 1.1.1.1:500 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b} [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_alloc_negotiation: Found slot 0, max 1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: New informational negotiation message_id = 9cca45b1 initialized using slot 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; New informational negotiation [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 9cca45b1, slot 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; Packet to old negotiation [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; Received packet[92] = 0x7ad9d279 aca46245 339b941b f37b147b 08100501 9cca45b1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; Packet received[92] = 0x7ad9d279 aca46245 339b941b f37b147b 08100501 9cca45b1 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b} / 9cca45b1, nego = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_decode_packet: first_payload_type:8. [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; Trying to decrypt, but no decryption context initialized [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_process_packet: Error, send notify [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; Error = No SA established (8194) [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_send_notify: Notification to informational exchange ignored [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_delete_negotiation: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] :500 (Responder) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [0] / 0x9cca45b1 } Info; Deleting negotiation [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation_info: Start, nego = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ike_free_negotiation: Start, nego = 0 [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e3fc00/deadbeee] Destructor [May 22 09:37:46][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e3fc00/deadbeee] Freeing [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e40000/0] Processing received [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e40000/deadbeee] Packet to existing v1 SA [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e40000/deadbeee] Destructor [May 22 09:37:50][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e40000/deadbeee] Freeing [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e40400/0] Processing received [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e40400/deadbeee] Packet to existing v1 SA [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e40400/deadbeee] Destructor [May 22 09:37:54][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e40400/deadbeee] Freeing [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2655 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] P1 SA 2372142 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = -1 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Retransmitting packet, retries = 5 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Sending packet[92] = 0x7ad9d279 aca46245 339b941b f37b147b 05100201 0000 [May 22 09:37:56][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e40800/0] Processing received [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e40800/deadbeee] Packet to existing v1 SA [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e40800/deadbeee] Destructor [May 22 09:37:58][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e40800/deadbeee] Freeing [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e40c00/0] Processing received [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e40c00/deadbeee] Packet to existing v1 SA [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e40c00/deadbeee] Destructor [May 22 09:38:02][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e40c00/deadbeee] Freeing [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] *** Processing received packet from 1.1.1.1:500 to 2.2.2.2:0, VR 0, packet len: 196, on Interface: fe-0/0/0.0 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_start: [e41000/0] Processing received [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] Found IKEv1 SA [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_input_v1_get_sa: [e41000/deadbeee] Packet to existing v1 SA [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Packet from 1.1.1.1:500, use_natt=0 data[0..196] = 7ad9d279 aca46245 339b941b f37b147b ... [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_get_sa: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } / 00000000, remote = 1.1.1.1:500 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Start, SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_sa_find: Found SA = { 7ad9d279 aca46245 - 339b941b f37b147b } [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Old negotiation message_id = 00000000, slot -1 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Packet to old negotiation [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Other end retransmitted its packet [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_udp_callback_common: Cannot resend our response, because we have just sent a packet to other end [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: [e41000/deadbeee] Destructor [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_free: [e41000/deadbeee] Freeing [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] iked_vpnm_timer_callback: VPN Monitor timer kicked in [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] Get rtbl_idx=0 for ifl idx 71 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] PING (1.1.1.1 via 1.1.1.1): 56 data bytes Tunnel-id:131073 outgoing intf 71, rtbl idx 0 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] VPNM send ping pkt (84/84) bytes for tunnel 131073, seq 2656 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] Received IKE Trigger message with local_gw_addr = 2.2.2.2 remote_gw_addr = 1.1.1.1 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] In iked_async_ike_trigger_msg_handler; Tunnel = 131073 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] Triggering the IKE negotiation .... [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback called for Colo_VPN [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for Colo_VPN config block [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] iked_lookup_peer_entry: Peer entry 0xef0000 FOUND for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] Peer entry exist for local 2.2.2.2:500 and remote 1.1.1.1:500 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] P1 SA 2372142 negotiation is still going on for gateway gw_Colo_VPN [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 2.2.2.2 remote 1.1.1.1 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_retransmit_callback: Start, retransmit SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = -1 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Retransmitting packet, retries = 4 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Start, retransmit previous packet SA = { 7ad9d279 aca46245 - 339b941b f37b147b}, nego = -1, dst = 1.1.1.1:500 routing table id = 0 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] 2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { 7ad9d279 aca46245 - 339b941b f37b147b [-1] / 0x00000000 } IP; Sending packet[92] = 0x7ad9d279 aca46245 339b941b f37b147b 05100201 0000 [May 22 09:38:06][2.2.2.2 <-> 1.1.1.1] ike_send_packet: Inserting retransmission timer after 10.000000 seconds [May 22 09:43:16]KMD_INTERNAL_ERROR: iked_ifstate_eoc_handler: EOC msg received [May 22 09:43:27]KMD_INTERNAL_ERROR: iked_ui_event_handler: usp ipc connection for iked show CLI was SHUTDOWN due to error in receiving msg or age out of connection or flowd going down etc. Reconnect to pfe..