SRX

last person joined: yesterday 

Ask questions and share experiences about the SRX Series, vSRX, and cSRX.
Expand all | Collapse all

Replacing a SSG5 with SRX100H2 in branch office

  • 1.  Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-21-2016 22:32

    We have a hub/spoke network with a SSG140 hub running ScreenOS 6.3.0r21.0 and several branches running SSG5's with no issues.

    We're testing a SRX100H2 JunOS 12.1X46-D40.2 due to SSG5 EOL and am having issues getting the VPN tunnel to connect. I've used translators, configurators, wizards, etc to try and build the SRX config but absolutely no luck and would appreciate help w/the debug logs as its well over my head.

     

    the Branch is Dallas and it's called Dallas_VPN in the SSG140 config. I am attaching config files for:

     

    SSG140 (Public IP has been changed to 1.1.1.1)

    SRX100H2 (Public IP has been changed to 2.2.2.2. From the SRX i can ping/reach the SSG100H2. From behind the SRX, a client does have Internet access.)

    SSG5 that does work.

     

    Also attaching debug logs for teh SSG140 (which we use a 3rd party to manage.) There are 2. One where we thought maybe the PSK were not the same and the 2nd after we reentered the PSK in the SSG140

    And kmd log for the SRX. Sorry the times do not match up but hopefully someone can decipher what's going on.

     

    Thanks in advance. I am trying to get this tunnel back up before Monday morning when folks come back into the office.

    Attachment(s)

    txt
    SSG140 config v2.txt   37 KB 1 version
    txt
    Dallas SRX config v2.txt   10 KB 1 version
    txt
    SSG140_debug1.txt   159 KB 1 version
    txt
    Dallas SRX KMD log v2.txt   41 KB 1 version
    txt
    Dallas SSG5 config v2.txt   6 KB 1 version


  • 2.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-22-2016 06:05

    From the logs it looks like the SRX does not receive replies to the IKE requests but the SSG is responding.

     

    I think this might be because of the zone configuration on the SRX.  You have IKE allowed at the zone level but you have specific services on the interface that does NOT include IKE.  Please add IKE to the interface here.

    security-zone Internet {
                host-inbound-traffic {
                    system-services {
                        ike;
                    }
                }
                interfaces {
                    fe-0/0/0.0 {
                        host-inbound-traffic {
                            system-services {
                                https;
                                ssh;
                            }
                        }
                    }
                }
            }


  • 3.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-22-2016 08:18

    thank you, i added IKE to the interface:

         security-zone Internet {
                host-inbound-traffic {
                    system-services {
                        ike;
                    }
                }
                interfaces {
                    fe-0/0/0.0 {
                        host-inbound-traffic {
                            system-services {
                                https;
                                ssh;
                                ike;
                            }
                        }
                    }
                }
            }

    But i still dont think the SRX is receiving anything from the SSG:

     

    aaaaaa@Dallas_SRX> show security ike security-associations detail
    IKE peer 1.1.1.1, Index 3505536, Gateway Name: gw_Colo_VPN
      Role: Initiator, State: DOWN
      Initiator cookie: 6c6bbc7cdb25fcf2, Responder cookie: 0000000000000000
      Exchange type: Main, Authentication method: Pre-shared-keys
      Local: 2.2.2.2:500, Remote: 1.1.1.1:500
      Peer ike-id: not available
      Xauth user-name: not available
      Xauth assigned IP: 0.0.0.0
      Algorithms:
       Authentication        : (null)
       Encryption            : (null)
       Pseudo random function: (null)
       Diffie-Hellman group  : unknown
      Traffic statistics:
       Input  bytes  :                  444
       Output bytes  :                  416
       Input  packets:                    3
       Output packets:                    3
      Flags: Waiting for doneWaiting for remove
      IPSec security associations: 0 created, 0 deleted
      Phase 2 negotiations in progress: 0
    
        Flags: Waiting for doneWaiting for remove

    attached is another KMD log. I see something like:

     

    [May 22 09:34:56][2.2.2.2 <-> 1.1.1.1]  <none>:500 (Responder) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [0] / 0xf501a37f } Info; Trying to decrypt, but no decryption context initialized

    then what seems like a bunch of chattering and this?

     

    [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1]  2.2.2.2:500 (Initiator) <-> 1.1.1.1:500 { ad2a2219 3d763722 - 6a32ea36 94f9d80d [-1] / 0x00000000 } IP; Connection timed out or error, calling callback
    [May 22 09:35:26][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_negotiation_done_isakmp: Entered IKE error code Timeout (8197), IKE SA eea400 (neg eee800)

     

    Thanks

    Attachment(s)

    txt
    kmd.txt   486 KB 1 version
    txt
    SSG140_debug_3.txt   7 KB 1 version


  • 4.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-22-2016 11:12

    I started a kmd-log

    May 22 13:10:46  Dallas_SRX kmd[1454]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 13:11:16  Dallas_SRX kmd[1454]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    

    And a packet capture on the SRX External interface

    Address resolution is ON. Use  to avoid any reverse lookup delay.
    Address resolution timeout is 4s.
    Listening on fe-0/0/0, capture size 1514 bytes
    15:00:06.108173  In IP (tos 0x0, ttl  50, id 31872, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:07.854810 Out IP (tos 0x0, ttl 255, id 32391, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 642, length 64
    15:00:07.993840 Out IP (tos 0xc0, ttl  64, id 32392, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident[E]: [|id]
    15:00:10.109892  In IP (tos 0x0, ttl  50, id 32056, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:14.109431  In IP (tos 0x0, ttl  50, id 32237, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:17.857708 Out IP (tos 0x0, ttl 255, id 32437, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 643, length 64
    15:00:17.995497 Out IP (tos 0xc0, ttl  64, id 32438, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident[E]: [|id]
    15:00:18.108741  In IP (tos 0x0, ttl  50, id 32487, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:22.105781  In IP (tos 0x0, ttl  50, id 32700, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:26.107536  In IP (tos 0x0, ttl  50, id 32969, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:27.865084 Out IP (tos 0x0, ttl 255, id 32485, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 644, length 64
    15:00:27.886401 Out IP (tos 0xc0, ttl  64, id 32486, offset 0, flags [none], proto: UDP (17), length: 172) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident:
        (sa: doi=ipsec situation=identity
            (p: #1 protoid=isakmp transform=1 spi=179df9c6f7121a19
                (t: #0 id=ike (type=enc value=3des)(type=group desc value=modp1024)(type=hash value=sha1)(type=lifetype value=sec)(type=lifeduration len=4 value=00007080)(type=auth value=preshared))))
        (vid: len=16)
        (vid: len=28)
    15:00:27.922762  In IP (tos 0x0, ttl  50, id 33091, offset 0, flags [none], proto: UDP (17), length: 184) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (sa: doi=ipsec situation=identity
            (p: #1 protoid=isakmp transform=1
                (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp1024)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration value=7080))))
        (vid: len=28)
        (vid: len=16)
        (vid: len=20)
    15:00:27.942793 Out IP (tos 0xc0, ttl  64, id 32487, offset 0, flags [none], proto: UDP (17), length: 208) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident:
        (ke: key len=128)
        (nonce: n len=16)
    15:00:27.997358  In IP (tos 0x0, ttl  50, id 33099, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:28.016066 Out IP (tos 0xc0, ttl  64, id 32488, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [|id]
    15:00:28.051935  In IP (tos 0x0, ttl  50, id 33105, offset 0, flags [none], proto: UDP (17), length: 120) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid c4cfee21: phase 2/others R inf[E]: [|hash]
    15:00:30.106134  In IP (tos 0x0, ttl  50, id 33230, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:32.105819  In IP (tos 0x0, ttl  50, id 33331, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:34.129665  In IP (tos 0x0, ttl  50, id 33465, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:36.109492  In IP (tos 0x0, ttl  50, id 33559, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:37.867652 Out IP (tos 0x0, ttl 255, id 32562, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 645, length 64
    15:00:38.018599 Out IP (tos 0xc0, ttl  64, id 32563, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [|id]
    15:00:38.105998  In IP (tos 0x0, ttl  50, id 33618, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:40.107690  In IP (tos 0x0, ttl  50, id 33718, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:42.105837  In IP (tos 0x0, ttl  50, id 33797, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 ? ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:44.109073  In IP (tos 0x0, ttl  50, id 33869, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:47.870446 Out IP (tos 0x0, ttl 255, id 32613, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 646, length 64
    15:00:48.021873 Out IP (tos 0xc0, ttl  64, id 32614, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [|id]
    15:00:48.105590  In IP (tos 0x0, ttl  50, id 34023, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:52.105218  In IP (tos 0x0, ttl  50, id 34167, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:56.106703  In IP (tos 0x0, ttl  50, id 34294, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:00:57.873274 Out IP (tos 0x0, ttl 255, id 32664, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 647, length 64
    15:01:00.104920  In IP (tos 0x0, ttl  50, id 34434, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:04.104463  In IP (tos 0x0, ttl  50, id 34508, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:07.882483 Out IP (tos 0x0, ttl 255, id 32724, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 648, length 64
    15:01:07.895173 Out IP (tos 0xc0, ttl  64, id 32725, offset 0, flags [none], proto: UDP (17), length: 172) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident:
        (sa: doi=ipsec situation=identity
            (p: #1 protoid=isakmp transform=1 spi=14c93282cc9e3ee3
                (t: #0 id=ike (type=enc value=3des)(type=group desc value=modp1024)(type=hash value=sha1)(type=lifetype value=sec)(type=lifeduration len=4 value=00007080)(type=auth value=preshared))))
        (vid: len=16)
        (vid: len=28)
    15:01:07.931718  In IP (tos 0x0, ttl  50, id 34616, offset 0, flags [none], proto: UDP (17), length: 184) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (sa: doi=ipsec situation=identity
            (p: #1 protoid=isakmp transform=1
                (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp1024)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration value=7080))))
        (vid: len=28)
        (vid: len=16)
        (vid: len=20)
    15:01:07.952982 Out IP (tos 0xc0, ttl  64, id 32726, offset 0, flags [none], proto: UDP (17), length: 208) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident:
        (ke: key len=128)
        (nonce: n len=16)
    15:01:08.004140  In IP (tos 0x0, ttl  50, id 34617, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:08.023412 Out IP (tos 0xc0, ttl  64, id 32727, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [|id]
    15:01:08.058352  In IP (tos 0x0, ttl  50, id 34618, offset 0, flags [none], proto: UDP (17), length: 120) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 3fa03277: phase 2/others R inf[E]: [|hash]
    15:01:08.105163  In IP (tos 0x0, ttl  50, id 34619, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:12.105671  In IP (tos 0x0, ttl  50, id 34773, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:12.106491  In IP (tos 0x0, ttl  50, id 34774, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:16.105447  In IP (tos 0x0, ttl  50, id 35147, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:17.885591 Out IP (tos 0x0, ttl 255, id 32802, offset 0, flags [none], proto: ICMP (1), length: 84) rrcs-2-2-2-2.sw.biz.rr.com > 1.1.1.1.hosting.com: ICMP echo request, id 1454, seq 649, length 64
    15:01:18.025682 Out IP (tos 0xc0, ttl  64, id 32803, offset 0, flags [none], proto: UDP (17), length: 120) rrcs-2-2-2-2.sw.biz.rr.com.isakmp > 1.1.1.1.hosting.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 I ident[E]: [|id]
    15:01:20.103208  In IP (tos 0x0, ttl  50, id 35544, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    15:01:24.105661  In IP (tos 0x0, ttl  50, id 35831, offset 0, flags [none], proto: UDP (17), length: 224) 1.1.1.1.hosting.com.isakmp > rrcs-2-2-2-2.sw.biz.rr.com.isakmp: isakmp 1.0 msgid 00000000: phase 1 R ident:
        (ke: key len=128)
        (nonce: n len=32)
    

