root@Juniper-vMX-Wanclouds> show version Hostname: Juniper-vMX-Wanclouds Model: vmx Junos: 17.2R1.13 JUNOS OS Kernel 64-bit [20170523.350481_builder_stable_10] JUNOS OS libs [20170523.350481_builder_stable_10] JUNOS OS runtime [20170523.350481_builder_stable_10] JUNOS OS time zone information [20170523.350481_builder_stable_10] JUNOS network stack and utilities [20170601.185252_builder_junos_172_r1] JUNOS modules [20170601.185252_builder_junos_172_r1] JUNOS mx modules [20170601.185252_builder_junos_172_r1] JUNOS libs [20170601.185252_builder_junos_172_r1] JUNOS OS libs compat32 [20170523.350481_builder_stable_10] JUNOS OS 32-bit compatibility [20170523.350481_builder_stable_10] JUNOS libs compat32 [20170601.185252_builder_junos_172_r1] JUNOS runtime [20170601.185252_builder_junos_172_r1] JUNOS Packet Forwarding Engine Simulation Package [20170601.185252_builder_junos_172_r1] JUNOS py extensions [20170601.185252_builder_junos_172_r1] JUNOS py base [20170601.185252_builder_junos_172_r1] JUNOS OS vmguest [20170523.350481_builder_stable_10] JUNOS OS crypto [20170523.350481_builder_stable_10] JUNOS mx libs compat32 [20170601.185252_builder_junos_172_r1] JUNOS mx runtime [20170601.185252_builder_junos_172_r1] JUNOS common platform support [20170601.185252_builder_junos_172_r1] JUNOS mx libs [20170601.185252_builder_junos_172_r1] JUNOS mtx Data Plane Crypto Support [20170601.185252_builder_junos_172_r1] JUNOS daemons [20170601.185252_builder_junos_172_r1] JUNOS mx daemons [20170601.185252_builder_junos_172_r1] JUNOS Services URL Filter package [20170601.185252_builder_junos_172_r1] JUNOS Services TLB Service PIC package [20170601.185252_builder_junos_172_r1] JUNOS Services SSL [20170601.185252_builder_junos_172_r1] JUNOS Services Stateful Firewall [20170601.185252_builder_junos_172_r1] JUNOS Services RPM [20170601.185252_builder_junos_172_r1] JUNOS Services PTSP Container package [20170601.185252_builder_junos_172_r1] JUNOS Services PCEF package [20170601.185252_builder_junos_172_r1] JUNOS Services NAT [20170601.185252_builder_junos_172_r1] JUNOS Services Mobile Subscriber Service Container package [20170601.185252_builder_junos_172_r1] JUNOS Services MobileNext Software package [20170601.185252_builder_junos_172_r1] JUNOS Services Logging Report Framework package [20170601.185252_builder_junos_172_r1] JUNOS Services LL-PDF Container package [20170601.185252_builder_junos_172_r1] JUNOS Services Jflow Container package [20170601.185252_builder_junos_172_r1] JUNOS Services Deep Packet Inspection package [20170601.185252_builder_junos_172_r1] JUNOS Services IPSec [20170601.185252_builder_junos_172_r1] JUNOS Services IDS [20170601.185252_builder_junos_172_r1] JUNOS IDP Services [20170601.185252_builder_junos_172_r1] JUNOS Services HTTP Content Management package [20170601.185252_builder_junos_172_r1] JUNOS Services Crypto [20170601.185252_builder_junos_172_r1] JUNOS Services Captive Portal and Content Delivery Container package [20170601.185252_builder_junos_172_r1] JUNOS Services COS [20170601.185252_builder_junos_172_r1] JUNOS AppId Services [20170601.185252_builder_junos_172_r1] JUNOS Services Application Level Gateways [20170601.185252_builder_junos_172_r1] JUNOS Services AACL Container package [20170601.185252_builder_junos_172_r1] JUNOS Extension Toolkit [20170601.185252_builder_junos_172_r1] JUNOS jfirmware [20170601.185252_builder_junos_172_r1] JUNOS Online Documentation [20170601.185252_builder_junos_172_r1] root@Juniper-vMX-Wanclouds> show configuration | display set set version 17.2R1.13 set groups global system host-name Juniper-vMX-Wanclouds set groups global system login user jnpr uid 2000 set groups global system login user jnpr class super-user set groups global system login user jnpr authentication ssh-rsa "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxHi+V3riqQj4QPAksAAs2ATrbJlUCyPzWEZtBtQS5pdjm6xa9xXVYcyxwEu3CmmyMDAf4xt6thJvvNZbFZRoo9k0W4cTn4BiqeBBhjfaPeowkErpNugCyJZMkmId/sdLuZ/TrcGV0ZFI8l8ojAZFt8Q/bh0vMBgbs2nfA/oVRk8RWh5fIVadC0ocjhKahO6QkZmlDQLKssWDHUBJSqjutCVTJlkvWfq3ieISxlGavYEcx99vycbyMExcOsl2kNetxNcd6hHNCJjsRaRJQd3TGzjsFYw8/nRwa1TacUts4Y7ni1QvObOdcGu4Hla8roGqAFr6vrPrZqs/I2ehTr4WT ix_vMX_key_pair_Jan7_Khalid" set groups global system services ssh set groups global system syslog user * any emergency set groups global system syslog file messages any notice set groups global system syslog file messages authorization info set groups global system syslog file interactive-commands interactive-commands any set groups global interfaces fxp0 unit 0 family inet address 10.0.254.223/24 set groups global interfaces ge-0/0/0 unit 0 family inet address 10.0.10.12/24 set groups global interfaces ge-0/0/1 unit 0 family inet address 10.0.20.81/24 set groups global interfaces si-0/0/0 unit 0 set groups global interfaces si-0/0/0 unit 1 family inet set groups global interfaces si-0/0/0 unit 1 service-domain inside set groups global interfaces si-0/0/0 unit 2 family inet set groups global interfaces si-0/0/0 unit 2 service-domain outside set groups global routing-options static route 0.0.0.0/0 next-hop 10.0.254.1 set groups global routing-options static route 0.0.0.0/0 retain set groups global routing-options static route 0.0.0.0/0 no-readvertise set apply-groups global set system root-authentication encrypted-password "$6$bVjvwR9a$fVRP/hbL8YGMmDjlU/ez1uqaogl9XPTrHo3dVHc2iPxwb1tcdUle1j.aOcVc2TGPIkr.EAoFHPz6oCXkb0E271" set services service-set IPSEC-SITE-TO-SITE next-hop-service inside-service-interface si-0/0/0.1 set services service-set IPSEC-SITE-TO-SITE next-hop-service outside-service-interface si-0/0/0.2 set services service-set IPSEC-SITE-TO-SITE ipsec-vpn-options local-gateway 10.0.10.12 set services service-set IPSEC-SITE-TO-SITE ipsec-vpn-options local-gateway routing-instance DATAPLANE-VMX-VPN-WANCLOUDS set services service-set IPSEC-SITE-TO-SITE ipsec-vpn-rules IPSec-VYATTA set services ipsec-vpn rule IPSec-VYATTA term 1 from source-address 10.0.20.0/24 set services ipsec-vpn rule IPSec-VYATTA term 1 from destination-address 192.168.100.0/24 set services ipsec-vpn rule IPSec-VYATTA term 1 then remote-gateway 168.1.114.92 set services ipsec-vpn rule IPSec-VYATTA term 1 then dynamic ike-policy IKE-Policy-Vyatta set services ipsec-vpn rule IPSec-VYATTA term 1 then dynamic ipsec-policy IPSec-Policy-Vyatta set services ipsec-vpn rule IPSec-VYATTA term 1 then initiate-dead-peer-detection set services ipsec-vpn rule IPSec-VYATTA match-direction input set services ipsec-vpn ipsec proposal IPSEC-Proposal-Vyatta protocol esp set services ipsec-vpn ipsec proposal IPSEC-Proposal-Vyatta authentication-algorithm