[Aug 8 22:14:36]kmd_iked_cfgbuf_addrec: 546: ** Allocated recptr is 0, reclen = 0 ** [Aug 8 22:14:36]kmd_iked_cfgbuf_addrec: 546: ** Allocated recptr is c, reclen = 0 ** [Aug 8 22:14:37]Error:No such file or directory in deleting ike debug blob [Aug 8 22:14:37]kmd_iked_cfgbuf_addrec: 546: ** Allocated recptr is c60, reclen = 0 ** [Aug 8 22:14:37]kmd_iked_cfgbuf_addrec: 546: ** Allocated recptr is 44, reclen = 0 ** [Aug 8 22:14:37]Error: Unknown record, type = 25 [Aug 8 22:14:37]kmd_iked_cfgbuf_addrec: 546: ** Allocated recptr is 4, reclen = 6 ** [Aug 8 22:14:37]kmd_iked_cfgbuf_addrec: 546: ** Allocated recptr is 0, reclen = 0 ** [Aug 8 22:14:37]No SPUs are operational, skip sending to SPUs. [Aug 8 22:14:37]Config download: Processed 16 - 17 messages [Aug 8 22:14:37]Config download time: 0 secs [Aug 8 22:14:37]iked_config_process_config_list, configuration diff complete [Aug 8 22:14:37]ike_retransmit_callback: Start, retransmit SA = { 8502c0a4 c6e01881 - cd3a5326 267305d5}, nego = -1 [Aug 8 22:14:37]ike_send_packet: Start, retransmit previous packet SA = { 8502c0a4 c6e01881 - cd3a5326 267305d5}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:14:37]ike_retransmit_callback: Start, retransmit SA = { c3729523 f14eac06 - e2b62e10 7961510f}, nego = -1 [Aug 8 22:14:37]ike_send_packet: Start, retransmit previous packet SA = { c3729523 f14eac06 - e2b62e10 7961510f}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:14:37]P1 SA 140218 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:14:37]Initiate IKE P1 SA 140218 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:14:37]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140218, ref cnt 2, status: Error ok [Aug 8 22:14:37]P1 SA 140219 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:14:37]Initiate IKE P1 SA 140219 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:14:37]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140219, ref cnt 2, status: Error ok [Aug 8 22:14:37]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { 8502c0a4 c6e01881 - cd3a5326 267305d5 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:14:37]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:14:37]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:14:37]ike_sa_delete: Start, SA = { 8502c0a4 c6e01881 - cd3a5326 267305d5 } [Aug 8 22:14:37]173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { c3729523 f14eac06 - e2b62e10 7961510f [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:14:37]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:14:37]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:14:37]ike_sa_delete: Start, SA = { c3729523 f14eac06 - e2b62e10 7961510f } [Aug 8 22:14:37]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140219 [Aug 8 22:14:37] IKEv1 Error : Timeout [Aug 8 22:14:37]IPSec Rekey for SPI 0x0 failed [Aug 8 22:14:37]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:14:37]IKE SA delete called for p1 sa 140219 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:14:37]P1 SA 140219 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:14:37]iked_pm_p1_sa_destroy: p1 sa 140219 (ref cnt 0), waiting_for_del 0x104c540 [Aug 8 22:14:37]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140218 [Aug 8 22:14:37] IKEv1 Error : Timeout [Aug 8 22:14:37]IPSec Rekey for SPI 0x0 failed [Aug 8 22:14:37]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:14:37]IKE SA delete called for p1 sa 140218 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:14:37]P1 SA 140218 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:14:37]iked_pm_p1_sa_destroy: p1 sa 140218 (ref cnt 0), waiting_for_del 0x104c540 [Aug 8 22:14:37]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:14:37]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:14:37]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:14:37]ike_sa_allocate: Start, SA = { 874b6611 0ff36bd6 - 00000000 00000000 } [Aug 8 22:14:37]ssh_ike_connect: SA = { 874b6611 0ff36bd6 - 00000000 00000000}, nego = -1 [Aug 8 22:14:37]ike_st_o_sa_proposal: Start [Aug 8 22:14:37]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:14:37]ike_st_o_private: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_send_packet: <-------- sending SA = { 874b6611 0ff36bd6 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:14:37]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:14:37]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:14:37]ike_sa_allocate: Start, SA = { f7ce10bd e2999945 - 00000000 00000000 } [Aug 8 22:14:37]ssh_ike_connect: SA = { f7ce10bd e2999945 - 00000000 00000000}, nego = -1 [Aug 8 22:14:37]ike_st_o_sa_proposal: Start [Aug 8 22:14:37]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:14:37]ike_st_o_private: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_send_packet: <-------- sending SA = { f7ce10bd e2999945 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:14:37]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:14:37]ike_sa_find: Not found SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } [Aug 8 22:14:37]ikev2_packet_st_input_v1_create_sa: [1090800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:14:37]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:14:37]ike_get_sa: Start, SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:14:37]ike_sa_find: Not found SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } [Aug 8 22:14:37]ike_sa_find_half: Found half SA = { 874b6611 0ff36bd6 - 00000000 00000000 } [Aug 8 22:14:37]ike_sa_upgrade: Start, SA = { 874b6611 0ff36bd6 - 00000000 00000000 } -> { ... - 07689600 c09ecae3 } [Aug 8 22:14:37]ike_st_i_sa_value: Start [Aug 8 22:14:37]ike_st_i_cr: Start [Aug 8 22:14:37]ike_st_i_cert: Start [Aug 8 22:14:37]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:14:37]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:14:37]ike_st_i_private: Start [Aug 8 22:14:37]ike_st_o_ke: Start [Aug 8 22:14:37]ike_st_o_nonce: Start [Aug 8 22:14:37]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:14:37]ike_st_o_private: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_send_packet: <-------- sending SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:14:37]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:14:37]ike_sa_find: Not found SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } [Aug 8 22:14:37]ikev2_packet_st_input_v1_create_sa: [1090c00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:14:37]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:14:37]ike_get_sa: Start, SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:14:37]ike_sa_find: Not found SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } [Aug 8 22:14:37]ike_sa_find_half: Found half SA = { f7ce10bd e2999945 - 00000000 00000000 } [Aug 8 22:14:37]ike_sa_upgrade: Start, SA = { f7ce10bd e2999945 - 00000000 00000000 } -> { ... - 5ba45f7c 6e81fb9e } [Aug 8 22:14:37]ike_st_i_sa_value: Start [Aug 8 22:14:37]ike_st_i_cr: Start [Aug 8 22:14:37]ike_st_i_cert: Start [Aug 8 22:14:37]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:14:37]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:14:37]ike_st_i_private: Start [Aug 8 22:14:37]ike_st_o_ke: Start [Aug 8 22:14:37]ike_st_o_nonce: Start [Aug 8 22:14:37]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:14:37]ike_st_o_private: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_send_packet: <-------- sending SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:14:37]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:14:37]ike_sa_find: Found SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } [Aug 8 22:14:37]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:14:37]ike_get_sa: Start, SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:14:37]ike_sa_find: Found SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } [Aug 8 22:14:37]ike_st_i_nonce: Start, nonce[0..16] = 7e0e8e34 a88eb04e ... [Aug 8 22:14:37]ike_st_i_ke: Ke[0..128] = bb715814 e397ee42 ... [Aug 8 22:14:37]ike_st_i_cr: Start [Aug 8 22:14:37]ike_st_i_cert: Start [Aug 8 22:14:37]ike_st_i_private: Start [Aug 8 22:14:37]ike_st_o_id: Start [Aug 8 22:14:37]ike_st_o_hash: Start [Aug 8 22:14:37]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:14:37]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:14:37]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:14:37]ike_st_o_status_n: Start [Aug 8 22:14:37]ike_st_o_private: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:14:37]ike_send_packet: <-------- sending SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:14:37]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:14:37]ike_sa_find: Found SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } [Aug 8 22:14:37]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:14:37]ike_get_sa: Start, SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:14:37]ike_sa_find: Found SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } [Aug 8 22:14:37]ike_st_i_nonce: Start, nonce[0..16] = 6156a3ef 41d1a317 ... [Aug 8 22:14:37]ike_st_i_ke: Ke[0..128] = 4ca56f23 a3198442 ... [Aug 8 22:14:37]ike_st_i_cr: Start [Aug 8 22:14:37]ike_st_i_cert: Start [Aug 8 22:14:37]ike_st_i_private: Start [Aug 8 22:14:37]ike_st_o_id: Start [Aug 8 22:14:37]ike_st_o_hash: Start [Aug 8 22:14:37]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:14:37]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:14:37]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:14:37]ike_st_o_status_n: Start [Aug 8 22:14:37]ike_st_o_private: Start [Aug 8 22:14:37]ike_policy_reply_private_payload_out: Start [Aug 8 22:14:37]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:14:37]ike_send_packet: <-------- sending SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:14:47]ike_retransmit_callback: Start, retransmit SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3}, nego = -1 [Aug 8 22:14:47]ike_send_packet: Start, retransmit previous packet SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:14:47]ike_retransmit_callback: Start, retransmit SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e}, nego = -1 [Aug 8 22:14:47]ike_send_packet: Start, retransmit previous packet SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:14:57]ike_retransmit_callback: Start, retransmit SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3}, nego = -1 [Aug 8 22:14:57]ike_send_packet: Start, retransmit previous packet SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:14:57]ike_retransmit_callback: Start, retransmit SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e}, nego = -1 [Aug 8 22:14:57]ike_send_packet: Start, retransmit previous packet SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:15:07]P1 SA 140220 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:15:07]Initiate IKE P1 SA 140220 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:15:07]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140220, ref cnt 2, status: Error ok [Aug 8 22:15:07]P1 SA 140221 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:15:07]Initiate IKE P1 SA 140221 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:15:07]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140221, ref cnt 2, status: Error ok [Aug 8 22:15:07]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { 874b6611 0ff36bd6 - 07689600 c09ecae3 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:15:07]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:15:07]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:15:07]ike_sa_delete: Start, SA = { 874b6611 0ff36bd6 - 07689600 c09ecae3 } [Aug 8 22:15:07]173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:15:07]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:15:07]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:15:07]ike_sa_delete: Start, SA = { f7ce10bd e2999945 - 5ba45f7c 6e81fb9e } [Aug 8 22:15:07]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140221 [Aug 8 22:15:07] IKEv1 Error : Timeout [Aug 8 22:15:07]IPSec Rekey for SPI 0x0 failed [Aug 8 22:15:07]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:15:07]IKE SA delete called for p1 sa 140221 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:15:07]P1 SA 140221 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:15:07]iked_pm_p1_sa_destroy: p1 sa 140221 (ref cnt 0), waiting_for_del 0x10c5cc0 [Aug 8 22:15:07]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140220 [Aug 8 22:15:07] IKEv1 Error : Timeout [Aug 8 22:15:07]IPSec Rekey for SPI 0x0 failed [Aug 8 22:15:07]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:15:07]IKE SA delete called for p1 sa 140220 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:15:07]P1 SA 140220 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:15:07]iked_pm_p1_sa_destroy: p1 sa 140220 (ref cnt 0), waiting_for_del 0x10c5c20 [Aug 8 22:15:07]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:15:07]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:15:07]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:15:07]ike_sa_allocate: Start, SA = { 0c445b3a bab258ba - 00000000 00000000 } [Aug 8 22:15:07]ssh_ike_connect: SA = { 0c445b3a bab258ba - 00000000 00000000}, nego = -1 [Aug 8 22:15:07]ike_st_o_sa_proposal: Start [Aug 8 22:15:07]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:15:07]ike_st_o_private: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_send_packet: <-------- sending SA = { 0c445b3a bab258ba - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:15:07]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:15:07]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:15:07]ike_sa_allocate: Start, SA = { 7c2d2a80 db5a8e86 - 00000000 00000000 } [Aug 8 22:15:07]ssh_ike_connect: SA = { 7c2d2a80 db5a8e86 - 00000000 00000000}, nego = -1 [Aug 8 22:15:07]ike_st_o_sa_proposal: Start [Aug 8 22:15:07]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:15:07]ike_st_o_private: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_send_packet: <-------- sending SA = { 7c2d2a80 db5a8e86 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:15:07]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:15:07]ike_sa_find: Not found SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } [Aug 8 22:15:07]ikev2_packet_st_input_v1_create_sa: [1091800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:15:07]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:07]ike_get_sa: Start, SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:15:07]ike_sa_find: Not found SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } [Aug 8 22:15:07]ike_sa_find_half: Found half SA = { 0c445b3a bab258ba - 00000000 00000000 } [Aug 8 22:15:07]ike_sa_upgrade: Start, SA = { 0c445b3a bab258ba - 00000000 00000000 } -> { ... - 7399d798 e18ebf5b } [Aug 8 22:15:07]ike_st_i_sa_value: Start [Aug 8 22:15:07]ike_st_i_cr: Start [Aug 8 22:15:07]ike_st_i_cert: Start [Aug 8 22:15:07]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:15:07]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:15:07]ike_st_i_private: Start [Aug 8 22:15:07]ike_st_o_ke: Start [Aug 8 22:15:07]ike_st_o_nonce: Start [Aug 8 22:15:07]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:15:07]ike_st_o_private: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_send_packet: <-------- sending SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:15:07]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:15:07]ike_sa_find: Not found SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } [Aug 8 22:15:07]ikev2_packet_st_input_v1_create_sa: [1091c00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:15:07]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:07]ike_get_sa: Start, SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:15:07]ike_sa_find: Not found SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } [Aug 8 22:15:07]ike_sa_find_half: Found half SA = { 7c2d2a80 db5a8e86 - 00000000 00000000 } [Aug 8 22:15:07]ike_sa_upgrade: Start, SA = { 7c2d2a80 db5a8e86 - 00000000 00000000 } -> { ... - ddd63457 c2d81dba } [Aug 8 22:15:07]ike_st_i_sa_value: Start [Aug 8 22:15:07]ike_st_i_cr: Start [Aug 8 22:15:07]ike_st_i_cert: Start [Aug 8 22:15:07]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:15:07]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:15:07]ike_st_i_private: Start [Aug 8 22:15:07]ike_st_o_ke: Start [Aug 8 22:15:07]ike_st_o_nonce: Start [Aug 8 22:15:07]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:15:07]ike_st_o_private: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_send_packet: <-------- sending SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:15:07]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:15:07]ike_sa_find: Found SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } [Aug 8 22:15:07]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:07]ike_get_sa: Start, SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:15:07]ike_sa_find: Found SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } [Aug 8 22:15:07]ike_st_i_nonce: Start, nonce[0..16] = 17635eb9 e8a09fee ... [Aug 8 22:15:07]ike_st_i_ke: Ke[0..128] = 0e432d3f a8b5d386 ... [Aug 8 22:15:07]ike_st_i_cr: Start [Aug 8 22:15:07]ike_st_i_cert: Start [Aug 8 22:15:07]ike_st_i_private: Start [Aug 8 22:15:07]ike_st_o_id: Start [Aug 8 22:15:07]ike_st_o_hash: Start [Aug 8 22:15:07]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:15:07]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:15:07]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:15:07]ike_st_o_status_n: Start [Aug 8 22:15:07]ike_st_o_private: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:15:07]ike_send_packet: <-------- sending SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:15:07]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:15:07]ike_sa_find: Found SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } [Aug 8 22:15:07]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:07]ike_get_sa: Start, SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:15:07]ike_sa_find: Found SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } [Aug 