     



  • 5.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-22-2016 16:22

    I deleted the VPN monitor config and started getting 2 SA:

    login@Dallas_SRX> show security ike security-associations
    Index   State  Initiator cookie  Responder cookie  Mode           Remote Address
    4733962 DOWN   d7731d80bcc3eb2f  c21467dc73b9c078  Main           1.1.1.1
    4733963 DOWN   eead14a237a74d60  0000000000000000  Main           1.1.1.1

    Then in the KMD log i was getting Invalid syntax

    May 22 18:05:48  Dallas_SRX kmd[1458]: Config download time: 0 seconds
    May 22 18:05:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Not-Available Gateway: Not-Available, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:06:20  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:06:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:07:15  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:07:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:08:17  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:08:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:09:14  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:09:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:10:14  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:10:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:11:14  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:11:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:12:17  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Invalid syntax. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0
    May 22 18:12:52  Dallas_SRX kmd[1458]: IKE negotiation failed with error: SA unusable. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: Not-Available, Remote IKE-ID: Not-Available, VR-ID: 0

    I have re-entered the PSK twice and had the hosting company re-enter the PSK on the SSG140 and still getting this.

     

    ARGH!



  • 6.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-22-2016 21:09

    Praying someone can help me overnite so i can get this tunnel up by tomorrow morning. Due to the syntax error, i created a new PSK and it was entered on both sides. Now the KMD Log shows this:

    May 22 21:47:24  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0
    May 22 21:47:27  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0
    May 22 21:47:59  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0
    May 22 21:50:08  Dallas_SRX last message repeated 5 times
    May 22 22:00:04  Dallas_SRX last message repeated 21 times
    May 22 22:10:01  Dallas_SRX last message repeated 21 times
    May 22 22:18:25  Dallas_SRX last message repeated 20 times
    May 22 22:21:29  Dallas_SRX last message repeated 8 times
    May 22 22:31:29  Dallas_SRX last message repeated 24 times
    May 22 22:32:25  Dallas_SRX last message repeated 2 times
    May 22 22:39:25  Dallas_SRX last message repeated 16 times
    May 22 22:46:08  Dallas_SRX last message repeated 14 times
    May 22 22:56:08  Dallas_SRX last message repeated 24 times

    And the KMD shows this:

    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847059 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847059 stop timer. timer duration 0, reason 0.
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847059 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847059 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847059 from peer entry 0xee3800
    [May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { cf4da94b b93e62f9 - 9cf2b89e 7cd6ef99 }
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 start timer. timer duration 30, reason 1.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  00000000: 9cf2 b89e 7cd6 ef99                      ....|...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  00000000: 53d9 52e5 bdb6 b296                      S.R.....
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e8f000 from freelist
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = fde3d46a fb7208f6 ...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f3c2fd74 15163f50 ...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6230]
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5327]
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e8f400 from freelist
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 0605a938 e33b5cb2 ...
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xcf4da94b b93e62f9 - 0x53d952e5 bdb6b296 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 stop timer. timer duration 30, reason 1.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 start timer. timer duration 0, reason 3.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847060 delete. curr ref count 1, del flags 0x3
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847060, ref cnt 1, status: Error ok
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847060 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 stop timer. timer duration 0, reason 0.
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847060 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 start timer. timer duration 30, reason 1.
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847061 in peer entry 0xee3800
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 818584bb 9f18c607 - 00000000 00000000 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 818584bb 9f18c607 - 00000000 00000000}, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 818584bb 9f18c607 - 00000000 00000000 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 818584bb 9f18c607 - 00000000 00000000 } -> { ... - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6234]
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 2e2b9712 2dd2f689 ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = a8227fae 70a6125b ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5204]
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = e2e23316 2cfe5285 ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x818584bb 9f18c607 - 0x88cd8380 7a82a2b3 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 stop timer. timer duration 30, reason 1.
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 start timer. timer duration 0, reason 3.
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x9717324a, protocol=0) entry to the spi table
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xa1beaa78, protocol=0) entry to the spi table
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = eb93cb25
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6345]
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847061 sa-cfg Colo_VPN
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / eb93cb25, nego = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = a58b8216 44920fa1 ...
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847061 delete. curr ref count 2, del flags 0x2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847061, ref cnt 2, status: Error ok
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 6f007396
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 6f007396, nego = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847061 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 stop timer. timer duration 0, reason 0.
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847061 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847061 from peer entry 0xee3800
    [May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { aeb6c4e1 b1e71435 - 61ac912e f417a271 }
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 start timer. timer duration 30, reason 1.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  00000000: 61ac 912e f417 a271                      a......q
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  00000000: 44f3 63e6 10f4 6dbe                      D.c...m.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e90800 from freelist
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, remote = 1.1.1.1:500
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 10e7aee9 4a9dc393 ...
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 3f82eeab 996ffd9b ...
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6361]
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5791]
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e90c00 from freelist
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, remote = 1.1.1.1:500
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = a1c24978 1b399ff0 ...
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xaeb6c4e1 b1e71435 - 0x44f363e6 10f46dbe } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 stop timer. timer duration 30, reason 1.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 start timer. timer duration 0, reason 3.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847062 delete. curr ref count 1, del flags 0x3
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847062, ref cnt 1, status: Error ok
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847062 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 stop timer. timer duration 0, reason 0.
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847062 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 start timer. timer duration 30, reason 1.
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847063 in peer entry 0xee3800
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 9c7b8610 962a1303 - 00000000 00000000 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 9c7b8610 962a1303 - 00000000 00000000}, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 9c7b8610 962a1303 - 00000000 00000000 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 9c7b8610 962a1303 - 00000000 00000000 } -> { ... - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5836]
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = fca967c7 1ccd44ae ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 6a63391d 720e4760 ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5248]
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = c94d79bd a55af41e ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x9c7b8610 962a1303 - 0xdd01a3be ff2083a7 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 stop timer. timer duration 30, reason 1.
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 start timer. timer duration 0, reason 3.
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x88b74904, protocol=0) entry to the spi table
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x90f61701, protocol=0) entry to the spi table
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = b890e099
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7685]
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847063 sa-cfg Colo_VPN
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / b890e099, nego = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = f6a02527 b99bd880 ...
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847063 delete. curr ref count 2, del flags 0x2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847063, ref cnt 2, status: Error ok
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 6f8d4bee
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 6f8d4bee, nego = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847063 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 stop timer. timer duration 0, reason 0.
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847063 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847063 from peer entry 0xee3800
    [May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 422949f3 2defc72e - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 422949f3 2defc72e - 44e538d7 a7586ffd }
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 start timer. timer duration 30, reason 1.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  00000000: 44e5 38d7 a758 6ffd                      D.8..Xo.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  00000000: 0829 6c78 32f3 7c40                      .)lx2.|@
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e92000 from freelist
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 8b7fee50 03eb5e48 ...
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 0e8941be c673c7ac ...
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6217]
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5458]
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e92400 from freelist
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 71d3cbc4 261fd48c ...
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x422949f3 2defc72e - 0x08296c78 32f37c40 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 stop timer. timer duration 30, reason 1.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 start timer. timer duration 0, reason 3.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847064 delete. curr ref count 1, del flags 0x3
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847064, ref cnt 1, status: Error ok
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847064 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 stop timer. timer duration 0, reason 0.
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847064 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 start timer. timer duration 30, reason 1.
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847065 in peer entry 0xee3800
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { f6ef71f7 685cb743 - 00000000 00000000 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { f6ef71f7 685cb743 - 00000000 00000000}, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { f6ef71f7 685cb743 - 00000000 00000000 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { f6ef71f7 685cb743 - 00000000 00000000 } -> { ... - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6523]
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 49b04963 a199ad3e ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = d4801177 d2c0e8a9 ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5412]
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 58ba04fb 4108819f ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xf6ef71f7 685cb743 - 0xc4c202df e3368960 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 stop timer. timer duration 30, reason 1.
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 start timer. timer duration 0, reason 3.
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x58d5ddb1, protocol=0) entry to the spi table
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x57f8f0d3, protocol=0) entry to the spi table
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 64ec45d6
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7194]
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847065 sa-cfg Colo_VPN
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 64ec45d6, nego = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 420ade6e 9606c1f6 ...
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847065 delete. curr ref count 2, del flags 0x2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847065, ref cnt 2, status: Error ok
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 4ee8f295
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 4ee8f295, nego = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847065 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 stop timer. timer duration 0, reason 0.
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847065 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847065 from peer entry 0xee3800
    [May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 6897300a 37c0ec81 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 6897300a 37c0ec81 - f226f596 30af1f67 }
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 start timer. timer duration 30, reason 1.
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  00000000: f226 f596 30af 1f67                      .&..0..g
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  00000000: eb98 3e13 ac08 2e57                      ..>....W
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e93800 from freelist
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 337a8d18 1ff5ac1d ...
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 74468d44 6e74a905 ...
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6254]
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5410]
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e93c00 from freelist
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 08e8ece5 e501e626 ...
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x6897300a 37c0ec81 - 0xeb983e13 ac082e57 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 stop timer. timer duration 30, reason 1.
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 start timer. timer duration 0, reason 3.
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847066 delete. curr ref count 1, del flags 0x3
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847066, ref cnt 1, status: Error ok
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847066 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 stop timer. timer duration 0, reason 0.
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847066 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 2ad94000 1ab8d65b - 28a45037 3e261557 }
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 start timer. timer duration 30, reason 1.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  00000000: 28a4 5037 3e26 1557                      (.P7>&.W
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  00000000: a68b 03f6 c07d 8bf0                      .....}..
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e94400 from freelist
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = ec67bc3e f88dce7b ...
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 04b8fa98 a9b7aac0 ...
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6799]
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6766]
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e94800 from freelist
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 920acfd6 1f7e9cdf ...
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x2ad94000 1ab8d65b - 0xa68b03f6 c07d8bf0 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 stop timer. timer duration 30, reason 1.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 start timer. timer duration 0, reason 3.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847067 delete. curr ref count 1, del flags 0x3
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847067, ref cnt 1, status: Error ok
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847067 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 stop timer. timer duration 0, reason 0.
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847067 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 start timer. timer duration 30, reason 1.
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847068 in peer entry 0xee3800
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 8da66c58 e552ec99 - 00000000 00000000 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 8da66c58 e552ec99 - 00000000 00000000}, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 8da66c58 e552ec99 - 00000000 00000000 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 8da66c58 e552ec99 - 00000000 00000000 } -> { ... - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5975]
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = c424fbc1 26520783 ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 2f4ab914 9fcba3b7 ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5394]
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 417e0ac9 398f8291 ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x8da66c58 e552ec99 - 0x9d2c42a7 38ee8469 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 stop timer. timer duration 30, reason 1.
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 start timer. timer duration 0, reason 3.
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xbfd50b0a, protocol=0) entry to the spi table
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x6be3db97, protocol=0) entry to the spi table
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = f5a1a8f9
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6022]
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847068 sa-cfg Colo_VPN
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / f5a1a8f9, nego = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 32a0b90e e418caaa ...
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847068 delete. curr ref count 2, del flags 0x2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847068, ref cnt 2, status: Error ok
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = ad315233
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / ad315233, nego = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847068 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 stop timer. timer duration 0, reason 0.
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847068 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847068 from peer entry 0xee3800
    [May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 75d251b7 a3c82220 - 90abe627 201be8d4 }
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 start timer. timer duration 30, reason 1.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  00000000: 90ab e627 201b e8d4                      ...' ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  00000000: 9718 9611 5d62 7d43                      ....]b}C
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e95c00 from freelist
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 05fc0842 1c9d002d ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 40f8db1f b921be9f ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6219]
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5561]
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e96000 from freelist
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 17ead66e 5d6859e9 ...
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x75d251b7 a3c82220 - 0x97189611 5d627d43 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 stop timer. timer duration 30, reason 1.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 start timer. timer duration 0, reason 3.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847069 delete. curr ref count 1, del flags 0x3
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847069, ref cnt 1, status: Error ok
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847069 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 stop timer. timer duration 0, reason 0.
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847069 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 start timer. timer duration 30, reason 1.
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847070 in peer entry 0xee3800
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fbaaaede 9036f2e3 - 00000000 00000000 }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { fbaaaede 9036f2e3 - 00000000 00000000}, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { fbaaaede 9036f2e3 - 00000000 00000000 }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { fbaaaede 9036f2e3 - 00000000 00000000 } -> { ... - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6585]
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 961c3f05 1c2d9b01 ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 6410918e e0bc4d2b ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5449]
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 2aa1c888 b580bad5 ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfbaaaede 9036f2e3 - 0x19a7df5f 7659c9df } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 stop timer. timer duration 30, reason 1.
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 start timer. timer duration 0, reason 3.
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xaaa42b91, protocol=0) entry to the spi table
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xfa27a941, protocol=0) entry to the spi table
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 8c92511a
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6335]
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847070 sa-cfg Colo_VPN
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 8c92511a, nego = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 30b3b60c 76c831bf ...
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847070 delete. curr ref count 2, del flags 0x2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847070, ref cnt 2, status: Error ok
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 23187776
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 23187776, nego = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847070 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 stop timer. timer duration 0, reason 0.
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847070 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847070 from peer entry 0xee3800
    [May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { ed0eb0da 22a80205 - abe0f18f c75e6152 }
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 start timer. timer duration 30, reason 1.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  00000000: abe0 f18f c75e 6152                      .....^aR
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  00000000: 9a71 fccc f899 d3f5                      .q......
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e97400 from freelist
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 77f44d34 13e46bea ...
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 299ce81e 9436984f ...
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6170]
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5362]
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e97800 from freelist
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 47a312a3 1ad1f332 ...
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xed0eb0da 22a80205 - 0x9a71fccc f899d3f5 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 stop timer. timer duration 30, reason 1.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 start timer. timer duration 0, reason 3.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847071 delete. curr ref count 1, del flags 0x3
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847071, ref cnt 1, status: Error ok
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847071 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 stop timer. timer duration 0, reason 0.
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847071 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 start timer. timer duration 30, reason 1.
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847072 in peer entry 0xee3800
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 1673a7ae 3ccb16a6 - 00000000 00000000}, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 } -> { ... - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6306]
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = b83d9b9d 3b4ef0c2 ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 0127180b 2454acd1 ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5549]
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = d32f50a5 4ac57ee9 ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x1673a7ae 3ccb16a6 - 0x22dadc26 76298e41 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 stop timer. timer duration 30, reason 1.
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 start timer. timer duration 0, reason 3.
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x4bd66a56, protocol=0) entry to the spi table
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x7fc54c2c, protocol=0) entry to the spi table
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = e18b2fef
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6368]
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847072 sa-cfg Colo_VPN
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / e18b2fef, nego = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = f3541bad b593dd50 ...
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847072 delete. curr ref count 2, del flags 0x2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847072, ref cnt 2, status: Error ok
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 1500d330
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 1500d330, nego = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847072 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 stop timer. timer duration 0, reason 0.
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847072 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847072 from peer entry 0xee3800
    [May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { ac4e6e0f dd3ffdde - ae8efd44 4b583902 }
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 start timer. timer duration 30, reason 1.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  00000000: ae8e fd44 4b58 3902                      ...DKX9.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  00000000: ef9c f04b 588f ce8c                      ...KX...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e98c00 from freelist