hmac-md5-96 set services ipsec-vpn ipsec proposal IPSEC-Proposal-Vyatta encryption-algorithm 3des-cbc set services ipsec-vpn ipsec policy IPSec-Policy-Vyatta perfect-forward-secrecy keys group5 set services ipsec-vpn ipsec policy IPSec-Policy-Vyatta proposals IPSEC-Proposal-Vyatta set services ipsec-vpn ike proposal IKE-Proposal-Vyatta authentication-method pre-shared-keys set services ipsec-vpn ike proposal IKE-Proposal-Vyatta dh-group group5 set services ipsec-vpn ike proposal IKE-Proposal-Vyatta authentication-algorithm md5 set services ipsec-vpn ike proposal IKE-Proposal-Vyatta encryption-algorithm 3des-cbc set services ipsec-vpn ike proposal IKE-Proposal-Vyatta lifetime-seconds 86400 set services ipsec-vpn ike policy IKE-Policy-Vyatta proposals IKE-Proposal-Vyatta set services ipsec-vpn ike policy IKE-Policy-Vyatta pre-shared-key ascii-text "$9$EVryrvdVYoZjlKYo" set services ipsec-vpn traceoptions file VmxIPSECCommunity set services ipsec-vpn traceoptions file size 10m set services ipsec-vpn traceoptions file files 2 set services ipsec-vpn traceoptions level all set services ipsec-vpn traceoptions flag all set services ipsec-vpn establish-tunnels immediately set services ipsec-vpn disable-natt set routing-options static route 192.168.100.0/24 next-hop si-0/0/0.1 set routing-instances DATAPLANE-VMX-VPN-WANCLOUDS instance-type virtual-router set routing-instances DATAPLANE-VMX-VPN-WANCLOUDS interface ge-0/0/0.0 set routing-instances DATAPLANE-VMX-VPN-WANCLOUDS interface si-0/0/0.2 set routing-instances DATAPLANE-VMX-VPN-WANCLOUDS routing-options static route 0.0.0.0/0 next-hop 10.0.10.1 set routing-instances DATAPLANE-VMX-VPN-WANCLOUDS routing-options static route 192.168.100.0/24 next-hop 168.1.114.92 root@Juniper-vMX-Wanclouds> show log VmxIPSECCommunity Feb 6 23:59:08 ddc_ike_object d0138e24 Feb 6 23:59:08 Inside kmd_svc_ike_config... Feb 6 23:59:08 ddc_proposal_object d0138ea4 Feb 6 23:59:08 Inside kmd_ike_proposal_config... Feb 6 23:59:08 Creating a IKE proposal IKE-Proposal-Vyatta Feb 6 23:59:08 ddc_name_attr IKE-Proposal-Vyatta Feb 6 23:59:08 ddc_authentication_method_attr 1 Feb 6 23:59:08 ddc_dh_group_attr 5 Feb 6 23:59:08 ddc_authentication_algorithm_attr 1 Feb 6 23:59:08 ddc_encryption_algorithm_attr 2 Feb 6 23:59:08 ddc_lifetime_seconds_attr 86400 Feb 6 23:59:08 ddc_policy_object d013c0a4 Feb 6 23:59:08 ddc_name_attr IKE-Policy-Vyatta Feb 6 23:59:08 Creating a IKE policy IKE-Policy-Vyatta Feb 6 23:59:08 ddc_proposal_object d013c224 Feb 6 23:59:08 Inside kmd_proposal_name_list_config... Feb 6 23:59:08 ddc_name_attr IKE-Proposal-Vyatta Feb 6 23:59:08 peer-certificate-type 2 Feb 6 23:59:08 ddc_pre_shared_key_object d013c3a4 Feb 6 23:59:08 Inside kmd_key_config... Feb 6 23:59:08 ddc_ipsec_object d01388a4 Feb 6 23:59:08 Inside kmd_svc_ipsec_config... Feb 6 23:59:08 ddc_proposal_object d0138924 Feb 6 23:59:08 ddc_name_attr IPSEC-Proposal-Vyatta Feb 6 23:59:08 Creating a IPsec proposal IPSEC-Proposal-Vyatta Feb 6 23:59:08 ddc_protocol_attr 2 Feb 6 23:59:08 ddc_authentication_algorithm_attr 1 Feb 6 23:59:08 ddc_encryption_algorithm_attr 2 Feb 6 23:59:08 ddc_policy_object d0138aa4 Feb 6 23:59:08 ddc_name_attr IPSec-Policy-Vyatta Feb 6 23:59:08 Creating a IPsec policy IPSec-Policy-Vyatta Feb 6 23:59:08 ddc_pfs_object d0138c24 Feb 6 23:59:08 Inside