8 22:15:07]ike_st_i_nonce: Start, nonce[0..16] = ec7bc35f 96309c3b ... [Aug 8 22:15:07]ike_st_i_ke: Ke[0..128] = 0dc3fbc4 68ee08b5 ... [Aug 8 22:15:07]ike_st_i_cr: Start [Aug 8 22:15:07]ike_st_i_cert: Start [Aug 8 22:15:07]ike_st_i_private: Start [Aug 8 22:15:07]ike_st_o_id: Start [Aug 8 22:15:07]ike_st_o_hash: Start [Aug 8 22:15:07]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:15:07]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:15:07]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:15:07]ike_st_o_status_n: Start [Aug 8 22:15:07]ike_st_o_private: Start [Aug 8 22:15:07]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:07]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:15:07]ike_send_packet: <-------- sending SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:15:17]ike_retransmit_callback: Start, retransmit SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b}, nego = -1 [Aug 8 22:15:17]ike_send_packet: Start, retransmit previous packet SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:15:17]ike_retransmit_callback: Start, retransmit SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba}, nego = -1 [Aug 8 22:15:17]ike_send_packet: Start, retransmit previous packet SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:15:27]ike_retransmit_callback: Start, retransmit SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b}, nego = -1 [Aug 8 22:15:27]ike_send_packet: Start, retransmit previous packet SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:15:27]ike_retransmit_callback: Start, retransmit SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba}, nego = -1 [Aug 8 22:15:27]ike_send_packet: Start, retransmit previous packet SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:15:37]P1 SA 140222 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:15:37]Initiate IKE P1 SA 140222 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:15:37]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140222, ref cnt 2, status: Error ok [Aug 8 22:15:37]P1 SA 140223 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:15:37]Initiate IKE P1 SA 140223 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:15:37]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140223, ref cnt 2, status: Error ok [Aug 8 22:15:37]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { 0c445b3a bab258ba - 7399d798 e18ebf5b [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:15:37]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:15:37]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:15:37]ike_sa_delete: Start, SA = { 0c445b3a bab258ba - 7399d798 e18ebf5b } [Aug 8 22:15:37]173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:15:37]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:15:37]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:15:37]ike_sa_delete: Start, SA = { 7c2d2a80 db5a8e86 - ddd63457 c2d81dba } [Aug 8 22:15:37]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140223 [Aug 8 22:15:37] IKEv1 Error : Timeout [Aug 8 22:15:37]IPSec Rekey for SPI 0x0 failed [Aug 8 22:15:37]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:15:37]IKE SA delete called for p1 sa 140223 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:15:37]P1 SA 140223 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:15:37]iked_pm_p1_sa_destroy: p1 sa 140223 (ref cnt 0), waiting_for_del 0x104c540 [Aug 8 22:15:37]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140222 [Aug 8 22:15:37] IKEv1 Error : Timeout [Aug 8 22:15:37]IPSec Rekey for SPI 0x0 failed [Aug 8 22:15:37]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:15:37]IKE SA delete called for p1 sa 140222 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:15:37]P1 SA 140222 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:15:37]iked_pm_p1_sa_destroy: p1 sa 140222 (ref cnt 0), waiting_for_del 0x104c540 [Aug 8 22:15:37]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:15:47]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:15:47]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:15:47]ike_sa_allocate: Start, SA = { bfd88076 bd255ed8 - 00000000 00000000 } [Aug 8 22:15:47]ssh_ike_connect: SA = { bfd88076 bd255ed8 - 00000000 00000000}, nego = -1 [Aug 8 22:15:47]ike_st_o_sa_proposal: Start [Aug 8 22:15:47]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:15:47]ike_st_o_private: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_send_packet: <-------- sending SA = { bfd88076 bd255ed8 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:15:47]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:15:47]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:15:47]ike_sa_allocate: Start, SA = { 555dd657 e0567b6a - 00000000 00000000 } [Aug 8 22:15:47]ssh_ike_connect: SA = { 555dd657 e0567b6a - 00000000 00000000}, nego = -1 [Aug 8 22:15:47]ike_st_o_sa_proposal: Start [Aug 8 22:15:47]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:15:47]ike_st_o_private: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_send_packet: <-------- sending SA = { 555dd657 e0567b6a - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:15:47]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:15:47]ike_sa_find: Not found SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } [Aug 8 22:15:47]ikev2_packet_st_input_v1_create_sa: [1092800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:15:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:47]ike_get_sa: Start, SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:15:47]ike_sa_find: Not found SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } [Aug 8 22:15:47]ike_sa_find_half: Found half SA = { bfd88076 bd255ed8 - 00000000 00000000 } [Aug 8 22:15:47]ike_sa_upgrade: Start, SA = { bfd88076 bd255ed8 - 00000000 00000000 } -> { ... - d020ee20 a2ffc844 } [Aug 8 22:15:47]ike_st_i_sa_value: Start [Aug 8 22:15:47]ike_st_i_cr: Start [Aug 8 22:15:47]ike_st_i_cert: Start [Aug 8 22:15:47]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:15:47]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:15:47]ike_st_i_private: Start [Aug 8 22:15:47]ike_st_o_ke: Start [Aug 8 22:15:47]ike_st_o_nonce: Start [Aug 8 22:15:47]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:15:47]ike_st_o_private: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_send_packet: <-------- sending SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:15:47]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:15:47]ike_sa_find: Not found SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e } [Aug 8 22:15:47]ikev2_packet_st_input_v1_create_sa: [1092c00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:15:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:47]ike_get_sa: Start, SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:15:47]ike_sa_find: Not found SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e } [Aug 8 22:15:47]ike_sa_find_half: Found half SA = { 555dd657 e0567b6a - 00000000 00000000 } [Aug 8 22:15:47]ike_sa_upgrade: Start, SA = { 555dd657 e0567b6a - 00000000 00000000 } -> { ... - a2ae39ad 9a2ccb3e } [Aug 8 22:15:47]ike_st_i_sa_value: Start [Aug 8 22:15:47]ike_st_i_cr: Start [Aug 8 22:15:47]ike_st_i_cert: Start [Aug 8 22:15:47]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:15:47]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:15:47]ike_st_i_private: Start [Aug 8 22:15:47]ike_st_o_ke: Start [Aug 8 22:15:47]ike_st_o_nonce: Start [Aug 8 22:15:47]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:15:47]ike_st_o_private: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_send_packet: <-------- sending SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:15:47]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:15:47]ike_sa_find: Found SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } [Aug 8 22:15:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:15:47]ike_get_sa: Start, SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:15:47]ike_sa_find: Found SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } [Aug 8 22:15:47]ike_st_i_nonce: Start, nonce[0..16] = 7ba5d319 60992e13 ... [Aug 8 22:15:47]ike_st_i_ke: Ke[0..128] = f325868f 2df2783b ... [Aug 8 22:15:47]ike_st_i_cr: Start [Aug 8 22:15:47]ike_st_i_cert: Start [Aug 8 22:15:47]ike_st_i_private: Start [Aug 8 22:15:47]ike_st_o_id: Start [Aug 8 22:15:47]ike_st_o_hash: Start [Aug 8 22:15:47]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:15:47]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:15:47]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:15:47]ike_st_o_status_n: Start [Aug 8 22:15:47]ike_st_o_private: Start [Aug 8 22:15:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:15:47]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:15:47]ike_send_packet: <-------- sending SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:15:57]ike_retransmit_callback: Start, retransmit SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e}, nego = -1 [Aug 8 22:15:57]ike_send_packet: Start, retransmit previous packet SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e}, nego = -1, dst = 52.206.202.16:500 routing table id = 0 [Aug 8 22:15:57]ike_retransmit_callback: Start, retransmit SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844}, nego = -1 [Aug 8 22:15:57]ike_send_packet: Start, retransmit previous packet SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:16:07]ike_retransmit_callback: Start, retransmit SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e}, nego = -1 [Aug 8 22:16:07]ike_send_packet: Start, retransmit previous packet SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e}, nego = -1, dst = 52.206.202.16:500 routing table id = 0 [Aug 8 22:16:07]ike_retransmit_callback: Start, retransmit SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844}, nego = -1 [Aug 8 22:16:07]ike_send_packet: Start, retransmit previous packet SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:16:17]P1 SA 140224 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:16:17]Initiate IKE P1 SA 140224 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:16:17]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140224, ref cnt 2, status: Error ok [Aug 8 22:16:17]P1 SA 140225 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:16:17]Initiate IKE P1 SA 140225 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:16:17]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140225, ref cnt 2, status: Error ok [Aug 8 22:16:17]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { bfd88076 bd255ed8 - d020ee20 a2ffc844 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:16:17]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:16:17]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:16:17]ike_sa_delete: Start, SA = { bfd88076 bd255ed8 - d020ee20 a2ffc844 } [Aug 8 22:16:17]173.161.47.145:500 (Initiator) <-> 52.206.202.16:500 { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:16:17]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140225 [Aug 8 22:16:17] IKEv1 Error : Timeout [Aug 8 22:16:17]IPSec Rekey for SPI 0x0 failed [Aug 8 22:16:17]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:16:17]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:16:17]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:16:17]ike_sa_delete: Start, SA = { 555dd657 e0567b6a - a2ae39ad 9a2ccb3e } [Aug 8 22:16:17]IKE SA delete called for p1 sa 140225 (ref cnt 1) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:16:17]iked_pm_p1_sa_destroy: p1 sa 140225 (ref cnt 0), waiting_for_del 0x0 [Aug 8 22:16:17]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140224 [Aug 8 22:16:17] IKEv1 Error : Timeout [Aug 8 22:16:17]IPSec Rekey for SPI 0x0 failed [Aug 8 22:16:17]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:16:17]IKE SA delete called for p1 sa 140224 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:16:17]P1 SA 140224 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:16:17]iked_pm_p1_sa_destroy: p1 sa 140224 (ref cnt 0), waiting_for_del 0x10c5c20 [Aug 8 22:16:17]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:16:17]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:16:17]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:16:17]ike_sa_allocate: Start, SA = { a41bb05c 7ded00b8 - 00000000 00000000 } [Aug 8 22:16:17]ssh_ike_connect: SA = { a41bb05c 7ded00b8 - 00000000 00000000}, nego = -1 [Aug 8 22:16:17]ike_st_o_sa_proposal: Start [Aug 8 22:16:17]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:16:17]ike_st_o_private: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_send_packet: <-------- sending SA = { a41bb05c 7ded00b8 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:16:17]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:16:17]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:16:17]ike_sa_allocate: Start, SA = { 414b427f d4925e23 - 00000000 00000000 } [Aug 8 22:16:17]ssh_ike_connect: SA = { 414b427f d4925e23 - 00000000 00000000}, nego = -1 [Aug 8 22:16:17]ike_st_o_sa_proposal: Start [Aug 8 22:16:17]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:16:17]ike_st_o_private: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_send_packet: <-------- sending SA = { 414b427f d4925e23 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:16:17]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:16:17]ike_sa_find: Not found SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } [Aug 8 22:16:17]ikev2_packet_st_input_v1_create_sa: [1093400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:16:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:17]ike_get_sa: Start, SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:16:17]ike_sa_find: Not found SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } [Aug 8 22:16:17]ike_sa_find_half: Found half SA = { a41bb05c 7ded00b8 - 00000000 00000000 } [Aug 8 22:16:17]ike_sa_upgrade: Start, SA = { a41bb05c 7ded00b8 - 00000000 00000000 } -> { ... - 4e371387 c473c4e5 } [Aug 8 22:16:17]ike_st_i_sa_value: Start [Aug 8 22:16:17]ike_st_i_cr: Start [Aug 8 22:16:17]ike_st_i_cert: Start [Aug 8 22:16:17]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:16:17]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:16:17]ike_st_i_private: Start [Aug 8 22:16:17]ike_st_o_ke: Start [Aug 8 22:16:17]ike_st_o_nonce: Start [Aug 8 22:16:17]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:16:17]ike_st_o_private: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_send_packet: <-------- sending SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:16:17]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:16:17]ike_sa_find: Not found SA = { 414b427f d4925e23 - c16058ce 09da5377 } [Aug 8 22:16:17]ikev2_packet_st_input_v1_create_sa: [1093800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:16:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:17]ike_get_sa: Start, SA = { 414b427f d4925e23 - c16058ce 09da5377 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:16:17]ike_sa_find: Not found SA = { 414b427f d4925e23 - c16058ce 09da5377 } [Aug 8 22:16:17]ike_sa_find_half: Found half SA = { 414b427f d4925e23 - 00000000 00000000 } [Aug 8 22:16:17]ike_sa_upgrade: Start, SA = { 414b427f d4925e23 - 00000000 00000000 } -> { ... - c16058ce 09da5377 } [Aug 8 22:16:17]ike_st_i_sa_value: Start [Aug 8 22:16:17]ike_st_i_cr: Start [Aug 8 22:16:17]ike_st_i_cert: Start [Aug 8 22:16:17]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:16:17]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:16:17]ike_st_i_private: Start [Aug 8 22:16:17]ike_st_o_ke: Start [Aug 8 22:16:17]ike_st_o_nonce: Start [Aug 8 22:16:17]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:16:17]ike_st_o_private: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_send_packet: <-------- sending SA = { 414b427f d4925e23 - c16058ce 09da5377}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:16:17]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:16:17]ike_sa_find: Found SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } [Aug 8 22:16:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:17]ike_get_sa: Start, SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:16:17]ike_sa_find: Found SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } [Aug 8 22:16:17]ike_st_i_nonce: Start, nonce[0..16] = e9c7b597 26b7b738 ... [Aug 8 22:16:17]ike_st_i_ke: Ke[0..128] = 365216b2 ea724a8b ... [Aug 8 22:16:17]ike_st_i_cr: Start [Aug 8 22:16:17]ike_st_i_cert: Start [Aug 8 22:16:17]ike_st_i_private: Start [Aug 8 22:16:17]ike_st_o_id: Start [Aug 8 22:16:17]ike_st_o_hash: Start [Aug 8 22:16:17]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:16:17]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:16:17]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:16:17]ike_st_o_status_n: Start [Aug 8 22:16:17]ike_st_o_private: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:16:17]ike_send_packet: <-------- sending SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:16:17]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:16:17]ike_sa_find: Found SA = { 414b427f d4925e23 - c16058ce 09da5377 } [Aug 8 22:16:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:17]ike_get_sa: Start, SA = { 414b427f d4925e23 - c16058ce 09da5377 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:16:17]ike_sa_find: Found SA = { 414b427f d4925e23 - c16058ce 09da5377 } [Aug 8 22:16:17]ike_st_i_nonce: Start, nonce[0..16] = c1436dc6 ce2482df ... [Aug 8 22:16:17]ike_st_i_ke: Ke[0..128] = 07ac0aba 3ffccc0e ... [Aug 8 22:16:17]ike_st_i_cr: Start [Aug 8 22:16:17]ike_st_i_cert: Start [Aug 8 22:16:17]ike_st_i_private: Start [Aug 8 22:16:17]ike_st_o_id: Start [Aug 8 22:16:17]ike_st_o_hash: Start [Aug 8 22:16:17]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:16:17]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:16:17]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:16:17]ike_st_o_status_n: Start [Aug 8 22:16:17]ike_st_o_private: Start [Aug 8 