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 0332d6e6 20ef1f4a ...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 24f47c20 73e9e227 ...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6207]
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5334]
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e99000 from freelist
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 1141997e 992da1b7 ...
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xac4e6e0f dd3ffdde - 0xef9cf04b 588fce8c } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 stop timer. timer duration 30, reason 1.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 start timer. timer duration 0, reason 3.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847073 delete. curr ref count 1, del flags 0x3
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847073, ref cnt 1, status: Error ok
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847073 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 stop timer. timer duration 0, reason 0.
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847073 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 start timer. timer duration 30, reason 1.
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847074 in peer entry 0xee3800
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { c88db471 ce438b29 - 00000000 00000000 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { c88db471 ce438b29 - 00000000 00000000}, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { c88db471 ce438b29 - 00000000 00000000 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { c88db471 ce438b29 - 00000000 00000000 } -> { ... - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5976]
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = e2a696c7 6733cdac ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = dd668c8a f12c0431 ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5353]
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 161b61e3 73973175 ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xc88db471 ce438b29 - 0xf46c7b96 c56fdf06 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 stop timer. timer duration 30, reason 1.
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 start timer. timer duration 0, reason 3.
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x381aa335, protocol=0) entry to the spi table
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xe39eb454, protocol=0) entry to the spi table
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 05f58094
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6229]
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847074 sa-cfg Colo_VPN
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 05f58094, nego = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = d2e93f05 0e349dc7 ...
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847074 delete. curr ref count 2, del flags 0x2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847074, ref cnt 2, status: Error ok
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = c737bf2b
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / c737bf2b, nego = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847074 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 stop timer. timer duration 0, reason 0.
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847074 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847074 from peer entry 0xee3800
    [May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb33d81b fe098510 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { bb33d81b fe098510 - 42e4b074 65a22c29 }
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 start timer. timer duration 30, reason 1.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  00000000: 42e4 b074 65a2 2c29                      B..te.,)
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  00000000: 740d 409b 38b2 734c                      t.@.8.sL
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9a400 from freelist
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 62db8133 55e24423 ...
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 69fb3828 4f46f3c0 ...
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6096]
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5375]
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9a800 from freelist
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } / 00000000, remote = 1.1.1.1:500
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = d55a8705 59a1aacc ...
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xbb33d81b fe098510 - 0x740d409b 38b2734c } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 stop timer. timer duration 30, reason 1.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 start timer. timer duration 0, reason 3.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847075 delete. curr ref count 1, del flags 0x3
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847075, ref cnt 1, status: Error ok
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c }
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847075 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 stop timer. timer duration 0, reason 0.
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847075 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { e3077ddb 73c320d0 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { e3077ddb 73c320d0 - 99c2e6ab 8ee4f746 }
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 start timer. timer duration 30, reason 1.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  00000000: 99c2 e6ab 8ee4 f746                      .......F
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  00000000: b5ef 57a2 a26a ae62                      ..W..j.b
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9b000 from freelist
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d2e5e151 6001093a ...
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 4d8ae88d 1fa02f3d ...
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6190]
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5372]
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9b400 from freelist
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 20910f01 df2d4a50 ...
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xe3077ddb 73c320d0 - 0xb5ef57a2 a26aae62 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 stop timer. timer duration 30, reason 1.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 start timer. timer duration 0, reason 3.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847076 delete. curr ref count 1, del flags 0x3
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847076, ref cnt 1, status: Error ok
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847076 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 stop timer. timer duration 0, reason 0.
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847076 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 start timer. timer duration 30, reason 1.
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847077 in peer entry 0xee3800
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 84fd2fdb 7f94abe5 - 00000000 00000000}, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 } -> { ... - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6027]
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 7d2d3cbb e76b26b8 ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 4ba3f4dd 3106d2e7 ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5380]
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 261e6412 fba8b505 ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x84fd2fdb 7f94abe5 - 0xd222cb2e 8271747b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 stop timer. timer duration 30, reason 1.
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 start timer. timer duration 0, reason 3.
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xd10e271a, protocol=0) entry to the spi table
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x7fa74d51, protocol=0) entry to the spi table
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 0bde4c60
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5963]
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847077 sa-cfg Colo_VPN
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 0bde4c60, nego = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = f6a66bb9 f2722499 ...
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847077 delete. curr ref count 2, del flags 0x2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847077, ref cnt 2, status: Error ok
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 5f506d70
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 5f506d70, nego = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847077 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 stop timer. timer duration 0, reason 0.
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847077 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847077 from peer entry 0xee3800
    [May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 04e2c2bf 184be017 - b0f43429 a5fc9501 }
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 start timer. timer duration 30, reason 1.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  00000000: b0f4 3429 a5fc 9501                      ..4)....
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  00000000: 4ebb 4b31 f962 a288                      N.K1.b..
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9c800 from freelist
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 0420dad6 bd84acfe ...
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = af2f202d cbb95594 ...
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6347]
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5630]
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9cc00 from freelist
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 7d11e8c5 40a24829 ...
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x04e2c2bf 184be017 - 0x4ebb4b31 f962a288 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 stop timer. timer duration 30, reason 1.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 start timer. timer duration 0, reason 3.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847078 delete. curr ref count 1, del flags 0x3
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847078, ref cnt 1, status: Error ok
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847078 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 stop timer. timer duration 0, reason 0.
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847078 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 start timer. timer duration 30, reason 1.
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847079 in peer entry 0xee3800
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fe14b406 242a6e97 - 00000000 00000000 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { fe14b406 242a6e97 - 00000000 00000000}, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { fe14b406 242a6e97 - 00000000 00000000 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { fe14b406 242a6e97 - 00000000 00000000 } -> { ... - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6359]
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 06dc5ea2 c24dd8bf ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = eedc6114 830b1e9e ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5334]
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = bc410a88 b43e8086 ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfe14b406 242a6e97 - 0x12948fb8 1b7cb049 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 stop timer. timer duration 30, reason 1.
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 start timer. timer duration 0, reason 3.
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x756ba779, protocol=0) entry to the spi table
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xcf9787da, protocol=0) entry to the spi table
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = a5b050e0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6007]
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847079 sa-cfg Colo_VPN
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / a5b050e0, nego = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = cff5149b 1e941545 ...
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847079 delete. curr ref count 2, del flags 0x2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847079, ref cnt 2, status: Error ok
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 89de6d15
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 89de6d15, nego = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847079 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 stop timer. timer duration 0, reason 0.
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847079 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847079 from peer entry 0xee3800
    [May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 1c6b3ef1 962d02eb - c4b81806 cd6f7f46 }
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 start timer. timer duration 30, reason 1.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  00000000: c4b8 1806 cd6f 7f46                      .....o.F
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  00000000: c2de 5453 3554 d88e                      ..TS5T..
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9e000 from freelist
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, remote = 1.1.1.1:500
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = a901aefa d06f8c41 ...
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 16ca6f52 e903682d ...
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [11175]
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [10523]
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9e400 from freelist
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, remote = 1.1.1.1:500
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = bb917032 685b6920 ...
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x1c6b3ef1 962d02eb - 0xc2de5453 3554d88e } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 stop timer. timer duration 30, reason 1.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 start timer. timer duration 0, reason 3.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847080 delete. curr ref count 1, del flags 0x3
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847080, ref cnt 1, status: Error ok
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847080 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 stop timer. timer duration 0, reason 0.
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847080 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { d81d3616 787ee65c - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { d81d3616 787ee65c - db4e581d 1489a577 }
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 start timer. timer duration 30, reason 1.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  00000000: db4e 581d 1489 a577                      .NX....w
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  00000000: db5d 9b8f f057 4d06                      .]...WM.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9ec00 from freelist
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 39a71fb3 b2bf155d ...
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = ad6a1c38 a5c14fb8 ...
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6545]
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5346]
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9f000 from freelist
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 6366f5a1 d17ff7f7 ...
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xd81d3616 787ee65c - 0xdb5d9b8f f0574d06 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 stop timer. timer duration 30, reason 1.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 start timer. timer duration 0, reason 3.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847081 delete. curr ref count 1, del flags 0x3
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847081, ref cnt 1, status: Error ok
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847081 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 stop timer. timer duration 0, reason 0.
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847081 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 start timer. timer duration 30, reason 1.
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847082 in peer entry 0xee3800
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { b15898c9 6650d8fa - 00000000 00000000 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { b15898c9 6650d8fa - 00000000 00000000}, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { b15898c9 6650d8fa - 00000000 00000000 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { b15898c9 6650d8fa - 00000000 00000000 } -> { ... - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6059]
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 82ac181e 0c1c5a28 ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = d346ed84 1922d17c ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5344]
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 15405b7d 4af61969 ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xb15898c9 6650d8fa - 0x79ac07fd 14f4c121 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 stop timer. timer duration 30, reason 1.
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 start timer. timer duration 0, reason 3.
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x9d299e6d, protocol=0) entry to the spi table
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x4f6450dd, protocol=0) entry to the spi table
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 0ee3c060
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6224]
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847082 sa-cfg Colo_VPN
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 0ee3c060, nego = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = c1ff7fe6 440347db ...
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847082 delete. curr ref count 2, del flags 0x2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847082, ref cnt 2, status: Error ok
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 2828e9be
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 2828e9be, nego = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847082 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 stop timer. timer duration 0, reason 0.
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847082 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847082 from peer entry 0xee3800
    [May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 24c24aa1 1e7e050c - 1fca010d e9380819 }
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 start timer. timer duration 30, reason 1.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  00000000: 1fca 010d e938 0819                      .....8..
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  00000000: 69c9 246c af89 f6d9                      i.$l....
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea0400 from freelist
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 606e413c e4ceb4c9 ...
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 0b08be7c 5312c024 ...
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6663]
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5407]
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea0800 from freelist
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 1e30af57 6b851fb6 ...
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x24c24aa1 1e7e050c - 0x69c9246c af89f6d9 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 stop timer. timer duration 30, reason 1.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 start timer. timer duration 0, reason 3.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847083 delete. curr ref count 1, del flags 0x3
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847083, ref cnt 1, status: Error ok
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847083 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 stop timer. timer duration 0, reason 0.
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847083 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2d398a59 2f84efda - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 2d398a59 2f84efda - 4bb9e3a4 7b3e4adb }
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 start timer. timer duration 30, reason 1.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  00000000: 4bb9 e3a4 7b3e 4adb                      K...{>J.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  00000000: a414 8000 d2fe e73e                      .......>
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea1000 from freelist
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, remote = 1.1.1.1:500
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 027db0f8 38e092e2 ...
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = bc2ca1b1 a483f98a ...
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6082]
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5347]
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea1400 from freelist
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, remote = 1.1.1.1:500
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = f3eb2b99 cebb759f ...
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x2d398a59 2f84efda - 0xa4148000 d2fee73e } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 stop timer. timer duration 30, reason 1.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 start timer. timer duration 0, reason 3.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847084 delete. curr ref count 1, del flags 0x3
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847084, ref cnt 1, status: Error ok
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847084 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 stop timer. timer duration 0, reason 0.
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847084 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 start timer. timer duration 30, reason 1.
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847085 in peer entry 0xee3800
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 81f8c0de 75c6e3e2 - 00000000 00000000}, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 } -> { ... - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6059]
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 6dccffb2 dcb7e1a9 ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f2516c19 afe2c971 ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5569]
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = f8d86835 9df708e7 ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x81f8c0de 75c6e3e2 - 0xce4e235d 79f682e8 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 stop timer. timer duration 30, reason 1.
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 start timer. timer duration 0, reason 3.
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xcbb30636, protocol=0) entry to the spi table
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x66dbc7d6, protocol=0) entry to the spi table
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = e974772c
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6218]
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847085 sa-cfg Colo_VPN
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / e974772c, nego = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 64241253 e80f9d13 ...
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847085 delete. curr ref count 2, del flags 0x2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847085, ref cnt 2, status: Error ok
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = a29785b5
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / a29785b5, nego = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847085 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 stop timer. timer duration 0, reason 0.
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847085 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847085 from peer entry 0xee3800
    [May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb74b286 586ead5d - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { bb74b286 586ead5d - 95d6ffa2 50ea3ea5 }
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 start timer. timer duration 30, reason 1.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  00000000: 95d6 ffa2 50ea 3ea5                      ....P.>.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  00000000: 33f3 35cd 0613 f177                      3.5....w
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea2800 from freelist
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 71a21605 d9f2599a ...
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = be9f4c32 e7ccca5e ...
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6285]
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5332]
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea2c00 from freelist
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 729dcf4f ce066efc ...
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xbb74b286 586ead5d - 0x33f335cd 0613f177 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 stop timer. timer duration 30, reason 1.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 start timer. timer duration 0, reason 3.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847086 delete. curr ref count 1, del flags 0x3
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847086, ref cnt 1, status: Error ok
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847086 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 stop timer. timer duration 0, reason 0.
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847086 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 start timer. timer duration 30, reason 1.