kmd_ipsec_policy_pfs_config... Feb 6 23:59:08 ddc_keys_attr 5 Feb 6 23:59:08 ddc_proposals_object d0138ca4 Feb 6 23:59:08 Inside kmd_proposal_name_list_config... Feb 6 23:59:08 ddc_name_attr IPSEC-Proposal-Vyatta Feb 6 23:59:08 ddc_establish_tunnels_attr 1 Feb 6 23:59:08 ddc_disable_natt_attr 1 Feb 6 23:59:08 ddc_service_set_object d0138024 Feb 6 23:59:08 Inside kmd_service_set_config... Feb 6 23:59:08 ddc_ipsec_vpn_rules_object d013a524 Feb 6 23:59:08 ddc_service_set_name_attr IPSEC-SITE-TO-SITE Feb 6 23:59:08 ddc_ipsec_vpn_object d013a424 Feb 6 23:59:08 ddc_local_gateway_object d013a4a4 Feb 6 23:59:08 ddc_local_gateway_attr 10.0.10.12 Feb 6 23:59:08 ddc_routing_instance_attr DATAPLANE-VMX-VPN-WANCLOUDS Feb 6 23:59:08 no local-gw-ifl Feb 6 23:59:08 ddc_service_set_name_attr IPSEC-SITE-TO-SITE Feb 6 23:59:08 In kmd_pm_p1_data_table_init Feb 6 23:59:08 Added addr: 10.0.10.12 routing instance name: DATAPLANE-VMX-VPN-WANCLOUDS to local gateway tree Feb 6 23:59:08 Added instance: IPSEC-SITE-TO-SITE to Local gw: 10.0.10.12 Feb 6 23:59:08 ddc_service_set_next_hop_service_object d0138224 Feb 6 23:59:08 ddc_inside_service_interface_name_attr si-0/0/0.1 Feb 6 23:59:08 ddc_outside_service_interface_name_attr si-0/0/0.2 Feb 6 23:59:08 Inside kmd_rule_name_list_config... Feb 6 23:59:08 ddc_rule_name_attr IPSec-VYATTA Feb 6 23:59:08 Inside kmd_rule_config... Feb 6 23:59:08 ddc_match_direction_attr 1 Feb 6 23:59:08 ddc_term_object d0138324 Feb 6 23:59:08 ddc_term_name_attr 1 Feb 6 23:59:08 Creating SA configuration block __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:08 ddc_from_object d0138524 Feb 6 23:59:08 Inside kmd_from_config... Feb 6 23:59:08 ddc_source_address_object d01385a4 Feb 6 23:59:08 Inside kmd_addr_config... Feb 6 23:59:08 ddc_address_attr 10.0.20.0/24 Feb 6 23:59:08 ddc_destination_address_object d0138624 Feb 6 23:59:08 Inside kmd_addr_config... Feb 6 23:59:08 ddc_address_attr 192.168.100.0/24 Feb 6 23:59:08 ddc_then_object d01386a4 Feb 6 23:59:08 Inside kmd_then_config... Feb 6 23:59:08 ddc_remote_gateway_attr 168.1.114.92 Feb 6 23:59:08 ddc_dynamic_object d0138724 Feb 6 23:59:08 ddc_ike_policy_attr IKE-Policy-Vyatta Feb 6 23:59:08 ddc_ipsec_policy_attr IPSec-Policy-Vyatta Feb 6 23:59:08 ddc_tos_value 0 Feb 6 23:59:08 ddc_ttl_value 64 Feb 6 23:59:08 ddc_initiate_dead_peer_detection_attr 1 Feb 6 23:59:08 Inside kmd_if_config... Feb 6 23:59:08 interface name fxp0 Feb 6 23:59:08 Inside kmd_if_config... Feb 6 23:59:08 interface name ge-0/0/0 Feb 6 23:59:08 Inside kmd_if_config... Feb 6 23:59:08 interface name ge-0/0/1 Feb 6 23:59:08 Inside kmd_if_config... Feb 6 23:59:08 interface name si-0/0/0 Feb 6 23:59:08 Freeing the IKE policy IKE-Policy-Vyatta Feb 6 23:59:08 Freeoing up certificate policy oids 0 Feb 6 23:59:08 Freeing the IPsec policy IPSec-Policy-Vyatta Feb 6 23:59:08 Freeing the IPsec policy junos-ipsec-policy Feb 6 23:59:08 Freeing the SA configuration block __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:08 All p1 for this instance have been freed Feb 6 23:59:14 IN kmd_ipc_send_traceoptions_cfg Feb 6 23:59:14 Rec type : 09 Feb 6 23:59:14 Rec len : 8 Feb 6 23:59:14 Enable trace flag: ffffffff trace level: 5 Feb 6 23:59:14 Total msg len : 20 Feb 6 23:59:14 ddc_ike_object d0138e24 Feb 6 23:59:14 Inside kmd_svc_ike_config... Feb 6 23:59:14 