22:16:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:17]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:16:17]ike_send_packet: <-------- sending SA = { 414b427f d4925e23 - c16058ce 09da5377}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:16:27]ike_retransmit_callback: Start, retransmit SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5}, nego = -1 [Aug 8 22:16:27]ike_send_packet: Start, retransmit previous packet SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:16:27]ike_retransmit_callback: Start, retransmit SA = { 414b427f d4925e23 - c16058ce 09da5377}, nego = -1 [Aug 8 22:16:27]ike_send_packet: Start, retransmit previous packet SA = { 414b427f d4925e23 - c16058ce 09da5377}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:16:37]ike_retransmit_callback: Start, retransmit SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5}, nego = -1 [Aug 8 22:16:37]ike_send_packet: Start, retransmit previous packet SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:16:37]ike_retransmit_callback: Start, retransmit SA = { 414b427f d4925e23 - c16058ce 09da5377}, nego = -1 [Aug 8 22:16:37]ike_send_packet: Start, retransmit previous packet SA = { 414b427f d4925e23 - c16058ce 09da5377}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:16:47]P1 SA 140226 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:16:47]Initiate IKE P1 SA 140226 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:16:47]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140226, ref cnt 2, status: Error ok [Aug 8 22:16:47]P1 SA 140227 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:16:47]Initiate IKE P1 SA 140227 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:16:47]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140227, ref cnt 2, status: Error ok [Aug 8 22:16:47]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { a41bb05c 7ded00b8 - 4e371387 c473c4e5 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:16:47]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:16:47]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:16:47]ike_sa_delete: Start, SA = { a41bb05c 7ded00b8 - 4e371387 c473c4e5 } [Aug 8 22:16:47]173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 414b427f d4925e23 - c16058ce 09da5377 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:16:47]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:16:47]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:16:47]ike_sa_delete: Start, SA = { 414b427f d4925e23 - c16058ce 09da5377 } [Aug 8 22:16:47]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140227 [Aug 8 22:16:47] IKEv1 Error : Timeout [Aug 8 22:16:47]IPSec Rekey for SPI 0x0 failed [Aug 8 22:16:47]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:16:47]IKE SA delete called for p1 sa 140227 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:16:47]P1 SA 140227 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:16:47]iked_pm_p1_sa_destroy: p1 sa 140227 (ref cnt 0), waiting_for_del 0x104c480 [Aug 8 22:16:47]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140226 [Aug 8 22:16:47] IKEv1 Error : Timeout [Aug 8 22:16:47]IPSec Rekey for SPI 0x0 failed [Aug 8 22:16:47]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:16:47]IKE SA delete called for p1 sa 140226 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:16:47]P1 SA 140226 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:16:47]iked_pm_p1_sa_destroy: p1 sa 140226 (ref cnt 0), waiting_for_del 0x104c480 [Aug 8 22:16:47]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:16:47]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:16:47]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:16:47]ike_sa_allocate: Start, SA = { c3419fdf 771be0c8 - 00000000 00000000 } [Aug 8 22:16:47]ssh_ike_connect: SA = { c3419fdf 771be0c8 - 00000000 00000000}, nego = -1 [Aug 8 22:16:47]ike_st_o_sa_proposal: Start [Aug 8 22:16:47]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:16:47]ike_st_o_private: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_send_packet: <-------- sending SA = { c3419fdf 771be0c8 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:16:47]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:16:47]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:16:47]ike_sa_allocate: Start, SA = { ee80c049 6e3ba3e6 - 00000000 00000000 } [Aug 8 22:16:47]ssh_ike_connect: SA = { ee80c049 6e3ba3e6 - 00000000 00000000}, nego = -1 [Aug 8 22:16:47]ike_st_o_sa_proposal: Start [Aug 8 22:16:47]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:16:47]ike_st_o_private: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_send_packet: <-------- sending SA = { ee80c049 6e3ba3e6 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:16:47]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:16:47]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:16:47]ike_sa_find: Not found SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } [Aug 8 22:16:47]ikev2_packet_st_input_v1_create_sa: [1094400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:16:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:47]ike_get_sa: Start, SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:16:47]ike_sa_find: Not found SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } [Aug 8 22:16:47]ike_sa_find_half: Found half SA = { c3419fdf 771be0c8 - 00000000 00000000 } [Aug 8 22:16:47]ike_sa_upgrade: Start, SA = { c3419fdf 771be0c8 - 00000000 00000000 } -> { ... - d3b02af5 cc3d0c30 } [Aug 8 22:16:47]ike_st_i_sa_value: Start [Aug 8 22:16:47]ike_st_i_cr: Start [Aug 8 22:16:47]ike_st_i_cert: Start [Aug 8 22:16:47]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:16:47]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:16:47]ike_st_i_private: Start [Aug 8 22:16:47]ike_st_o_ke: Start [Aug 8 22:16:47]ike_st_o_nonce: Start [Aug 8 22:16:47]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:16:47]ike_st_o_private: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_send_packet: <-------- sending SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:16:47]ike_sa_find: Not found SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } [Aug 8 22:16:47]ikev2_packet_st_input_v1_create_sa: [1094800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:16:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:47]ike_get_sa: Start, SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:16:47]ike_sa_find: Not found SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } [Aug 8 22:16:47]ike_sa_find_half: Found half SA = { ee80c049 6e3ba3e6 - 00000000 00000000 } [Aug 8 22:16:47]ike_sa_upgrade: Start, SA = { ee80c049 6e3ba3e6 - 00000000 00000000 } -> { ... - 26571562 0e1b559b } [Aug 8 22:16:47]ike_st_i_sa_value: Start [Aug 8 22:16:47]ike_st_i_cr: Start [Aug 8 22:16:47]ike_st_i_cert: Start [Aug 8 22:16:47]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:16:47]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:16:47]ike_st_i_private: Start [Aug 8 22:16:47]ike_st_o_ke: Start [Aug 8 22:16:47]ike_st_o_nonce: Start [Aug 8 22:16:47]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:16:47]ike_st_o_private: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_send_packet: <-------- sending SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:16:47]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:16:47]ike_sa_find: Found SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } [Aug 8 22:16:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:47]ike_get_sa: Start, SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:16:47]ike_sa_find: Found SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } [Aug 8 22:16:47]ike_st_i_nonce: Start, nonce[0..16] = a17fb1bd e34abddc ... [Aug 8 22:16:47]ike_st_i_ke: Ke[0..128] = 030ade3a aea7fc82 ... [Aug 8 22:16:47]ike_st_i_cr: Start [Aug 8 22:16:47]ike_st_i_cert: Start [Aug 8 22:16:47]ike_st_i_private: Start [Aug 8 22:16:47]ike_st_o_id: Start [Aug 8 22:16:47]ike_st_o_hash: Start [Aug 8 22:16:47]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:16:47]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:16:47]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:16:47]ike_st_o_status_n: Start [Aug 8 22:16:47]ike_st_o_private: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:16:47]ike_send_packet: <-------- sending SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:16:47]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:16:47]ike_sa_find: Found SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } [Aug 8 22:16:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:16:47]ike_get_sa: Start, SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:16:47]ike_sa_find: Found SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } [Aug 8 22:16:47]ike_st_i_nonce: Start, nonce[0..16] = 715d3e43 afb9075e ... [Aug 8 22:16:47]ike_st_i_ke: Ke[0..128] = 06126e44 f7aebc1c ... [Aug 8 22:16:47]ike_st_i_cr: Start [Aug 8 22:16:47]ike_st_i_cert: Start [Aug 8 22:16:47]ike_st_i_private: Start [Aug 8 22:16:47]ike_st_o_id: Start [Aug 8 22:16:47]ike_st_o_hash: Start [Aug 8 22:16:47]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:16:47]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:16:47]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:16:47]ike_st_o_status_n: Start [Aug 8 22:16:47]ike_st_o_private: Start [Aug 8 22:16:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:16:47]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:16:47]ike_send_packet: <-------- sending SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:16:57]ike_retransmit_callback: Start, retransmit SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30}, nego = -1 [Aug 8 22:16:57]ike_send_packet: Start, retransmit previous packet SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:16:57]ike_retransmit_callback: Start, retransmit SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b}, nego = -1 [Aug 8 22:16:57]ike_send_packet: Start, retransmit previous packet SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:17:07]ike_retransmit_callback: Start, retransmit SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30}, nego = -1 [Aug 8 22:17:07]ike_send_packet: Start, retransmit previous packet SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:17:07]ike_retransmit_callback: Start, retransmit SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b}, nego = -1 [Aug 8 22:17:07]ike_send_packet: Start, retransmit previous packet SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:17:17]P1 SA 140228 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:17:17]Initiate IKE P1 SA 140228 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:17:17]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140228, ref cnt 2, status: Error ok [Aug 8 22:17:17]P1 SA 140229 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:17:17]Initiate IKE P1 SA 140229 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:17:17]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140229, ref cnt 2, status: Error ok [Aug 8 22:17:17]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:17:17]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:17:17]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:17:17]ike_sa_delete: Start, SA = { c3419fdf 771be0c8 - d3b02af5 cc3d0c30 } [Aug 8 22:17:17]173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { ee80c049 6e3ba3e6 - 26571562 0e1b559b [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:17:17]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:17:17]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:17:17]ike_sa_delete: Start, SA = { ee80c049 6e3ba3e6 - 26571562 0e1b559b } [Aug 8 22:17:17]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140229 [Aug 8 22:17:17] IKEv1 Error : Timeout [Aug 8 22:17:17]IPSec Rekey for SPI 0x0 failed [Aug 8 22:17:17]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:17:17]IKE SA delete called for p1 sa 140229 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:17:17]P1 SA 140229 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:17:17]iked_pm_p1_sa_destroy: p1 sa 140229 (ref cnt 0), waiting_for_del 0x104c480 [Aug 8 22:17:17]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140228 [Aug 8 22:17:17] IKEv1 Error : Timeout [Aug 8 22:17:17]IPSec Rekey for SPI 0x0 failed [Aug 8 22:17:17]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:17:17]IKE SA delete called for p1 sa 140228 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:17:17]P1 SA 140228 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:17:17]iked_pm_p1_sa_destroy: p1 sa 140228 (ref cnt 0), waiting_for_del 0x104c480 [Aug 8 22:17:17]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:17:17]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:17:17]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:17:17]ike_sa_allocate: Start, SA = { 254c469f 8f82e9bd - 00000000 00000000 } [Aug 8 22:17:17]ssh_ike_connect: SA = { 254c469f 8f82e9bd - 00000000 00000000}, nego = -1 [Aug 8 22:17:17]ike_st_o_sa_proposal: Start [Aug 8 22:17:17]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:17:17]ike_st_o_private: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_send_packet: <-------- sending SA = { 254c469f 8f82e9bd - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:17:17]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:17:17]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:17:17]ike_sa_allocate: Start, SA = { afb61cfe da713083 - 00000000 00000000 } [Aug 8 22:17:17]ssh_ike_connect: SA = { afb61cfe da713083 - 00000000 00000000}, nego = -1 [Aug 8 22:17:17]ike_st_o_sa_proposal: Start [Aug 8 22:17:17]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:17:17]ike_st_o_private: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_send_packet: <-------- sending SA = { afb61cfe da713083 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:17:17]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:17:17]ike_sa_find: Not found SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } [Aug 8 22:17:17]ikev2_packet_st_input_v1_create_sa: [1095400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:17:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:17]ike_get_sa: Start, SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:17:17]ike_sa_find: Not found SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } [Aug 8 22:17:17]ike_sa_find_half: Found half SA = { 254c469f 8f82e9bd - 00000000 00000000 } [Aug 8 22:17:17]ike_sa_upgrade: Start, SA = { 254c469f 8f82e9bd - 00000000 00000000 } -> { ... - ac12a0e9 1a4c857f } [Aug 8 22:17:17]ike_st_i_sa_value: Start [Aug 8 22:17:17]ike_st_i_cr: Start [Aug 8 22:17:17]ike_st_i_cert: Start [Aug 8 22:17:17]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:17:17]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:17:17]ike_st_i_private: Start [Aug 8 22:17:17]ike_st_o_ke: Start [Aug 8 22:17:17]ike_st_o_nonce: Start [Aug 8 22:17:17]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:17:17]ike_st_o_private: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_send_packet: <-------- sending SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:17:17]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:17:17]ike_sa_find: Not found SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } [Aug 8 22:17:17]ikev2_packet_st_input_v1_create_sa: [1095800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:17:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:17]ike_get_sa: Start, SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:17:17]ike_sa_find: Not found SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } [Aug 8 22:17:17]ike_sa_find_half: Found half SA = { afb61cfe da713083 - 00000000 00000000 } [Aug 8 22:17:17]ike_sa_upgrade: Start, SA = { afb61cfe da713083 - 00000000 00000000 } -> { ... - 9dec9303 b40f5d83 } [Aug 8 22:17:17]ike_st_i_sa_value: Start [Aug 8 22:17:17]ike_st_i_cr: Start [Aug 8 22:17:17]ike_st_i_cert: Start [Aug 8 22:17:17]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:17:17]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:17:17]ike_st_i_private: Start [Aug 8 22:17:17]ike_st_o_ke: Start [Aug 8 22:17:17]ike_st_o_nonce: Start [Aug 8 22:17:17]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:17:17]ike_st_o_private: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_send_packet: <-------- sending SA = { afb61cfe da713083 - 9dec9303 b40f5d83}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:17:17]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:17:17]ike_sa_find: Found SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } [Aug 8 22:17:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:17]ike_get_sa: Start, SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:17:17]ike_sa_find: Found SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } [Aug 8 22:17:17]ike_st_i_nonce: Start, nonce[0..16] = 9892025d 9f280539 ... [Aug 8 22:17:17]ike_st_i_ke: Ke[0..128] = da9860e2 e52599ea ... [Aug 8 22:17:17]ike_st_i_cr: Start [Aug 8 22:17:17]ike_st_i_cert: Start [Aug 8 22:17:17]ike_st_i_private: Start [Aug 8 22:17:17]ike_st_o_id: Start [Aug 8 22:17:17]ike_st_o_hash: Start [Aug 8 22:17:17]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:17:17]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:17:17]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:17:17]ike_st_o_status_n: Start [Aug 8 22:17:17]ike_st_o_private: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:17:17]ike_send_packet: <-------- sending SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:17:17]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:17:17]ike_sa_find: Found SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } [Aug 8 22:17:17]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:17]ike_get_sa: Start, SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:17:17]ike_sa_find: Found SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } [Aug 8 22:17:17]ike_st_i_nonce: Start, nonce[0..16] = 66018d62 7938cef9 ... [Aug 8 22:17:17]ike_st_i_ke: Ke[0..128] = a05de3a9 2620c6af ... [Aug 8 22:17:17]ike_st_i_cr: Start [Aug 8 22:17:17]ike_st_i_cert: Start [Aug 8 22:17:17]ike_st_i_private: Start [Aug 8 22:17:17]ike_st_o_id: Start [Aug 8 22:17:17]ike_st_o_hash: Start [Aug 8 22:17:17]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:17:17]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:17:17]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:17:17]ike_st_o_status_n: Start [Aug 8 22:17:17]ike_st_o_private: Start [Aug 8 22:17:17]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:17]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:17:17]ike_send_packet: <-------- sending SA = { afb61cfe da713083 - 9dec9303 b40f5d83}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:17:27]ike_retransmit_callback: Start, retransmit SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f}, nego = -1 [Aug 8 22:17:27]ike_send_packet: Start, retransmit previous packet SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:17:27]ike_retransmit_callback: Start, retransmit SA = { afb61cfe da713083 - 9dec9303 b40f5d83}, nego = -1 [Aug 8 22:17:27]ike_send_packet: Start, retransmit previous packet SA = { afb61cfe da713083 - 9dec9303 b40f5d83}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:17:37]ike_retransmit_callback: Start, retransmit SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f}, nego = -1 [Aug 8 22:17:37]ike_send_packet: Start, retransmit previous packet SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f}, nego = -1, dst = 52.87.109.64:4500 routing table id = 0 [Aug 8 22:17:37]ike_retransmit_callback: Start, retransmit SA = { afb61cfe da713083 - 9dec9303 b40f5d83}, nego = -1 [Aug 8 22:17:37]ike_send_packet: Start, retransmit previous packet SA = { afb61cfe da713083 - 9dec9303 b40f5d83}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:17:47]P1 SA 140230 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:17:47]Initiate IKE P1 SA 140230 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:17:47]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140230, ref cnt 2, status: Error ok [Aug 8 22:17:47]P1 SA 140231 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:17:47]Initiate IKE P1 SA 140231 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:17:47]iked_pm_ike_sa_delete_done_cb: For p1 sa index 140231, ref cnt 2, status: Error ok [Aug 8 22:17:47]173.161.47.145:4500 (Initiator) <-> 52.87.109.64:4500 { 254c469f 8f82e9bd - ac12a0e9 1a4c857f [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:17:47]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:17:47]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:17:47]ike_sa_delete: Start, SA = { 254c469f 8f82e9bd - ac12a0e9 1a4c857f } [Aug 8 22:17:47]173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { afb61cfe da713083 - 9dec9303 b40f5d83 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:17:47]ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:17:47]ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:17:47]ike_sa_delete: Start, SA = { afb61cfe da713083 - 9dec9303 b40f5d83 } [Aug 8 22:17:47]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140231 [Aug 8 22:17:47] IKEv1 Error : Timeout [Aug 8 22:17:47]IPSec Rekey for SPI 0x0 failed [Aug 8 22:17:47]IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:17:47]IKE SA delete called for p1 sa 140231 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:17:47]P1 SA 140231 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:17:47]iked_pm_p1_sa_destroy: p1 sa 140231 (ref cnt 0), waiting_for_del 0x10c5c60 [Aug 8 22:17:47]iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140230 [Aug 8 22:17:47] IKEv1 Error : Timeout [Aug 8 22:17:47]IPSec Rekey for SPI 0x0 failed [Aug 8 22:17:47]IPSec SA done callback called for sa-cfg vpn-60c3d501-1 local:173.161.47.145, remote:52.87.109.64 IKEv1 with status Timed out [Aug 8 22:17:47]IKE SA delete called for p1 sa 140230 (ref cnt 2) local:173.161.47.145, remote:52.87.109.64, IKEv1 [Aug 8 22:17:47]P1 SA 140230 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:17:47]iked_pm_p1_sa_destroy: p1 sa 140230 (ref cnt 0), waiting_for_del 0x10c5c00 [Aug 8 22:17:47]iked_deferred_free_inactive_peer_entry: Free 2 peer_entry(s) [Aug 8 22:17:47]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:17:47]ssh_ike_connect: Start, remote_name = 52.87.109.64:500, xchg = 2, flags = 00090000 [Aug 8 22:17:47]ike_sa_allocate: Start, SA = { a1f08f3e e10078d9 - 00000000 00000000 } [Aug 8 22:17:47]ssh_ike_connect: SA = { a1f08f3e e10078d9 - 00000000 00000000}, nego = -1 [Aug 8 22:17:47]ike_st_o_sa_proposal: Start [Aug 8 22:17:47]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:17:47]ike_st_o_private: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_send_packet: <-------- sending SA = { a1f08f3e e10078d9 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:17:47]iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:17:47]ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:17:47]ike_sa_allocate: Start, SA = { 6034a802 8b943e4c - 00000000 00000000 } [Aug 8 22:17:47]ssh_ike_connect: SA = { 6034a802 8b943e4c - 00000000 00000000}, nego = -1 [Aug 8 22:17:47]ike_st_o_sa_proposal: Start [Aug 8 22:17:47]ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:17:47]ike_st_o_private: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_send_packet: <-------- sending SA = { 6034a802 8b943e4c - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:17:47]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:17:47]ike_sa_find: Not found SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } [Aug 8 22:17:47]ikev2_packet_st_input_v1_create_sa: [1096400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:17:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:47]ike_get_sa: Start, SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:17:47]ike_sa_find: Not found SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } [Aug 8 22:17:47]ike_sa_find_half: Found half SA = { 6034a802 8b943e4c - 00000000 00000000 } [Aug 8 22:17:47]ike_sa_upgrade: Start, SA = { 6034a802 8b943e4c - 00000000 00000000 } -> { ... - 2396ffcb 41a92eb8 } [Aug 8 22:17:47]ike_st_i_sa_value: Start [Aug 8 22:17:47]ike_st_i_cr: Start [Aug 8 22:17:47]ike_st_i_cert: Start [Aug 8 22:17:47]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:17:47]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:17:47]ike_st_i_private: Start [Aug 8 22:17:47]ike_st_o_ke: Start [Aug 8 22:17:47]ike_st_o_nonce: Start [Aug 8 22:17:47]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:17:47]ike_st_o_private: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_send_packet: <-------- sending SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:17:47]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:17:47]ike_sa_find: Not found SA = { a1f08f3e e10078d9 - 232d5154 60653dab } [Aug 8 22:17:47]ikev2_packet_st_input_v1_create_sa: [1096800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:17:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:47]ike_get_sa: Start, SA = { a1f08f3e e10078d9 - 232d5154 60653dab } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:17:47]ike_sa_find: Not found SA = { a1f08f3e e10078d9 - 232d5154 60653dab } [Aug 8 22:17:47]ike_sa_find_half: Found half SA = { a1f08f3e e10078d9 - 00000000 00000000 } [Aug 8 22:17:47]ike_sa_upgrade: Start, SA = { a1f08f3e e10078d9 - 00000000 00000000 } -> { ... - 232d5154 60653dab } [Aug 8 22:17:47]ike_st_i_sa_value: Start [Aug 8 22:17:47]ike_st_i_cr: Start [Aug 8 22:17:47]ike_st_i_cert: Start [Aug 8 22:17:47]ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:17:47]ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:17:47]ike_st_i_private: Start [Aug 8 22:17:47]ike_st_o_ke: Start [Aug 8 22:17:47]ike_st_o_nonce: Start [Aug 8 22:17:47]ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:17:47]ike_st_o_private: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_send_packet: <-------- sending SA = { a1f08f3e e10078d9 - 232d5154 60653dab}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:500, routing table id = 0 [Aug 8 22:17:47]---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:17:47]ike_sa_find: Found SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } [Aug 8 22:17:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:47]ike_get_sa: Start, SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:17:47]ike_sa_find: Found SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } [Aug 8 22:17:47]ike_st_i_nonce: Start, nonce[0..16] = 3001b885 adc78edb ... [Aug 8 22:17:47]ike_st_i_ke: Ke[0..128] = 677e5fa4 542aa002 ... [Aug 8 22:17:47]ike_st_i_cr: Start [Aug 8 22:17:47]ike_st_i_cert: Start [Aug 8 22:17:47]ike_st_i_private: Start [Aug 8 22:17:47]ike_st_o_id: Start [Aug 8 22:17:47]ike_st_o_hash: Start [Aug 8 22:17:47]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:17:47]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:17:47]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:17:47]ike_st_o_status_n: Start [Aug 8 22:17:47]ike_st_o_private: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:17:47]ike_send_packet: <-------- sending SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:17:47]---------> Received from 52.87.109.64:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:17:47]ike_sa_find: Found SA = { a1f08f3e e10078d9 - 232d5154 60653dab } [Aug 8 22:17:47]ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:17:47]ike_get_sa: Start, SA = { a1f08f3e e10078d9 - 232d5154 60653dab } / 00000000, remote = 52.87.109.64:500 [Aug 8 22:17:47]ike_sa_find: Found SA = { a1f08f3e e10078d9 - 232d5154 60653dab } [Aug 8 22:17:47]ike_st_i_nonce: Start, nonce[0..16] = f410b3ae ae713a20 ... [Aug 8 22:17:47]ike_st_i_ke: Ke[0..128] = a20372af aea052d7 ... [Aug 8 22:17:47]ike_st_i_cr: Start [Aug 8 22:17:47]ike_st_i_cert: Start [Aug 8 22:17:47]ike_st_i_private: Start [Aug 8 22:17:47]ike_st_o_id: Start [Aug 8 22:17:47]ike_st_o_hash: Start [Aug 8 22:17:47]ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.87.109.64:500, id = No Id [Aug 8 22:17:47]ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:17:47]ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:17:47]ike_st_o_status_n: Start [Aug 8 22:17:47]ike_st_o_private: Start [Aug 8 22:17:47]ike_policy_reply_private_payload_out: Start [Aug 8 22:17:47]ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:17:47]ike_send_packet: <-------- sending SA = { a1f08f3e e10078d9 - 232d5154 60653dab}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.87.109.64:4500, routing table id = 0 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4820 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140233 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8}, nego = -1 [Aug 8 22:17:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4822 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140233 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8}, nego = -1 [Aug 8 22:18:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140233 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140233 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140233, ref cnt 2, status: Error ok [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4824 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 6034a802 8b943e4c - 2396ffcb 41a92eb8 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 6034a802 8b943e4c - 2396ffcb 41a92eb8 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140233 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140233 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140233 stop timer. timer duration 30, reason 0. [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140233 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140233 (ref cnt 0), waiting_for_del 0x104c4c0 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140233 from peer entry 0x114a200 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140235 start timer. timer duration 30, reason 1. [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140235 in peer entry 0x114a200 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 7deac0f8 05addf5c - 00000000 00000000 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 7deac0f8 05addf5c - 00000000 00000000}, nego = -1 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 7deac0f8 05addf5c - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [1097800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 7deac0f8 05addf5c - 00000000 00000000 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 7deac0f8 05addf5c - 00000000 00000000 } -> { ... - f60748ad ea238a94 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2907] [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 7deac0f8 05addf5c - f60748ad ea238a94}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 9269a5b8 a9ebf6cc ... [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = efbfcfe2 c6cd82fe ... [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2592] [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:18:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 7deac0f8 05addf5c - f60748ad ea238a94}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4826 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140235 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 7deac0f8 05addf5c - f60748ad ea238a94}, nego = -1 [Aug 8 22:18:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 7deac0f8 05addf5c - f60748ad ea238a94}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4828 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140235 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 7deac0f8 05addf5c - f60748ad ea238a94}, nego = -1 [Aug 8 22:18:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 7deac0f8 05addf5c - f60748ad ea238a94}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4830 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140235 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140235 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140235, ref cnt 2, status: Error ok [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 7deac0f8 05addf5c - f60748ad ea238a94 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 7deac0f8 05addf5c - f60748ad ea238a94 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140235 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140235 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140235 stop timer. timer duration 30, reason 0. [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140235 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140235 (ref cnt 0), waiting_for_del 0x10c5c60 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140235 from peer entry 0x114a200 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140237 start timer. timer duration 30, reason 1. [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140237 in peer entry 0x114a200 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 2b12a8a6 8c1c638f - 00000000 00000000 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 2b12a8a6 8c1c638f - 00000000 00000000}, nego = -1 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2b12a8a6 8c1c638f - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [1098800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 2b12a8a6 8c1c638f - 00000000 00000000 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 2b12a8a6 8c1c638f - 00000000 00000000 } -> { ... - 9b2f6d1b 7ae4c218 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2876] [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 4d23feb8 95d74dfc ... [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 3c8ed487 774a4d83 ... [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2612] [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:18:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:18:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:18:57][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:18:57][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:18:57][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218}, nego = -1 [Aug 8 22:18:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4832 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140237 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218}, nego = -1 [Aug 8 22:19:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4834 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140237 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140237 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140237 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140237, ref cnt 2, status: Error ok [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 2b12a8a6 8c1c638f - 9b2f6d1b 7ae4c218 } [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140237 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140237 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140237 stop timer. timer duration 30, reason 0. [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140237 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140237 (ref cnt 0), waiting_for_del 0x104c4c0 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140237 from peer entry 0x114a200 [Aug 8 22:19:17][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4836 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140239 start timer. timer duration 30, reason 1. [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140239 in peer entry 0x114a400 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 70d4a319 3aac326c - 00000000 00000000 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 70d4a319 3aac326c - 00000000 00000000}, nego = -1 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 70d4a319 3aac326c - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [1099800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 70d4a319 3aac326c - 00000000 00000000 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 70d4a319 3aac326c - 00000000 00000000 } -> { ... - 46ec3e65 d890b613 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3430] [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 70d4a319 3aac326c - 46ec3e65 