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847087 in peer entry 0xee3800
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fad51adb 54984319 - 00000000 00000000 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { fad51adb 54984319 - 00000000 00000000}, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { fad51adb 54984319 - 00000000 00000000 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { fad51adb 54984319 - 00000000 00000000 } -> { ... - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6154]
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 73f77bb2 2e057b20 ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = ad2020a5 da46ed43 ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5502]
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 03d60c73 49190e21 ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfad51adb 54984319 - 0xbb2f809f 7b8314d7 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 stop timer. timer duration 30, reason 1.
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 start timer. timer duration 0, reason 3.
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xc5137e6e, protocol=0) entry to the spi table
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x50fa962f, protocol=0) entry to the spi table
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 349a5ad9
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6291]
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847087 sa-cfg Colo_VPN
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 349a5ad9, nego = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 1f20e801 3c15ddd6 ...
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847087 delete. curr ref count 2, del flags 0x2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847087, ref cnt 2, status: Error ok
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = bd255a4c
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / bd255a4c, nego = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847087 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 stop timer. timer duration 0, reason 0.
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847087 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847087 from peer entry 0xee3800
    [May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 7462923a f0cccf69 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 7462923a f0cccf69 - a5e7b583 1f1f6699 }
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 start timer. timer duration 30, reason 1.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  00000000: a5e7 b583 1f1f 6699                      ......f.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  00000000: 3e85 169a 77cc 9b37                      >...w..7
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea4000 from freelist
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = a27459bf e3fe2818 ...
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = e77c92a2 385f386c ...
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6546]
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5390]
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea4400 from freelist
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 90358891 0992d206 ...
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x7462923a f0cccf69 - 0x3e85169a 77cc9b37 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 stop timer. timer duration 30, reason 1.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 start timer. timer duration 0, reason 3.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847088 delete. curr ref count 1, del flags 0x3
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847088, ref cnt 1, status: Error ok
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847088 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 stop timer. timer duration 0, reason 0.
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847088 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c289ddf4 0572727e - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { c289ddf4 0572727e - 389e1bd0 253a1439 }
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 start timer. timer duration 30, reason 1.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  00000000: 389e 1bd0 253a 1439                      8...%:.9
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  00000000: 6a12 5469 f0ee 641d                      j.Ti..d.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea4c00 from freelist
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, remote = 1.1.1.1:500
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = b7f898d8 28d400d0 ...
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 8bdc80a3 77aafe71 ...
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6024]
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5403]
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea5000 from freelist
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, remote = 1.1.1.1:500
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = abc36bf9 ac2a43d0 ...
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xc289ddf4 0572727e - 0x6a125469 f0ee641d } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 stop timer. timer duration 30, reason 1.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 start timer. timer duration 0, reason 3.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847089 delete. curr ref count 1, del flags 0x3
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847089, ref cnt 1, status: Error ok
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847089 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 stop timer. timer duration 0, reason 0.
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847089 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 start timer. timer duration 30, reason 1.
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847090 in peer entry 0xee3800
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { b9b72055 81c56ad8 - 00000000 00000000 }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { b9b72055 81c56ad8 - 00000000 00000000}, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { b9b72055 81c56ad8 - 00000000 00000000 }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { b9b72055 81c56ad8 - 00000000 00000000 } -> { ... - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7076]
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 8f578eaf c54d8081 ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = c1f8f407 7c4ba979 ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6615]
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = aaa9333b c90d5e12 ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xb9b72055 81c56ad8 - 0x029a6a3f d4bbaf2b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 stop timer. timer duration 30, reason 1.
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 start timer. timer duration 0, reason 3.
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x38db8fa0, protocol=0) entry to the spi table
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xf17cb67b, protocol=0) entry to the spi table
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 5b4791a4
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [8013]
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847090 sa-cfg Colo_VPN
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 5b4791a4, nego = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 35395310 a0452caa ...
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847090 delete. curr ref count 2, del flags 0x2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847090, ref cnt 2, status: Error ok
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 7e4f54d5
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 7e4f54d5, nego = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847090 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 stop timer. timer duration 0, reason 0.
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847090 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847090 from peer entry 0xee3800
    [May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 1a428c76 909ef9d5 - dbe0a93b e7380095 }
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 start timer. timer duration 30, reason 1.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  00000000: dbe0 a93b e738 0095                      ...;.8..
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  00000000: 259b 203f c6ee b6bc                      %. ?....
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea6400 from freelist
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d2e175e4 766b0798 ...
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f5858aa4 83bd6308 ...
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5957]
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5544]
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea6800 from freelist
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = a6d1dcdb 6a481409 ...
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x1a428c76 909ef9d5 - 0x259b203f c6eeb6bc } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 stop timer. timer duration 30, reason 1.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 start timer. timer duration 0, reason 3.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847091 delete. curr ref count 1, del flags 0x3
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847091, ref cnt 1, status: Error ok
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847091 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 stop timer. timer duration 0, reason 0.
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847091 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 start timer. timer duration 30, reason 1.
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847092 in peer entry 0xee3800
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 3c4c807d 175f179f - 00000000 00000000 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 3c4c807d 175f179f - 00000000 00000000}, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 3c4c807d 175f179f - 00000000 00000000 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 3c4c807d 175f179f - 00000000 00000000 } -> { ... - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6063]
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 00000000, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 9e5853f1 48ce3029 ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 61e8f992 e01287b7 ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5576]
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 00000000, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 4e323f36 8865d60c ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x3c4c807d 175f179f - 0xab56939d 12017776 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 stop timer. timer duration 30, reason 1.
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 start timer. timer duration 0, reason 3.
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x2e0d60a8, protocol=0) entry to the spi table
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x53ec7bf3, protocol=0) entry to the spi table
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 023e3113
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6894]
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847092 sa-cfg Colo_VPN
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 023e3113, nego = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 3f4319af 81c3d0f6 ...
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847092 delete. curr ref count 2, del flags 0x2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847092, ref cnt 2, status: Error ok
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = e7aa38e3
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / e7aa38e3, nego = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 }
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847092 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 stop timer. timer duration 0, reason 0.
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847092 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847092 from peer entry 0xee3800
    [May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fe5db3a0 71e58cc6 - 3120d7cb 3c34bf80 }
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 start timer. timer duration 30, reason 1.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  00000000: 3120 d7cb 3c34 bf80                      1 ..<4..
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  00000000: 5a16 ff94 5d40 4ed0                      Z...]@N.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea7c00 from freelist
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = e853c5de 9e4d3b58 ...
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = af85d0e3 16030f08 ...
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6240]
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5429]
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea8000 from freelist
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 9f5f1678 87017e84 ...
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfe5db3a0 71e58cc6 - 0x5a16ff94 5d404ed0 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 stop timer. timer duration 30, reason 1.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 start timer. timer duration 0, reason 3.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847093 delete. curr ref count 1, del flags 0x3
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847093, ref cnt 1, status: Error ok
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847093 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 stop timer. timer duration 0, reason 0.
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847093 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { a889e18b 74ae2c03 - b104dfaa 8217b033 }
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 start timer. timer duration 30, reason 1.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  00000000: b104 dfaa 8217 b033                      .......3
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  00000000: 82c0 de52 dc99 913a                      ...R...:
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea8800 from freelist
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d402b224 063dd004 ...
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = e1a52b1e 8011ca17 ...
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6097]
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5408]
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea8c00 from freelist
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = e63d08df e98ac025 ...
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xa889e18b 74ae2c03 - 0x82c0de52 dc99913a } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 stop timer. timer duration 30, reason 1.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 start timer. timer duration 0, reason 3.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847094 delete. curr ref count 1, del flags 0x3
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847094, ref cnt 1, status: Error ok
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847094 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 stop timer. timer duration 0, reason 0.
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847094 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 start timer. timer duration 30, reason 1.
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847095 in peer entry 0xee3800
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { f36de9a5 d88590f1 - 00000000 00000000 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { f36de9a5 d88590f1 - 00000000 00000000}, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { f36de9a5 d88590f1 - 00000000 00000000 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { f36de9a5 d88590f1 - 00000000 00000000 } -> { ... - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6168]
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d5ccd74a 3bfba150 ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 76d5342f a18be05b ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5612]
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 56c0cf58 8896d889 ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xf36de9a5 d88590f1 - 0xd5aafd4e 2bca6067 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 stop timer. timer duration 30, reason 1.
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 start timer. timer duration 0, reason 3.
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x1d1269c0, protocol=0) entry to the spi table
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x65861acc, protocol=0) entry to the spi table
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 5b1c7068
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6182]
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847095 sa-cfg Colo_VPN
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 5b1c7068, nego = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = b88262ee d20d034c ...
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847095 delete. curr ref count 2, del flags 0x2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847095, ref cnt 2, status: Error ok
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = c8b3accd
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / c8b3accd, nego = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847095 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 stop timer. timer duration 0, reason 0.
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 reference count is not zero (1). Delaying deletion of SA
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847095 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847095 from peer entry 0xee3800
    [May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f56e1251 eaac6de2 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { f56e1251 eaac6de2 - ed89276d c90ccc71 }
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 start timer. timer duration 30, reason 1.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  00000000: ed89 276d c90c cc71                      ..'m...q
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  00000000: d861 4ce7 42f8 a970                      .aL.B..p
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2c000 from freelist
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 256356a7 f30c2c15 ...
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 8ecdfba8 90f847ba ...
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6094]
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6196]
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2c400 from freelist
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, remote = 1.1.1.1:500
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 75f9b052 2f895a0a ...
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xf56e1251 eaac6de2 - 0xd8614ce7 42f8a970 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 stop timer. timer duration 30, reason 1.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 start timer. timer duration 0, reason 3.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847096 delete. curr ref count 1, del flags 0x3
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847096, ref cnt 1, status: Error ok
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847096 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 stop timer. timer duration 0, reason 0.
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847096 (ref cnt 0), waiting_for_del 0x0
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 start timer. timer duration 30, reason 1.
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847097 in peer entry 0xee3800
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 19c1e16d dd74b9b9 - 00000000 00000000 }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 19c1e16d dd74b9b9 - 00000000 00000000}, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 19c1e16d dd74b9b9 - 00000000 00000000 }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 19c1e16d dd74b9b9 - 00000000 00000000 } -> { ... - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6139]
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = b77596f3 8643257b ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 034b164f 1668e949 ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5324]
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 9142fb83 28a809c7 ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x19c1e16d dd74b9b9 - 0x2e2a4137 81d10f2b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 stop timer. timer duration 30, reason 1.
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 start timer. timer duration 0, reason 3.
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x70c0b0f, protocol=0) entry to the spi table
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x2df946a1, protocol=0) entry to the spi table
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 2b93b101
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6096]
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847097 sa-cfg Colo_VPN
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 2b93b101, nego = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 35d70b37 750ff2dd ...
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847097 delete. curr ref count 2, del flags 0x2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847097, ref cnt 2, status: Error ok
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = c923872a
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / c923872a, nego = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847097 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 stop timer. timer duration 0, reason 0.
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 reference count is not zero (1). Delaying deletion of SA
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847097 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847097 from peer entry 0xee3800
    [May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 4e75e70a c12ab1c7 - 04633986 1808f5be }
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 start timer. timer duration 30, reason 1.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  00000000: 0463 3986 1808 f5be                      .c9.....
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  00000000: cf42 f52c 16ee 1c42                      .B.,...B
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2d800 from freelist
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, remote = 1.1.1.1:500
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 9126ec06 fee45e46 ...
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f5319a54 17803b8e ...
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6284]
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5465]
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2dc00 from freelist
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, remote = 1.1.1.1:500
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 10028f66 729ba0ee ...
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x4e75e70a c12ab1c7 - 0xcf42f52c 16ee1c42 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 stop timer. timer duration 30, reason 1.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 start timer. timer duration 0, reason 3.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847098 delete. curr ref count 1, del flags 0x3
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847098, ref cnt 1, status: Error ok
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847098 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 stop timer. timer duration 0, reason 0.
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847098 (ref cnt 0), waiting_for_del 0x0
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 88245fff 590c6db7 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 88245fff 590c6db7 - a3322cd8 e6a3cd37 }
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 start timer. timer duration 30, reason 1.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  00000000: a332 2cd8 e6a3 cd37                      .2,....7
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  00000000: 62be 219e 2528 677d                      b.!.%(g}
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2e400 from freelist
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } / 00000000, remote = 1.1.1.1:500
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 09810e38 6b3e5ed6 ...
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = e6f84c2a 2fe6fb6e ...
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6144]
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5397]
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2e800 from freelist
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } / 00000000, remote = 1.1.1.1:500
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 18dc6279 ffe68499 ...
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x88245fff 590c6db7 - 0x62be219e 2528677d } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 stop timer. timer duration 30, reason 1.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 start timer. timer duration 0, reason 3.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847099 delete. curr ref count 1, del flags 0x3
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847099, ref cnt 1, status: Error ok
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d }
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847099 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 stop timer. timer duration 0, reason 0.
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847099 (ref cnt 0), waiting_for_del 0x0
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 start timer. timer duration 30, reason 1.
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847100 in peer entry 0xee3800
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors
    