d890b613}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 3c0cf7aa 3d1a5757 ... [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = d221b241 84374adc ... [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2626] [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:19:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 70d4a319 3aac326c - 46ec3e65 d890b613}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4838 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140239 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 70d4a319 3aac326c - 46ec3e65 d890b613}, nego = -1 [Aug 8 22:19:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 70d4a319 3aac326c - 46ec3e65 d890b613}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4840 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140239 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 70d4a319 3aac326c - 46ec3e65 d890b613}, nego = -1 [Aug 8 22:19:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 70d4a319 3aac326c - 46ec3e65 d890b613}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140239 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140239 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140239, ref cnt 2, status: Error ok [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 70d4a319 3aac326c - 46ec3e65 d890b613 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 70d4a319 3aac326c - 46ec3e65 d890b613 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140239 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140239 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140239 stop timer. timer duration 30, reason 0. [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140239 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140239 (ref cnt 0), waiting_for_del 0x10c5c40 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140239 from peer entry 0x114a400 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4842 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140241 start timer. timer duration 30, reason 1. [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140241 in peer entry 0x114a400 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 94bc2b1c 340a2484 - 00000000 00000000 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 94bc2b1c 340a2484 - 00000000 00000000}, nego = -1 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 94bc2b1c 340a2484 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [109a000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 94bc2b1c 340a2484 - 00000000 00000000 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 94bc2b1c 340a2484 - 00000000 00000000 } -> { ... - b64ec27e 95990199 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3504] [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 94bc2b1c 340a2484 - b64ec27e 95990199}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 79f62322 80a6a095 ... [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = dbf54706 fd00d5c1 ... [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2658] [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:19:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 94bc2b1c 340a2484 - b64ec27e 95990199}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4844 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140241 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 94bc2b1c 340a2484 - b64ec27e 95990199}, nego = -1 [Aug 8 22:20:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 94bc2b1c 340a2484 - b64ec27e 95990199}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4846 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140241 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 94bc2b1c 340a2484 - b64ec27e 95990199}, nego = -1 [Aug 8 22:20:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 94bc2b1c 340a2484 - b64ec27e 95990199}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140241 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140241 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140241, ref cnt 2, status: Error ok [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 94bc2b1c 340a2484 - b64ec27e 95990199 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 94bc2b1c 340a2484 - b64ec27e 95990199 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140241 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140241 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140241 stop timer. timer duration 30, reason 0. [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140241 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140241 (ref cnt 0), waiting_for_del 0x1160620 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140241 from peer entry 0x114a400 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4848 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140243 start timer. timer duration 30, reason 1. [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140243 in peer entry 0x114a400 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { c4bcc77a a7461b4b - 00000000 00000000 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { c4bcc77a a7461b4b - 00000000 00000000}, nego = -1 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { c4bcc77a a7461b4b - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [109b400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { c4bcc77a a7461b4b - 00000000 00000000 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { c4bcc77a a7461b4b - 00000000 00000000 } -> { ... - 21a055a2 89e85309 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6077] [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { c4bcc77a a7461b4b - 21a055a2 89e85309}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = b176ba0b 3db59685 ... [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 26a6af98 3c82ee23 ... [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2607] [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:20:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { c4bcc77a a7461b4b - 21a055a2 89e85309}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4850 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140243 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { c4bcc77a a7461b4b - 21a055a2 89e85309}, nego = -1 [Aug 8 22:20:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { c4bcc77a a7461b4b - 21a055a2 89e85309}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:20:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:20:47][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:20:47][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:20:47][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { c4bcc77a a7461b4b - 21a055a2 89e85309}, nego = -1 [Aug 8 22:20:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { c4bcc77a a7461b4b - 21a055a2 89e85309}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140243 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140243 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140243, ref cnt 2, status: Error ok [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { c4bcc77a a7461b4b - 21a055a2 89e85309 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { c4bcc77a a7461b4b - 21a055a2 89e85309 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140243 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140243 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140243 stop timer. timer duration 30, reason 0. [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140243 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140243 (ref cnt 0), waiting_for_del 0x1160560 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140243 from peer entry 0x114a400 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4852 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140245 start timer. timer duration 30, reason 1. [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140245 in peer entry 0x114a400 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 39cd3af4 73726959 - 00000000 00000000 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 39cd3af4 73726959 - 00000000 00000000}, nego = -1 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 39cd3af4 73726959 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [109c400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 39cd3af4 73726959 - 00000000 00000000 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 39cd3af4 73726959 - 00000000 00000000 } -> { ... - 67890545 2ebd4c87 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3528] [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 39cd3af4 73726959 - 67890545 2ebd4c87}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = af43c3e1 1adaa54d ... [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = ea320967 9f44bb17 ... [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2577] [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:20:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 39cd3af4 73726959 - 67890545 2ebd4c87}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4854 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140245 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 39cd3af4 73726959 - 67890545 2ebd4c87}, nego = -1 [Aug 8 22:21:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 39cd3af4 73726959 - 67890545 2ebd4c87}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4856 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140245 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 39cd3af4 73726959 - 67890545 2ebd4c87}, nego = -1 [Aug 8 22:21:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 39cd3af4 73726959 - 67890545 2ebd4c87}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140245 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140245 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140245, ref cnt 2, status: Error ok [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 39cd3af4 73726959 - 67890545 2ebd4c87 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 39cd3af4 73726959 - 67890545 2ebd4c87 } [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140245 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140245 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140245 stop timer. timer duration 30, reason 0. [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140245 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140245 (ref cnt 0), waiting_for_del 0x104c540 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140245 from peer entry 0x114a400 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4858 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140247 start timer. timer duration 30, reason 1. [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140247 in peer entry 0x114a400 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 8ac13c9c d46ac8ac - 00000000 00000000 } [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 8ac13c9c d46ac8ac - 00000000 00000000}, nego = -1 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 8ac13c9c d46ac8ac - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [109d400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 8ac13c9c d46ac8ac - 00000000 00000000 } [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 8ac13c9c d46ac8ac - 00000000 00000000 } -> { ... - 5e90375f 5403c4fc } [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2841] [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:21:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 925aebb4 7aa58697 ... [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 9a65bf49 bf63a1bf ... [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2601] [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:21:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4860 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140247 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:38][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc}, nego = -1 [Aug 8 22:21:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4862 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140247 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:48][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc}, nego = -1 [Aug 8 22:21:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140247 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140247 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140247, ref cnt 2, status: Error ok [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 8ac13c9c d46ac8ac - 5e90375f 5403c4fc } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140247 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140247 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140247 stop timer. timer duration 30, reason 0. [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140247 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140247 (ref cnt 0), waiting_for_del 0x10c5c60 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140247 from peer entry 0x114a400 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4864 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140249 start timer. timer duration 30, reason 1. [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140249 in peer entry 0x114a400 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { d893afa9 84335adb - 00000000 00000000 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { d893afa9 84335adb - 00000000 00000000}, nego = -1 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { d893afa9 84335adb - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [109e400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { d893afa9 84335adb - 00000000 00000000 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { d893afa9 84335adb - 00000000 00000000 } -> { ... - b1d4b10f 640c35d4 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3259] [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { d893afa9 84335adb - b1d4b10f 640c35d4}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 6d24a74f fb534eef ... [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 839aa9fd f54d9b99 ... [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2593] [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:21:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { d893afa9 84335adb - b1d4b10f 640c35d4}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4866 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140249 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { d893afa9 84335adb - b1d4b10f 640c35d4}, nego = -1 [Aug 8 22:22:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { d893afa9 84335adb - b1d4b10f 640c35d4}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4868 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140249 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { d893afa9 84335adb - b1d4b10f 640c35d4}, nego = -1 [Aug 8 22:22:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { d893afa9 84335adb - b1d4b10f 640c35d4}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140249 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140249 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140249, ref cnt 2, status: Error ok [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { d893afa9 84335adb - b1d4b10f 640c35d4 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { d893afa9 84335adb - b1d4b10f 640c35d4 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140249 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140249 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140249 stop timer. timer duration 30, reason 0. [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140249 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140249 (ref cnt 0), waiting_for_del 0x104c540 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140249 from peer entry 0x114a400 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4870 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140251 start timer. timer duration 30, reason 1. [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140251 in peer entry 0x114a400 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { dc3a091a 0337ce34 - 00000000 00000000 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { dc3a091a 0337ce34 - 00000000 00000000}, nego = -1 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { dc3a091a 0337ce34 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [109f400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { dc3a091a 0337ce34 - 00000000 00000000 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { dc3a091a 0337ce34 - 00000000 00000000 } -> { ... - 294ebcb5 6b97bfe9 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2848] [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = e3f85667 e315642b ... [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = dab35abe ef1e1b94 ... [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2592] [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:22:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:22:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:22:37][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:22:37][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:22:37][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9}, nego = -1 [Aug 8 22:22:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4872 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140251 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9}, nego = -1 [Aug 8 22:22:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140251 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140251 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140251, ref cnt 2, status: Error ok [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4874 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { dc3a091a 0337ce34 - 294ebcb5 6b97bfe9 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140251 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140251 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140251 stop timer. timer duration 30, reason 0. [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140251 