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 216909ba 442354e5 - 00000000 00000000 }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 216909ba 442354e5 - 00000000 00000000}, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - 00000000 00000000 } / 00000000, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 216909ba 442354e5 - 00000000 00000000 }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 216909ba 442354e5 - 00000000 00000000 } -> { ... - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6320]
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d95abcf9 e5a2fd76 ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = a1afbbf0 bdd582d9 ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128
    
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5308]
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = a68929d1 35cb922f ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x216909ba 442354e5 - 0xe6ff0043 1ad96c6f } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 stop timer. timer duration 30, reason 1.
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 start timer. timer duration 0, reason 3.
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x3c87e713, protocol=0) entry to the spi table
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x3fe4d380, protocol=0) entry to the spi table
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = baca2511
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6363]
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847100 sa-cfg Colo_VPN
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet
    
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / baca2511, nego = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 878a16d9 8112bb55 ...
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847100 delete. curr ref count 2, del flags 0x2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847100, ref cnt 2, status: Error ok
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = cfbe3c7f
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / cfbe3c7f, nego = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847100 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 stop timer. timer duration 0, reason 0.
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 reference count is not zero (1). Delaying deletion of SA
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847100 (ref cnt 0), waiting_for_del 0xe729c0
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847100 from peer entry 0xee3800
    [May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
    

    Finally, the iKE debug from the SSG

    ## 2016-05-22 22:00:18 : IKE<0.0.0.0        >   protocol matched expected<0>.
    ## 2016-05-22 22:00:18 : IKE<0.0.0.0        >   port matched expect l:<0>, r<0>.
    ## 2016-05-22 22:00:18 : ipvx = IPV4
    ## 2016-05-22 22:00:18 : rcv_local_addr = 172.16.10.0, rcv_local_mask = 255.255.255.0, p_rcv_local_real = 172.16.10.0 
    ## 2016-05-22 22:00:18 : rcv_remote_addr = 172.16.72.0, rcv_remote_mask = 255.255.255.0, p_rcv_remote_real = 172.16.72.0 
    ## 2016-05-22 22:00:18 : ike_p2_id->local_ip = 172.16.10.0, cfg_local_mask = 255.255.255.0, p_cfg_local_real = 172.16.10.0 
    ## 2016-05-22 22:00:18 : ike_p2_id->remote_ip = 172.16.72.0, cfg_remote_mask = 255.255.255.0, p_cfg_remote_real = 172.16.72.0 
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Proxy ID match: Located matching Phase 2 SA <16>.
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> resolve concurrent session for peer. exist<3c623f10> drop new<2e5342cc>.
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> oakley_process_quick_mode():exit
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2>   Delete conn entry...
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2>  ...found conn entry(2e5342cc) 
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> 
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Catcher: received 84 bytes from socket.
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Catcher: get 84 bytes. src port 500
    ## 2016-05-22 22:00:18 : IKE<0.0.0.0        >   ISAKMP msg: len 84, nxp 8[HASH], exch 5[INFO], flag 01  E
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Create conn entry...
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2>   ...done(new 85f84bad)
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Decrypting payload (length 56)
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2   > Recv*: [HASH] [DELETE]
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> Process [DELETE]:
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> DELETE payload received, deleting Phase-1 SA
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2>   Delete conn entry...
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2>  ...found conn entry(85f84bad) 
    ## 2016-05-22 22:00:18 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f>
    ## 2016-05-22 22:00:21 : IKE<0.0.0.0        >   IKE: phase-2 packet re-trans timer expired
    ## 2016-05-22 22:00:21 : IKE<2.2.2.2> phase-2 packet re-trans timer expired.
    ## 2016-05-22 22:00:21 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
    ## 2016-05-22 22:00:21 : IKE<2.2.2.2> Send Phase 2 packet (len=340)
    ## 2016-05-22 22:00:25 : IKE<0.0.0.0        >   IKE: phase-2 packet re-trans timer expired
    ## 2016-05-22 22:00:25 : IKE<2.2.2.2> phase-2 packet re-trans timer expired.
    ## 2016-05-22 22:00:25 : IKE<2.2.2.2>   Delete conn entry...
    ## 2016-05-22 22:00:25 : IKE<2.2.2.2>  ...found conn entry(3c623f10) 
    ## 2016-05-22 22:00:25 : IKE<2.2.2.2> XAuth for peer deactivated due to P2 retry timeout.
    ## 2016-05-22 22:00:26 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN
    ## 2016-05-22 22:00:26 : IKE<2.2.2.2>   ** link ready return 8
    ## 2016-05-22 22:00:26 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8
    ## 2016-05-22 22:00:26 : IKE<2.2.2.2>   local_if is bgroup0/0
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2>   create sa: 1.1.1.1->2.2.2.2
    ## 2016-05-22 22:00:33 : getProfileFromP1Proposal-> 
    ## 2016-05-22 22:00:33 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) 
    ## 2016-05-22 22:00:33 : init p1sa, pidt = 0x0 
    ## 2016-05-22 22:00:33 : change peer identity for p1 sa, pidt = 0x0
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   peer_identity_create_with_uid: uid<0>
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   create peer identity 0x6990b54
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   peer_identity_add_to_peer: num entry before add <1>
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   peer_identity_add_to_peer: num entry after add <2>
    ## 2016-05-22 22:00:33 : peer identity 6990b54 created.
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   EDIPI disabled
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1: Initiated negotiation in main mode. <1.1.1.1 => 2.2.2.2> 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct ISAKMP header.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Msg header built (next payload #1) 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [SA] for ISAKMP 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> auth(1)<PRESHRD>, encr(5)<3DES>, hash(2)<SHA>, group(2) 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> xauth attribute: disabled 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> lifetime/lifesize (28800/0)
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   set_phase1_transform, dh_group(2).
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct NetScreen [VID] 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct custom [VID] 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct custom [VID]
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2   > Xmit : [SA] [VID] [VID] [VID]
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Send Phase 1 packet (len=156) 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 2 task added 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ike packet, len 160, action 0 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Catcher: received 132 bytes from socket.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Catcher: get 132 bytes. src port 500
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   ISAKMP msg: len 132, nxp 1[SA], exch 2[MM], flag 00
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2   > Recv : [SA] [VID] [VID]
    ## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   extract payload (104):
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [VID]:
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2   >   Vendor ID:
    ## 2016-05-22 22:00:33 : af ca d7 13 68 a1 f1 c9  6b 86 96 fc 77 57 01 00 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [VID]:
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2   >   Vendor ID:
    ## 2016-05-22 22:00:33 : 69 93 69 22 87 41 c6 d4  ca 09 4c 93 e2 42 c9 de 
    ## 2016-05-22 22:00:33 : 19 e7 b7 c6 00 00 00 05  00 00 05 00 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [SA]:
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Proposal received: xauthflag 0 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> auth(1)<PRESHRD>, encr(5)<3DES>, hash(2)<SHA>, group(2) 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> xauth attribute: disabled 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1 proposal [0] selected.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> SA Life Type = seconds 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> SA lifetime (TV) = 28800 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1 MM Initiator constructing 3rd message.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct ISAKMP header.
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Msg header built (next payload #4) 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [KE] for ISAKMP 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [NONCE]
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2   > Xmit : [KE] [NONCE]
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> Send Phase 1 packet (len=196) 
    ## 2016-05-22 22:00:33 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800207> 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2>   ** link ready return 8
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2>   local_if is bgroup0/0
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ike packet, len 208, action 0 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: received 180 bytes from socket.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Recv : [KE] [NONCE]
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   extract payload (152):
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [KE]:
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> processing ISA_KE in phase 1.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [NONCE]:
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> processing NONCE in phase 1.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> gen_skeyid() 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> gen_skeyid: returning 0 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 1 MM Initiator constructing 5th message.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct ISAKMP header.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Msg header built (next payload #5) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for ISAKMP 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Use Maverick_Colo as IKE p1 ID.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [HASH] 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Use Maverick_Colo as IKE p1 ID.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID, len=17, type=2, pro=17, port=500, 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2>
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Xmit*: [ID] [HASH]
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Encrypt P1 payload (len 73) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Send Phase 1 packet (len=76) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80120f> 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ike packet, len 96, action 0 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: received 68 bytes from socket.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: get 68 bytes. src port 500
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   ISAKMP msg: len 68, nxp 5[ID], exch 2[MM], flag 01  E
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Decrypting payload (length 40)
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Recv*: [ID] [HASH]
    ## 2016-05-22 22:00:34 : valid id checking, id type:IP Address, len:12.
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   extract payload (40):
    ## 2016-05-22 22:00:34 : valid id checking, id type:IP Address, len:12.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> MM in state OAK_MM_KEY_EXCH.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [ID]:
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID received: type=ID_IPV4_ADDR, ip = 2.2.2.2, port=0, protocol=0 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer gateway entry has no peer id configured 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID processed. return 0. sa->p1_state = 2.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [HASH]:
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID, len=8, type=1, pro=0, port=0, 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> addr=2.2.2.2 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> completing Phase 1 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> sa_pidt = 6990b54 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> found existing peer identity 698ed98 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer_identity_unregister_p1_sa.
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   delete peer identity 0x6990b54
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   peer_identity_remove_from_peer: num entry before remove <2>
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> phase 1 sa timeout value reduced <28784> to <30>.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 1: Completed Main mode negotiation with a <28800>-second lifetime.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 2: Initiated Quick Mode negotiation.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase-2: start quick mode negotiation 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase-2: no change in Modecfg IPv4 address for tunnel ifp.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Create conn entry...
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2>   ...done(new f3a04cd6)
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator not set commit bit on 1st QM.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> DH_BG_consume OK. p2 init
    ## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   add sa list for msg id <f3a04cd6>
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> get_unique_spi 0, 2589482087, 9a585c67 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> 0,0/0(0)/spi(9a585c67)/keylen(0) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct ISAKMP header.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Msg header built (next payload #8) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [HASH] 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [SA] for IPSEC 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Set IPSEC SA attrs: lifetime(3600/0) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> atts<00000003 00000000 00000003 00000002 00000001 00000002> 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> proto(3)<ESP>, esp(3)<ESP_3DES>, auth(2)<SHA>, encap(1)<TUNNEL>, group(2) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Before NAT-T attr unmap: private tunnel = 1.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> After NAT-T attr unmap: private tunnel = 1.
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Policy have separate SA. Use P2 ID from policy sa (16).
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator P2 ID built: ....
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Responder P2 ID built: ....
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [NONCE] for IPSec 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [KE] for PFS 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for Phase 2 
    ## 2016-05-22 22:00:34 : id payload constructed. type(4),ip(172.16.10.0),mask(255.255.255.0), prot(0), port(0) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for Phase 2 
    ## 2016-05-22 22:00:34 : id payload constructed. type(4),ip(172.16.72.0),mask(255.255.255.0), prot(0), port(0) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> construct NOTIFY_NS_NHTB_INFORM: attr INTERNAL_IPx_ADDRESS, value 172.16.10.254, datalen 12 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [NOTIF] (NOTIFY_NS_NHTB_INFORM) for IPSEC 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> construct QM HASH
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Xmit*: [HASH] [SA] [NONCE] [KE] [ID] [ID] [NOTIF]
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Encrypt P2 payload (len 332) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> Send Phase 2 packet (len=340) 
    ## 2016-05-22 22:00:34 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> 
    ## 2016-05-22 22:00:35 : reap_db. deleting p1sa 6998424 
    ## 2016-05-22 22:00:35 : terminate_SA: trying to delete SA cause: 0 cond: c2 
    ## 2016-05-22 22:00:35 : IKE<2.2.2.2> xauth_cleanup() 
    ## 2016-05-22 22:00:35 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA 
    ## 2016-05-22 22:00:35 : peer_identity_unregister_p1_sa.
    ## 2016-05-22 22:00:35 : reap_db. deleting p1sa 6998d6c 
    ## 2016-05-22 22:00:35 : terminate_SA: trying to delete SA cause: 0 cond: 2 
    ## 2016-05-22 22:00:35 : peer_identity_unregister_p1_sa.
    ## 2016-05-22 22:00:35 : IKE<0.0.0.0        >   delete peer identity 0x698fb1c
    ## 2016-05-22 22:00:35 : IKE<0.0.0.0        >   peer_identity_remove_from_peer: num entry before remove <2>
    ## 2016-05-22 22:00:35 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted.
    ## 2016-05-22 22:00:35 : X509_free <03dba0d8>.
    ## 2016-05-22 22:00:35 : X509_free: CN=0185042012000312,CN=system generated,CN=self-signed, 
    ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
    ## 2016-05-22 22:00:35 : build_ike_pki_mail: key_type=0 
    ## 2016-05-22 22:00:35 : processPkiRequest cmd=0 
    ## 2016-05-22 22:00:35 : certReqHandler: req=7607d3c task=205e77c 
    ## 2016-05-22 22:00:35 : build_ike_pki_mail: key_type=0 
    ## 2016-05-22 22:00:35 : pki mail received.
    ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
    ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
    ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
    ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
    ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
    ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
    ## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
    ## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
    ## 2016-05-22 22:00:35 : cert into stack: CN=0185042012000312,CN=system generated,CN=self-signed, 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : buffer_write: <86> 
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <86> 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : buffer_write: <574> 
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <574> 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : buffer_write: <9> 
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <9> 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <669> 
    ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b<02b2bb84> 
    ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b next<02b29b1c> 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : buffer_write: <6> 
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <6> 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : buffer_write: <37> 
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <37> 
    ## 2016-05-22 22:00:35 : bio_write, before bwrite.
    ## 2016-05-22 22:00:35 : bio_write, after bwrite. <43> 
    ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b<02b2bb84> 
    ## 2016-05-22 22:00:35 : BIO_copy_next_retry: b next<02b29b1c>
    