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140251 (ref cnt 0), waiting_for_del 0x1160560 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140251 from peer entry 0x114a400 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140253 start timer. timer duration 30, reason 1. [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140253 in peer entry 0x114a400 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 2342ecc3 b53c348e - 00000000 00000000 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 2342ecc3 b53c348e - 00000000 00000000}, nego = -1 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2342ecc3 b53c348e - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a0400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 2342ecc3 b53c348e - 00000000 00000000 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 2342ecc3 b53c348e - 00000000 00000000 } -> { ... - e63240c6 296e2ad3 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2881] [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 4bab4ed7 540b7f26 ... [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = d4905fcc 5605cad1 ... [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2634] [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:22:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4876 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140253 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3}, nego = -1 [Aug 8 22:23:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4878 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140253 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3}, nego = -1 [Aug 8 22:23:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4880 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140253 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140253 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140253, ref cnt 2, status: Error ok [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 2342ecc3 b53c348e - e63240c6 296e2ad3 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 2342ecc3 b53c348e - e63240c6 296e2ad3 } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140253 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140253 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140253 stop timer. timer duration 30, reason 0. [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140253 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140253 (ref cnt 0), waiting_for_del 0x1160540 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140253 from peer entry 0x114a400 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140255 start timer. timer duration 30, reason 1. [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140255 in peer entry 0x114a400 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { b731e29b f24df067 - 00000000 00000000 } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { b731e29b f24df067 - 00000000 00000000}, nego = -1 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { b731e29b f24df067 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { b731e29b f24df067 - 45159127 c76d9c5b } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a1400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { b731e29b f24df067 - 45159127 c76d9c5b } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { b731e29b f24df067 - 45159127 c76d9c5b } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { b731e29b f24df067 - 00000000 00000000 } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { b731e29b f24df067 - 00000000 00000000 } -> { ... - 45159127 c76d9c5b } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2972] [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { b731e29b f24df067 - 45159127 c76d9c5b}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { b731e29b f24df067 - 45159127 c76d9c5b } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { b731e29b f24df067 - 45159127 c76d9c5b } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { b731e29b f24df067 - 45159127 c76d9c5b } [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = e5a096eb 46fe9c16 ... [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 794fd9fc b5194923 ... [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2616] [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:23:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { b731e29b f24df067 - 45159127 c76d9c5b}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4882 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140255 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { b731e29b f24df067 - 45159127 c76d9c5b}, nego = -1 [Aug 8 22:23:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { b731e29b f24df067 - 45159127 c76d9c5b}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4884 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140255 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:48][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { b731e29b f24df067 - 45159127 c76d9c5b}, nego = -1 [Aug 8 22:23:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { b731e29b f24df067 - 45159127 c76d9c5b}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4886 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140255 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140255 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140255, ref cnt 2, status: Error ok [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { b731e29b f24df067 - 45159127 c76d9c5b [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { b731e29b f24df067 - 45159127 c76d9c5b } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140255 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140255 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140255 stop timer. timer duration 30, reason 0. [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140255 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140255 (ref cnt 0), waiting_for_del 0x1160560 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140255 from peer entry 0x114a400 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140257 start timer. timer duration 30, reason 1. [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140257 in peer entry 0x114a400 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { a1175362 d017eeb8 - 00000000 00000000 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { a1175362 d017eeb8 - 00000000 00000000}, nego = -1 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { a1175362 d017eeb8 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a2400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { a1175362 d017eeb8 - 00000000 00000000 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { a1175362 d017eeb8 - 00000000 00000000 } -> { ... - e7d68411 f054ec19 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2840] [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { a1175362 d017eeb8 - e7d68411 f054ec19}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 39235307 03670c21 ... [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 040239fa 14d025d7 ... [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2591] [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:23:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { a1175362 d017eeb8 - e7d68411 f054ec19}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4888 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140257 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { a1175362 d017eeb8 - e7d68411 f054ec19}, nego = -1 [Aug 8 22:24:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { a1175362 d017eeb8 - e7d68411 f054ec19}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4890 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140257 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { a1175362 d017eeb8 - e7d68411 f054ec19}, nego = -1 [Aug 8 22:24:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { a1175362 d017eeb8 - e7d68411 f054ec19}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140257 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140257 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140257, ref cnt 2, status: Error ok [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { a1175362 d017eeb8 - e7d68411 f054ec19 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { a1175362 d017eeb8 - e7d68411 f054ec19 } [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140257 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140257 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140257 stop timer. timer duration 30, reason 0. [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140257 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140257 (ref cnt 0), waiting_for_del 0x10c5c00 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140257 from peer entry 0x114a400 [Aug 8 22:24:27][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4892 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140259 start timer. timer duration 30, reason 1. [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140259 in peer entry 0x114a400 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 53828759 54f78635 - 00000000 00000000 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 53828759 54f78635 - 00000000 00000000}, nego = -1 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 53828759 54f78635 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a3400/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 53828759 54f78635 - 00000000 00000000 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 53828759 54f78635 - 00000000 00000000 } -> { ... - 59155f9f 3c4ec758 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2853] [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 53828759 54f78635 - 59155f9f 3c4ec758}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 25073975 a0ad63f2 ... [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 53b4eca8 59389ffe ... [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2732] [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:24:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 53828759 54f78635 - 59155f9f 3c4ec758}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4894 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140259 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 53828759 54f78635 - 59155f9f 3c4ec758}, nego = -1 [Aug 8 22:24:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 53828759 54f78635 - 59155f9f 3c4ec758}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4896 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140259 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 53828759 54f78635 - 59155f9f 3c4ec758}, nego = -1 [Aug 8 22:24:57][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 53828759 54f78635 - 59155f9f 3c4ec758}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140259 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140259 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140259, ref cnt 2, status: Error ok [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 53828759 54f78635 - 59155f9f 3c4ec758 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 53828759 54f78635 - 59155f9f 3c4ec758 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140259 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140259 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140259 stop timer. timer duration 30, reason 0. [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140259 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140259 (ref cnt 0), waiting_for_del 0x104c4c0 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140259 from peer entry 0x114a400 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4898 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140261 start timer. timer duration 30, reason 1. [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140261 in peer entry 0x114a400 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 69991919 6536066f - 00000000 00000000 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 69991919 6536066f - 00000000 00000000}, nego = -1 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 69991919 6536066f - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 69991919 6536066f - d7614ff2 711adc84 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a4000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 69991919 6536066f - d7614ff2 711adc84 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 69991919 6536066f - d7614ff2 711adc84 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 69991919 6536066f - 00000000 00000000 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 69991919 6536066f - 00000000 00000000 } -> { ... - d7614ff2 711adc84 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3500] [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 69991919 6536066f - d7614ff2 711adc84}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 69991919 6536066f - d7614ff2 711adc84 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 69991919 6536066f - d7614ff2 711adc84 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 69991919 6536066f - d7614ff2 711adc84 } [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = d9f5e413 d74a5a7b ... [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 409168ff 9c1a73ef ... [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:25:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2618] [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:25:08][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 69991919 6536066f - d7614ff2 711adc84}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4900 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140261 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:18][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 69991919 6536066f - d7614ff2 711adc84}, nego = -1 [Aug 8 22:25:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 69991919 6536066f - d7614ff2 711adc84}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4902 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140261 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:28][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 69991919 6536066f - d7614ff2 711adc84}, nego = -1 [Aug 8 22:25:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 69991919 6536066f - d7614ff2 711adc84}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140261 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140261 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140261, ref cnt 2, status: Error ok [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4904 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 69991919 6536066f - d7614ff2 711adc84 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 69991919 6536066f - d7614ff2 711adc84 } [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140261 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140261 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140261 stop timer. timer duration 30, reason 0. [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140261 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140261 (ref cnt 0), waiting_for_del 0x11605a0 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140261 from peer entry 0x114a400 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140263 start timer. timer duration 30, reason 1. [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140263 in peer entry 0x114a400 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { d70d3be0 861af6c1 - 00000000 00000000 } [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { d70d3be0 861af6c1 - 00000000 00000000}, nego = -1 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { d70d3be0 861af6c1 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a5000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { d70d3be0 861af6c1 - 00000000 00000000 } [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { d70d3be0 861af6c1 - 00000000 00000000 } -> { ... - 9f59665a a6d2ff74 } [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2823] [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:25:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 89cf2ad1 54cf5e52 ... [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 2d1043ab 0cfc9dd5 ... [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2630] [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:25:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4906 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140263 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:48][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74}, nego = -1 [Aug 8 22:25:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4908 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140263 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:25:58][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74}, nego = -1 [Aug 8 22:25:58][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4910 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140263 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140263 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140263, ref cnt 2, status: Error ok [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { d70d3be0 861af6c1 - 9f59665a a6d2ff74 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { d70d3be0 861af6c1 - 9f59665a a6d2ff74 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140263 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140263 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140263 stop timer. timer duration 30, reason 0. [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140263 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140263 (ref cnt 0), waiting_for_del 0x11605c0 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140263 from peer entry 0x114a400 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140265 start timer. timer duration 30, reason 1. [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140265 in peer entry 