    Show security IKE Security-assoc is blank



  • 7.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-23-2016 09:25

    well we reverted back to the SSG5 and once i updated it to the new PSK, it connects right up.

     

    I will likely try this again this weekend, so if anyone can provide some helps/tips it would be GREATLY appreciated.



  • 8.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-23-2016 18:10

    Looking closer at the two configurations,  I think you have PFS enabled on the SRX but not on the SSG.  Please try removing PFS from this policy.

     

    policy ipsec_pol_Colo_VPN {
                perfect-forward-secrecy {
                    keys group2;
                }
                proposals Colo_IPSEC_P2;
            }


  • 9.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-24-2016 07:24

    Thank you sir!  Will hopefully be able to try sometime this week as remote resources allow.



  • 10.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-24-2016 10:22

    thanks but did not work. same error in the KMD log as before:

    IKE negotiation failed with error: Authentication failed.

     

    However the SSG140 says:

    2016-05-24 12:16:36 info IKE 2.2.2.2 Phase 2: Initiated negotiations. 
    2016-05-24 12:16:36 info IKE 2.2.2.2 Phase 1: Completed Main mode negotiations with a 28800-second lifetime. 
    2016-05-24 12:16:35 info IKE 2.2.2.2 phase 1:The symmetric crypto key has been generated successfully. 
    2016-05-24 12:16:35 info IKE1.1.1.1 2.2.2.2 Phase 1: Initiated negotiations in main mode. 
    2016-05-24 12:16:32 info IKE 2.2.2.2 Phase 2 msg ID 717d4ee7: Negotiations have failed. 
    2016-05-24 12:16:32 info Rejected an IKE packet on bgroup0/0 from 2.2.2.2:500 to 1.1.1.1:500 with cookies d0967a1eecd7303a and 984bed1d232d305e because There were no acceptable Phase 2 proposals.. 
    2016-05-24 12:16:32 info IKE 2.2.2.2 Phase 2 msg ID 717d4ee7: Responded to the peer's first message. 
    2016-05-24 12:16:32 info IKE 2.2.2.2: Received initial contact notification and removed Phase 1 SAs. 
    2016-05-24 12:16:32 info IKE 2.2.2.2 Phase 1: Completed Main mode negotiations with a 28800-second lifetime. 
    2016-05-24 12:16:32 info IKE 2.2.2.2: Received initial contact notification and removed Phase 2 SAs. 
    2016-05-24 12:16:32 info IKE 2.2.2.2: Received a notification message for DOI 1 24578 INITIAL-CONTACT. 
    2016-05-24 12:16:32 info IKE 2.2.2.2 phase 1:The symmetric crypto key has been generated successfully. 
    2016-05-24 12:16:32 info IKE 2.2.2.2 Phase 1: Responder starts MAIN mode negotiations. 
    2016-05-24 12:15:56 info IKE 2.2.2.2 Phase 2: Initiated negotiations. 
    2016-05-24 12:15:56 info IKE 2.2.2.2 Phase 1: Completed Main mode negotiations with a 28800-second lifetime. 
    2016-05-24 12:15:56 info IKE 2.2.2.2 phase 1:The symmetric crypto key has been generated successfully. 
    2016-05-24 12:15:56 info IKE1.1.1.1 2.2.2.2 Phase 1: Initiated negotiations in main mode. 

    Looking closer the SSG140 is using PFE Group 2, see attached pics

     

     

    I have set the SRX back to PFE, group 2.

     

    On the SSG140 it always hangs at: Phase 2: Initiated negotiations

     

    when i rolled back to the SSG5 it completed. Portioin of the SSG140 log when the SSG5 comes back online:

    2016-05-24 12:50:03   system   info  00536  IKE 2.2.2.2 Phase 2 msg ID 9fb436ef: Completed negotiations with SPI 9a586249, tunnel ID 16, and lifetime 3600 seconds/0 KB.
    2016-05-24 12:50:03   system   info  00536  IKE 2.2.2.2 phase 2:The symmetric crypto key has been generated successfully.
    2016-05-24 12:50:03   system   info  00536  IKE 2.2.2.2: Received a notification message for DOI 1 40001 NOTIFY_NS_NHTB_INFORM.
    2016-05-24 12:50:03   system   info  00536  IKE 2.2.2.2 Phase 2: Initiated negotiations.
    2016-05-24 12:50:03   system   info  00536  IKE 2.2.2.2 Phase 1: Completed Main mode negotiations with a 28800-second lifetime.
    2016-05-24 12:50:03   system   info  00536  IKE 2.2.2.2 phase 1:The symmetric crypto key has been generated successfully.
    2016-05-24 12:50:03   system   info  00536  IKE1.1.1.1 2.2.2.2 Phase 1: Initiated negotiations in main mode.

     



  • 11.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-24-2016 14:05
      |   view attached

    attached is full KMD log from around the time i switched back to PFE Group2.

     

    I also tried removing Proxy/remote id from SRX P2 but dont recall if it was in this capture.

    Attachment(s)

    txt
    kmd 5-24.txt   387 KB 1 version


  • 12.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-28-2016 05:27

    Sorry about the PFS, you are correct I misread the proposal listings there.

     

    As far as the proxy-id are concerned, these are explicitly configured on the SSG140 side so would need to remain on the SRX or be removed from both.

     

    set vpn "Dallas_VPN" proxy-id local-ip 172.16.10.0/24 remote-ip 172.16.72.0/24 "ANY" 

    The other configuration I notice on the SSG140 is enabling tunnel monitor with the default settings.  I have had issues with this combination if the remote side is not also an SSG firewall.  I would either remove the setting or change this to use ping to a specific remote address from an interface on the SSG140 that is in the local proxy-id subnet.

     

    Also if the status of the IKE and SA could be grabbed on both sides during the issue these might be helpful.  I see the IKE in some of the above but not the SA.

     

    SSG

    get ike cookie
    
    get sa

    SRX

    show security security-association ike
    
    show security security-association ipsec

     



  • 13.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-30-2016 08:38

    Thanks Steve for your continued efforts!

     

    I have replicated much of the environment in a home lab with a SSG5 running the SSG140 config and the SRX100H2 trying to connect to the SSG. I have 2 Netscreen 5GT's simulating 2 other VPN sites connecting with no issues. In my home lab:

    SSG5 Public=1.1.1.1

    Dallas SRX Public=1.1.1.5

     

    I have gotten to the point where the SSG continually states:

    2016-05-29 11:56:57 system info  00536 Rejected an IKE packet on ethernet0/0 
                                           from 1.1.1.5:500 to 1.1.1.1:500 with 
                                           cookies ff4f91971ecbe61b and 
                                           4a1d3b8d654e7c36 because There was a 
                                           preexisting session from the same 
                                           peer.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5 Phase 2 msg ID b83e8b72: 
                                           Responded to the peer's first message.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5: Received initial contact 
                                           notification and removed Phase 1 SAs.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5 Phase 1: Completed Main 
                                           mode negotiations with a 28800-second 
                                           lifetime.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5: Received initial contact 
                                           notification and removed Phase 2 SAs.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5: Received a notification 
                                           message for DOI 1 24578 
                                           INITIAL-CONTACT.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5 phase 1:The symmetric 
                                           crypto key has been generated 
                                           successfully.
    2016-05-29 11:56:57 system info  00536 IKE 1.1.1.5 Phase 1: Responder starts 
                                           MAIN mode negotiations.
    2016-05-29 11:56:32 system info  00536 IKE 1.1.1.5 Phase 2: Initiated 
                                           negotiations.
    2016-05-29 11:56:32 system info  00536 IKE 1.1.1.5 Phase 1: Completed Main 
                                           mode negotiations with a 28800-second 
                                           lifetime.
    2016-05-29 11:56:32 system info  00536 IKE 1.1.1.5 phase 1:The symmetric 
                                           crypto key has been generated 
                                           successfully.
    2016-05-29 11:56:32 system info  00536 IKE1.1.1.1 1.1.1.5 Phase 1: Initiated 
                                           negotiations in main mode.

    And i have adjusted the ike soft-lifetime-buffer from 30-45-90-120-180 with no resolution. I have disable VPN monitor 

    for the Dallas VPN tunnel on the SSG and no change.

     

    Here is the IKE/SA info from the SSG:

    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2016.05.30 10:29:39 =~=~=~=~=~=~=~=~=~=~=~=
    login as: admin
    admin@172.16.10.254's password: 
    Remote Management Console
    firewall-FW01.adminGLOBAL.COM-> get ike cookie
    
    IKEv1 SA -- Active: 4, Dead: 1, Total 6
    
    80122f/0003, 1.1.1.5:500->1.1.1.1:500, PRESHR/grp2/3DES/SHA, xchg(5) (Dallas_VPN_Gateway/grp-1/usr-1)
    resent-tmr 322 lifetime 28800 lt-recv 28800 nxt_rekey 28797 cert-expire 0
    responder, err cnt 0, send dir 1, cond 0xc2
    nat-traversal map not available
    ike heartbeat              : disabled
    ike heartbeat last rcv time: 0
    ike heartbeat last snd time: 0
    XAUTH status: 0
    DPD seq local 0, peer 0
    
    100001/0000, 1.1.1.1:500->216.89.164.100:500, NONE/grp0/NULL/NULL, xchg(2) (SAVVIS_VPN_GATEWAY/grp-1/usr-1)
    resent-tmr 39 lifetime 28800 lt-recv 0 nxt_rekey 28782 cert-expire 0
    initiator, err cnt 4, send dir 0, cond 0x0
    nat-traversal map not available
    ike heartbeat              : disabled
    ike heartbeat last rcv time: 0
    ike heartbeat last snd time: 0
    XAUTH status: 0
    DPD seq local 0, peer 0
    
    p2_tasks:
    
    task_type = 0x3
    p2 sa id = 0xf (index 0x0)
    app_sa_flags = 0x5000a4
    p2 spi = 0x0
    
    80122f/0003, 1.1.1.1:500->1.1.1.5:500, PRESHR/grp2/3DES/SHA, xchg(2) (Dallas_VPN_Gateway/grp-1/usr-1)
    resent-tmr 322 lifetime 28800 lt-recv 28800 nxt_rekey 27 cert-expire 0
    initiator, err cnt 0, send dir 0, cond 0x0
    nat-traversal map not available
    ike heartbeat              : disabled
    ike heartbeat last rcv time: 0
    ike heartbeat last snd time: 0
    XAUTH status: 0
    DPD seq local 0, peer 0
    
    80122f/0003, 1.1.1.1:500->1.1.1.5:500, PRESHR/grp2/3DES/SHA, xchg(2) (Dallas_VPN_Gateway/grp-1/usr-1)
    resent-tmr 322 lifetime 28800 lt-recv 28800 nxt_rekey 7 cert-expire 0
    initiator, err cnt 0, send dir 0, cond 0x0
    nat-traversal map not available
    ike heartbeat              : disabled
    ike heartbeat last rcv time: 0
    ike heartbeat last snd time: 0
    XAUTH status: 0
    DPD seq local 0, peer 0
    
    80522f/0003, 1.1.1.1:500->1.1.1.2:500, PRESHR/grp2/3DES/SHA, xchg(5) (Santa_Ana_Gateway/grp-1/usr-1)
    resent-tmr 322 lifetime 28800 lt-recv 28800 nxt_rekey 13603 cert-expire 0
    initiator, err cnt 0, send dir 0, cond 0x0
    nat-traversal map not available
    ike heartbeat              : disabled
    ike heartbeat last rcv time: 0
    ike heartbeat last snd time: 0
    XAUTH status: 0
    DPD seq local 0, peer 0
    
    80522f/0003, 1.1.1.1:500->1.1.1.4:500, PRESHR/grp2/3DES/SHA, xchg(5) (Coatesville_Gateway/grp-1/usr-1)
    resent-tmr 322 lifetime 28800 lt-recv 28800 nxt_rekey 13588 cert-expire 0
    initiator, err cnt 0, send dir 0, cond 0x0
    nat-traversal map not available
    ike heartbeat              : disabled
    ike heartbeat last rcv time: 0
    ike heartbeat last snd time: 0
    XAUTH status: 0
    DPD seq local 0, peer 0
    
    
    IKEv2 SA -- Active: 0, Dead: 0, Total 0
    
    firewall-FW01.adminGLOBAL.COM-> get sa
    total configured sa: 10
    HEX ID    Gateway         Port Algorithm     SPI      Life:sec kb Sta   PID vsys
    0000000f<  216.89.164.100  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    0000000f>  216.89.164.100  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000010<         1.1.1.5  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000010>         1.1.1.5  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000011<     173.9.234.1  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000011>     173.9.234.1  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000012<   66.192.88.194  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000012>   66.192.88.194  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000013<  174.76.146.175  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000013>  174.76.146.175  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000014<         1.1.1.4  500 esp:3des/sha1 e18bd51d  2122 unlim A/U    -1 0
    00000014>         1.1.1.4  500 esp:3des/sha1 a4f53bb3  2122 unlim A/U    -1 0
    00000015<  50.206.204.178  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000015>  50.206.204.178  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000016<    98.185.192.7  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000016>    98.185.192.7  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000017<         1.1.1.2  500 esp:3des/sha1 e18bd51f  2141 unlim A/U    -1 0
    00000017>         1.1.1.2  500 esp:3des/sha1 6b16f254  2141 unlim A/U    -1 0
    00000018< 206.169.112.202  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    00000018> 206.169.112.202  500 esp:3des/sha1 00000000 expir unlim I/I    -1 0
    firewall-FW01.adminGLOBAL.COM-> exit

    The show security associations on the SRX return nothing.

    admin@Dallas_SRX> show security ike security-associations detail
    
    admin@Dallas_SRX> show security ike security-associations
    
    admin@Dallas_SRX> show security ipsec security-associations
      Total active tunnels: 0

    I found this forum post: http://forums.juniper.net/t5/ScreenOS-Firewalls-NOT-SRX/help-because-There-was-a-preexisting-session-from-the-same-peer/m-p/258729#M28974

     

    I have IKE service in both the Interface/Zone level on the Internet zone.

      security-zone Internet {
                host-inbound-traffic {
                    system-services {
                        ike;
                    }
                }
                interfaces {
                    fe-0/0/0.0 {
                        host-inbound-traffic {
                            system-services {
                                https;
                                ssh;
                                ike;
                            }
                        }
                    }
                }
            }

    The post bout the loopback adapter refers to a Policy based VPN and mine is Route based...so not sure if that applies?



  • 14.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-31-2016 02:58

    I don't think the linked issue applies here because their problem seems to have been nat on the gateway address.

     

    Did you also remove the vpn monitor from the SRX config?   I just noticed that was in there as well.  This also is a design that only works with SRX to SRX models.  And might explain why the tunnels are pulled down.

     

    I would also check removing establish tunnels immediately.  The messages could indicate both sides are trying to be initiator.

     

    Could you post the lab SSG5 hub and SRX branch config?  I would like to give it a go in the lab as well.



  • 15.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-31-2016 07:31

    Yep, i took VPN monitor off the SRX back in message 5 as that got me some SA's. I removed Establish immediately and seems the SSG5 still registering the preexisting peer message.

     

    config's attached.

     

    Thanks

    Attachment(s)

    txt
    ssg5 config.txt   37 KB 1 version
    txt
    SRX config.txt   10 KB 1 version


  • 16.  RE: Replacing a SSG5 with SRX100H2 in branch office

     
    Posted 05-31-2016 08:06

    Hello.

     

    Looking at the config, there is potential mismatch in the local/remote ID sent between the firewalls during Phase1 negotiation.

     

    Can you try to add the following on the SRX?

     

    set security ike gateway gw_Colo_VPN remote-identity hostname admin_Colo

     

    Or alternatively, try removing the 'local-id' option on the SSG.

     

    With main mode, this option is typically not required.

     

     

     

     

    Regards,

    Sam



  • 17.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-31-2016 09:00

    SWEET! Tunnel is up! I added that remote identity Host name containing the SSG hostname.

     

    Now, do i need to add all these subnets to the VPN security zone to be able to reach all my other remote subnets?


    route 172.16.16.0/24 next-hop st0.0;
    route 172.16.17.0/24 next-hop st0.0;
    route 172.16.18.0/24 next-hop st0.0;
    route 172.16.19.0/24 next-hop st0.0;
    route 172.16.20.0/24 next-hop st0.0;
    route 172.16.42.0/24 next-hop st0.0;
    route 172.16.52.0/24 next-hop st0.0;
    route 172.16.82.0/24 next-hop st0.0;
    route 172.16.102.0/24 next-hop st0.0;
    route 172.16.112.0/24 next-hop st0.0;
    route 172.16.122.0/24 next-hop st0.0;
    route 172.16.142.0/24 next-hop st0.0;
    route 172.16.152.0/24 next-hop st0.0;
    route 172.16.162.0/24 next-hop st0.0;
    route 172.16.182.0/24 next-hop st0.0;
    route 172.16.202.0/24 next-hop st0.0;
    route 172.16.222.0/24 next-hop st0.0;
    route 172.16.242.0/24 next-hop st0.0;
    route 148.56.232.0/22 next-hop st0.0;

     

    and i also have seen some posts reference setting an MTU on the tunnel. Should i set some MTU size?



  • 18.  RE: Replacing a SSG5 with SRX100H2 in branch office
    Best Answer

     
    Posted 05-31-2016 09:46

    Hello.

     

    Based on current configuration, yes, it's required to add the detination prefixes to the VPN zone address book.

     

    However, going forward, it's recommended to use 'global' address book, exclusively.

     

    https://www.juniper.net/documentation/en_US/junos-space14.1/topics/concept/junos-space-security-design-global-address-book-overview.html

     

    https://forums.juniper.net/t5/Automation/SRX-How-to-convert-zone-based-address-books-to-a-global-one/ta-p/284801

     

     

     

    Hope this helps.

     

    Sam



  • 19.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 05-31-2016 15:29
      |   view attached

    Ok thought the remote subnets would be simple, having an issue.

     

    So i added 172.16.182.0/24 to both VPN address book and to Trust zone and cannot reach it from a PC behind the 172.16.72.1 SRX.

     

    From the SRX via ssh, i can reach 172.16.182.0/24 and 172.16.242.0/24 subnets. I haven't even created anything yet for the 172.16.242.0/24 subnet yet.

     

    Attached is the current SRX config. Again, greatly appreciate the assitannce.

    Attachment(s)

    txt
    SRX config v5.txt   10 KB 1 version


  • 20.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 06-04-2016 04:16

    You will probably want to remove the proxy-id from both sides of the tunnel then in this situation.  these restrict what subnets can be sent over the tunnel.  If you remove them on both sides the Juniper devices will have no restriction, just routing alone will forward the traffic.

     

    You also then need to add the static route to the tunnel interface for the additional subnets.

     

    And of course you still need the security policies updated with the address objects previously mentioned.



  • 21.  RE: Replacing a SSG5 with SRX100H2 in branch office

    Posted 06-09-2016 19:53

    Sincere thanks for the help. I was able to get traffic going/coming from all subnets. While i initially added the subnets to the address book...didn't add them to the policies as you said. I left proxy-id's in place. 

     

    This was all done in a test lab and hopefully will be able to get this running onsite this weekend.

     

    Thanks again!