0x114a400 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 600dfb47 d4404968 - 00000000 00000000 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 600dfb47 d4404968 - 00000000 00000000}, nego = -1 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 600dfb47 d4404968 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a6000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 600dfb47 d4404968 - 00000000 00000000 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 600dfb47 d4404968 - 00000000 00000000 } -> { ... - df3edc05 a5c46c23 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3042] [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 600dfb47 d4404968 - df3edc05 a5c46c23}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 13396dc1 1b8584dc ... [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 607b8a1f 605074e5 ... [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2638] [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:26:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 600dfb47 d4404968 - df3edc05 a5c46c23}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:26:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:26:17][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:26:17][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:26:18][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 600dfb47 d4404968 - df3edc05 a5c46c23}, nego = -1 [Aug 8 22:26:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 600dfb47 d4404968 - df3edc05 a5c46c23}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4912 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140265 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:28][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 600dfb47 d4404968 - df3edc05 a5c46c23}, nego = -1 [Aug 8 22:26:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 600dfb47 d4404968 - df3edc05 a5c46c23}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4914 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140265 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140265 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140265, ref cnt 2, status: Error ok [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 600dfb47 d4404968 - df3edc05 a5c46c23 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 600dfb47 d4404968 - df3edc05 a5c46c23 } [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140265 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140265 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140265 stop timer. timer duration 30, reason 0. [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140265 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140265 (ref cnt 0), waiting_for_del 0x11605c0 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140265 from peer entry 0x114a400 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140267 start timer. timer duration 30, reason 1. [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140267 in peer entry 0x114a400 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 8b518b1d 1bf9e0a2 - 00000000 00000000 } [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 8b518b1d 1bf9e0a2 - 00000000 00000000}, nego = -1 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 8b518b1d 1bf9e0a2 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a7000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 8b518b1d 1bf9e0a2 - 00000000 00000000 } [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 8b518b1d 1bf9e0a2 - 00000000 00000000 } -> { ... - 09dcc85b fcd03323 } [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2887] [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:26:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 13ed24ea 6fcd0883 ... [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 570c6715 502095fc ... [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2662] [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:26:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4916 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140267 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:48][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323}, nego = -1 [Aug 8 22:26:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4918 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140267 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:26:58][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323}, nego = -1 [Aug 8 22:26:58][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4920 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140267 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140267 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140267, ref cnt 2, status: Error ok [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 8b518b1d 1bf9e0a2 - 09dcc85b fcd03323 } [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140267 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140267 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140267 stop timer. timer duration 30, reason 0. [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140267 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140267 (ref cnt 0), waiting_for_del 0x104c4c0 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140267 from peer entry 0x114a400 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140269 start timer. timer duration 30, reason 1. [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140269 in peer entry 0x114a200 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 0a61ed7a 77cb9a89 - 00000000 00000000 } [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 0a61ed7a 77cb9a89 - 00000000 00000000}, nego = -1 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 0a61ed7a 77cb9a89 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a8000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 0a61ed7a 77cb9a89 - 00000000 00000000 } [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 0a61ed7a 77cb9a89 - 00000000 00000000 } -> { ... - 7d930b04 9ad08ad1 } [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2855] [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:27:07][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 3d0fbdf9 a178a177 ... [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 559455f3 ed16f27c ... [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2599] [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:27:08][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4922 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140269 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:18][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1}, nego = -1 [Aug 8 22:27:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4924 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140269 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:28][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1}, nego = -1 [Aug 8 22:27:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140269 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140269 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140269, ref cnt 2, status: Error ok [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4926 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 0a61ed7a 77cb9a89 - 7d930b04 9ad08ad1 } [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140269 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140269 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140269 stop timer. timer duration 30, reason 0. [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140269 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140269 (ref cnt 0), waiting_for_del 0x10c5c40 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140269 from peer entry 0x114a200 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140271 start timer. timer duration 30, reason 1. [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140271 in peer entry 0x114a400 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { c1036832 a57cea4b - 00000000 00000000 } [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { c1036832 a57cea4b - 00000000 00000000}, nego = -1 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { c1036832 a57cea4b - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10a9000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { c1036832 a57cea4b - 00000000 00000000 } [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { c1036832 a57cea4b - 00000000 00000000 } -> { ... - 5e0cef66 6e8321b4 } [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2932] [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:27:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 8077ea07 7a227fd0 ... [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 7fdadc9c 18cc8fec ... [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2684] [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:27:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4928 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140271 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:48][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4}, nego = -1 [Aug 8 22:27:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4930 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140271 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:27:58][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4}, nego = -1 [Aug 8 22:27:58][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140271 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140271 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140271, ref cnt 2, status: Error ok [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { c1036832 a57cea4b - 5e0cef66 6e8321b4 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { c1036832 a57cea4b - 5e0cef66 6e8321b4 } [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140271 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140271 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140271 stop timer. timer duration 30, reason 0. [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140271 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140271 (ref cnt 0), waiting_for_del 0x10c5c40 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140271 from peer entry 0x114a400 [Aug 8 22:28:07][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4932 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140273 start timer. timer duration 30, reason 1. [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140273 in peer entry 0x114a400 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 69c43008 61002491 - 00000000 00000000 } [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 69c43008 61002491 - 00000000 00000000}, nego = -1 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 69c43008 61002491 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 69c43008 61002491 - f79543ab 3209ec10 } [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10aa000/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 69c43008 61002491 - f79543ab 3209ec10 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 69c43008 61002491 - f79543ab 3209ec10 } [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 69c43008 61002491 - 00000000 00000000 } [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 69c43008 61002491 - 00000000 00000000 } -> { ... - f79543ab 3209ec10 } [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3000] [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:28:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 69c43008 61002491 - f79543ab 3209ec10}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4934 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140273 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 69c43008 61002491 - f79543ab 3209ec10}, nego = -1 [Aug 8 22:28:27][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 69c43008 61002491 - f79543ab 3209ec10}, nego = -1, dst = 52.206.202.16:500 routing table id = 0 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4936 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140273 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 69c43008 61002491 - f79543ab 3209ec10}, nego = -1 [Aug 8 22:28:37][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 69c43008 61002491 - f79543ab 3209ec10}, nego = -1, dst = 52.206.202.16:500 routing table id = 0 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140273 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140273 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140273, ref cnt 2, status: Error ok [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:500 (Initiator) <-> 52.206.202.16:500 { 69c43008 61002491 - f79543ab 3209ec10 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140273 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 69c43008 61002491 - f79543ab 3209ec10 } [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140273 (ref cnt 1) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140273 stop timer. timer duration 30, reason 0. [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140273 (ref cnt 0), waiting_for_del 0x0 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140273 from peer entry 0x114a400 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4938 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a400 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140275 start timer. timer duration 30, reason 1. [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140275 in peer entry 0x114a400 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f000 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 2e1e2c68 9fb103df - 00000000 00000000 } [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 2e1e2c68 9fb103df - 00000000 00000000}, nego = -1 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2e1e2c68 9fb103df - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10aac00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 2e1e2c68 9fb103df - 00000000 00000000 } [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 2e1e2c68 9fb103df - 00000000 00000000 } -> { ... - acce5b0b 1c9c3b08 } [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2810] [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:28:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 7fbe9c30 2e4ec37e ... [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = f3392f6a e930428b ... [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2605] [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:28:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4940 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140275 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:28:58][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08}, nego = -1 [Aug 8 22:28:58][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4942 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140275 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:08][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08}, nego = -1 [Aug 8 22:29:08][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140275 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140275 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140275, ref cnt 2, status: Error ok [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4944 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f000 has still 1 references [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 2e1e2c68 9fb103df - acce5b0b 1c9c3b08 } [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140275 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140275 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140275 stop timer. timer duration 30, reason 0. [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140275 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f000 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140275 (ref cnt 0), waiting_for_del 0x10c5be0 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140275 from peer entry 0x114a400 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a400 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140277 start timer. timer duration 30, reason 1. [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140277 in peer entry 0x114a200 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { a4b9fd87 9b61f75f - 00000000 00000000 } [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { a4b9fd87 9b61f75f - 00000000 00000000}, nego = -1 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { a4b9fd87 9b61f75f - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10abc00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { a4b9fd87 9b61f75f - 00000000 00000000 } [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { a4b9fd87 9b61f75f - 00000000 00000000 } -> { ... - f571e0af 84815e0f } [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2929] [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:29:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 3012fb60 aaa0e015 ... [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 52a4ee4a 775863b0 ... [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2575] [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:29:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4946 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140277 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:28][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f}, nego = -1 [Aug 8 22:29:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4948 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140277 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:38][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f}, nego = -1 [Aug 8 22:29:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4950 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140277 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140277 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140277, ref cnt 2, status: Error ok [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { a4b9fd87 9b61f75f - f571e0af 84815e0f [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { a4b9fd87 9b61f75f - f571e0af 84815e0f } [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140277 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140277 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140277 stop timer. timer duration 30, reason 0. [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140277 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140277 (ref cnt 0), waiting_for_del 0x10c5c00 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140277 from peer entry 0x114a200 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140279 start timer. timer duration 30, reason 1. [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140279 in peer entry 0x114a200 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 86145e07 bea3f585 - 00000000 00000000 } [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 86145e07 bea3f585 - 00000000 00000000}, nego = -1 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 86145e07 bea3f585 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10acc00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 86145e07 bea3f585 - 00000000 00000000 } [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 86145e07 bea3f585 - 00000000 00000000 } -> { ... - d5e78f87 a8c6af85 } [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2832] [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:29:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 14147d7d a75135e1 ... [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 612ccd3e 4ac11f31 ... [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2645] [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:29:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:29:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:29:57][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:29:57][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:29:58][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85}, nego = -1 [Aug 8 22:29:58][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4952 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140279 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:08][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85}, nego = -1 [Aug 8 22:30:08][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4954 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140279 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140279 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140279, ref cnt 2, status: Error ok [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 86145e07 bea3f585 - d5e78f87 a8c6af85 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 86145e07 bea3f585 - d5e78f87 a8c6af85 } [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140279 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140279 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140279 stop timer. timer duration 30, reason 0. [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140279 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140279 (ref cnt 0), waiting_for_del 0x10c5c60 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140279 from peer entry 0x114a200 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140281 start timer. timer duration 30, reason 1. [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140281 in peer entry 0x114a200 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { b33be5b3 9e3544f6 - 00000000 00000000 } [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { b33be5b3 9e3544f6 - 00000000 00000000}, nego = -1 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { b33be5b3 9e3544f6 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10adc00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { b33be5b3 9e3544f6 - 00000000 00000000 } [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { b33be5b3 9e3544f6 - 00000000 00000000 } -> { ... - 83160bfa e3a983ce } [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:30:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2880] [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = d0b3cd9a fc3afbb6 ... [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 594453a2 c28d12ef ... [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [3248] [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:30:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4956 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140281 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:28][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce}, nego = -1 [Aug 8 22:30:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4958 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140281 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:38][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce}, nego = -1 [Aug 8 22:30:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4960 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140281 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140281 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140281, ref cnt 2, status: Error ok [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { b33be5b3 9e3544f6 - 83160bfa e3a983ce [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { b33be5b3 9e3544f6 - 83160bfa e3a983ce } [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140281 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140281 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140281 stop timer. timer duration 30, reason 0. [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140281 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140281 (ref cnt 0), waiting_for_del 0x10c5ca0 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140281 from peer entry 0x114a200 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140283 start timer. timer duration 30, reason 1. [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140283 in peer entry 0x114a200 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 5378777d a1c0ae88 - 00000000 00000000 } [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 5378777d a1c0ae88 - 00000000 00000000}, nego = -1 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 5378777d a1c0ae88 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10aec00/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 5378777d a1c0ae88 - 00000000 00000000 } [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 5378777d a1c0ae88 - 00000000 00000000 } -> { ... - a780ca56 fe0006a3 } [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [3159] [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:30:47][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = e5763669 bdcf6cc3 ... [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = 9ac70abc 790123f2 ... [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2602] [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:30:48][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4962 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:57][173.161.47.145 <-> 52.206.202.16] P1 SA 140283 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:30:58][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3}, nego = -1 [Aug 8 22:30:58][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4964 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:07][173.161.47.145 <-> 52.206.202.16] P1 SA 140283 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:08][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3}, nego = -1 [Aug 8 22:31:08][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140283 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140283 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140283, ref cnt 2, status: Error ok [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4966 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 5378777d a1c0ae88 - a780ca56 fe0006a3 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 5378777d a1c0ae88 - a780ca56 fe0006a3 } [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140283 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140283 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140283 stop timer. timer duration 30, reason 0. [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140283 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140283 (ref cnt 0), waiting_for_del 0x104c4c0 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140283 from peer entry 0x114a200 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_create_peer_entry: Created peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_fetch_or_create_peer_entry: Create peer entry 0x114a200 for local 173.161.47.145:500 remote 52.206.202.16:500. gw gw-vpn-60c3d501-2, VR id 0 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] Initiating new P1 SA for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] P1 SA 140285 start timer. timer duration 30, reason 1. [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=vpn-60c3d501-2 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_peer_insert_p1sa_entry: Insert p1 sa 140285 in peer entry 0x114a200 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 115f800 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_spd_notify_request: Sending Initial contact [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] IKE SA fill called for negotiation of local:173.161.47.145, remote:52.206.202.16 IKEv1 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: Start, remote_name = 52.206.202.16:500, xchg = 2, flags = 00090000 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_sa_allocate: Start, SA = { 45a89384 6921f9e1 - 00000000 00000000 } [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ssh_ike_connect: SA = { 45a89384 6921f9e1 - 00000000 00000000}, nego = -1 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_sa_proposal: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_vendor_ids: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM SA I (3) [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 45a89384 6921f9e1 - 00000000 00000000}, len = 288, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 128 on IF [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_st_input_v1_create_sa: [10af800/0] No IKE SA for packet; requesting permission to create one. [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Not found SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_sa_find_half: Found half SA = { 45a89384 6921f9e1 - 00000000 00000000 } [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_get_sa: We are intiator, first response packet [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_sa_upgrade: Start, SA = { 45a89384 6921f9e1 - 00000000 00000000 } -> { ... - f83bcc9d fb2a4701 } [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_sa_value: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_ke: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [2854] [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_nonce: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_isakmp_nonce_data_len: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM KE I (5) [Aug 8 22:31:17][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701}, len = 228, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:500, routing table id = 0 [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ---------> Received from 52.206.202.16:500 to 173.161.47.145:0, VR 0, length 228 on IF [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_get_sa: Start, SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } / 00000000, remote = 52.206.202.16:500 [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_sa_find: Found SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_nonce: Start, nonce[0..16] = 569a2eb5 d5f98455 ... [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_ke: Ke[0..128] = f87650e4 83a20aad ... [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_cr: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_cert: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_i_private: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_id: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_hash: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [2573] [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_find_pre_shared_key: Find pre shared key key for 173.161.47.145:500, id = ipv4(any:0,[0..3]=173.161.47.145) -> 52.206.202.16:500, id = No Id [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_find_pre_shared_key: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_calc_mac: Start, initiator = true, local = true [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_status_n: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_private: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_policy_reply_private_payload_out: Start [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_st_o_encrypt: Marking encryption for packet [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_state_step: All done, new state = MM final I (7) [Aug 8 22:31:18][173.161.47.145 <-> 52.206.202.16] ike_send_packet: <-------- sending SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701}, len = 92, nego = -1, local ip= 173.161.47.145, dst = 52.206.202.16:4500, routing table id = 0 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4968 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:27][173.161.47.145 <-> 52.206.202.16] P1 SA 140285 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:28][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701}, nego = -1 [Aug 8 22:31:28][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] Get rtbl_idx=0 for ifl idx 71 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] PING (169.254.45.145 via 52.206.202.16): 56 data bytes Tunnel-id:131074 outgoing intf 81, rtbl idx 0 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] VPNM send ping pkt (84/84) bytes for tunnel 131074, seq 4970 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] Received IKE Trigger message with local_gw_addr = 173.161.47.145 remote_gw_addr = 52.206.202.16 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] In iked_async_ike_trigger_msg_handler; Tunnel = 131074 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] Triggering the IKE negotiation .... [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] Triggering negotiation for vpn-60c3d501-2 config block [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: lookup peer entry for gateway gw-vpn-60c3d501-2, local_port=500, remote_port=500 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] iked_pm_trigger_callback: FOUND peer entry for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:37][173.161.47.145 <-> 52.206.202.16] P1 SA 140285 negotiation is still going on for gateway gw-vpn-60c3d501-2 [Aug 8 22:31:38][173.161.47.145 <-> 52.206.202.16] ike_retransmit_callback: Start, retransmit SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701}, nego = -1 [Aug 8 22:31:38][173.161.47.145 <-> 52.206.202.16] ike_send_packet: Start, retransmit previous packet SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701}, nego = -1, dst = 52.206.202.16:4500 routing table id = 0 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] iked_vpnm_timer_callback: VPN Monitor timer kicked in [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] VPNM tunnel (131074) ping count (11) > threshold 10, tunnel down [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] kmd_sa_cfg_children_sa_free: processing SA vpn-60c3d501-2 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140285 timer expiry. ref cnt 2, timer reason Force delete timer expired (1), flags 0x110. [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] Initiate IKE P1 SA 140285 delete. curr ref count 2, del flags 0x3. Reason: Internal Error: Unknown event (0) [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_delete_done_cb: For p1 sa index 140285, ref cnt 2, status: Error ok [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] 173.161.47.145:4500 (Initiator) <-> 52.206.202.16:4500 { 45a89384 6921f9e1 - f83bcc9d fb2a4701 [-1] / 0x00000000 } IP; Connection timed out or error, calling callback [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Fallback negotiation 115f800 has still 1 references [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] ike_sa_delete: Start, SA = { 45a89384 6921f9e1 - f83bcc9d fb2a4701 } [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 113b400 is freed [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] iked_pm_ike_sa_done: Phase-1 failed with error (Timeout) p1_sa 140285 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] IKEv1 Error : Timeout [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback. ed 1165028. status: Timed out [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] IPSec Rekey for SPI 0x0 failed [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] IPSec SA done callback called for sa-cfg vpn-60c3d501-2 local:173.161.47.145, remote:52.206.202.16 IKEv1 with status Timed out [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] IKE SA delete called for p1 sa 140285 (ref cnt 2) local:173.161.47.145, remote:52.206.202.16, IKEv1 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140285 stop timer. timer duration 30, reason 0. [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] P1 SA 140285 reference count is not zero (1). Delaying deletion of SA [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] ikev2_fallback_negotiation_free: Freeing fallback negotiation 115f800 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] iked_pm_p1_sa_destroy: p1 sa 140285 (ref cnt 0), waiting_for_del 0x104c4c0 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] iked_peer_remove_p1sa_entry: Remove p1 sa 140285 from peer entry 0x114a200 [Aug 8 22:31:47][173.161.47.145 <-> 52.206.202.16] iked_peer_entry_patricia_delete:Peer entry 0x114a200 deleted for local 173.161.47.145:500 and remote 52.206.202.16:500