ddc_proposal_object d0138ea4 Feb 6 23:59:14 Inside kmd_ike_proposal_config... Feb 6 23:59:14 Creating a IKE proposal IKE-Proposal-Vyatta Feb 6 23:59:14 ddc_name_attr IKE-Proposal-Vyatta Feb 6 23:59:14 ddc_authentication_method_attr 1 Feb 6 23:59:14 ddc_dh_group_attr 5 Feb 6 23:59:14 ddc_authentication_algorithm_attr 1 Feb 6 23:59:14 ddc_encryption_algorithm_attr 2 Feb 6 23:59:14 ddc_lifetime_seconds_attr 86400 Feb 6 23:59:14 ddc_policy_object d013c0a4 Feb 6 23:59:14 ddc_name_attr IKE-Policy-Vyatta Feb 6 23:59:14 Creating a IKE policy IKE-Policy-Vyatta Feb 6 23:59:14 ddc_proposal_object d013c224 Feb 6 23:59:14 Inside kmd_proposal_name_list_config... Feb 6 23:59:14 ddc_name_attr IKE-Proposal-Vyatta Feb 6 23:59:14 peer-certificate-type 2 Feb 6 23:59:14 ddc_pre_shared_key_object d013c3a4 Feb 6 23:59:14 Inside kmd_key_config... Feb 6 23:59:14 ddc_ipsec_object d01388a4 Feb 6 23:59:14 Inside kmd_svc_ipsec_config... Feb 6 23:59:14 ddc_proposal_object d0138924 Feb 6 23:59:14 ddc_name_attr IPSEC-Proposal-Vyatta Feb 6 23:59:14 Creating a IPsec proposal IPSEC-Proposal-Vyatta Feb 6 23:59:14 ddc_protocol_attr 2 Feb 6 23:59:14 ddc_authentication_algorithm_attr 1 Feb 6 23:59:14 ddc_encryption_algorithm_attr 2 Feb 6 23:59:14 ddc_policy_object d0138aa4 Feb 6 23:59:14 ddc_name_attr IPSec-Policy-Vyatta Feb 6 23:59:14 Creating a IPsec policy IPSec-Policy-Vyatta Feb 6 23:59:14 ddc_pfs_object d0138c24 Feb 6 23:59:14 Inside kmd_ipsec_policy_pfs_config... Feb 6 23:59:14 ddc_keys_attr 5 Feb 6 23:59:14 ddc_proposals_object d0138ca4 Feb 6 23:59:14 Inside kmd_proposal_name_list_config... Feb 6 23:59:14 ddc_name_attr IPSEC-Proposal-Vyatta Feb 6 23:59:14 ddc_establish_tunnels_attr 1 Feb 6 23:59:14 ddc_disable_natt_attr 1 Feb 6 23:59:14 ddc_service_set_object d0138024 Feb 6 23:59:14 Inside kmd_service_set_config... Feb 6 23:59:14 ddc_ipsec_vpn_rules_object d013a524 Feb 6 23:59:14 ddc_service_set_name_attr IPSEC-SITE-TO-SITE Feb 6 23:59:14 ddc_ipsec_vpn_object d013a424 Feb 6 23:59:14 ddc_local_gateway_object d013a4a4 Feb 6 23:59:14 ddc_local_gateway_attr 10.0.10.12 Feb 6 23:59:14 ddc_routing_instance_attr DATAPLANE-VMX-VPN-WANCLOUDS Feb 6 23:59:14 no local-gw-ifl Feb 6 23:59:14 ddc_service_set_name_attr IPSEC-SITE-TO-SITE Feb 6 23:59:14 In kmd_pm_p1_data_table_init Feb 6 23:59:14 Added addr: 10.0.10.12 routing instance name: DATAPLANE-VMX-VPN-WANCLOUDS to local gateway tree Feb 6 23:59:14 Added instance: IPSEC-SITE-TO-SITE to Local gw: 10.0.10.12 Feb 6 23:59:14 ddc_service_set_next_hop_service_object d0138224 Feb 6 23:59:14 ddc_inside_service_interface_name_attr si-0/0/0.1 Feb 6 23:59:14 ddc_outside_service_interface_name_attr si-0/0/0.2 Feb 6 23:59:14 Inside kmd_rule_name_list_config... Feb 6 23:59:14 ddc_rule_name_attr IPSec-VYATTA Feb 6 23:59:14 Inside kmd_rule_config... Feb 6 23:59:14 ddc_match_direction_attr 1 Feb 6 23:59:14 ddc_term_object d0138324 Feb 6 23:59:14 ddc_term_name_attr 1 Feb 6 23:59:14 Creating SA configuration block __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:14 ddc_from_object d0138524 Feb 6 23:59:14 Inside kmd_from_config... Feb 6 23:59:14 ddc_source_address_object d01385a4 Feb 6 23:59:14 Inside kmd_addr_config... Feb 6 23:59:14 ddc_address_attr 10.0.20.0/24 Feb 6 23:59:14 ddc_destination_address_object d0138624 Feb 6 23:59:14 Inside kmd_addr_config... Feb 6 23:59:14 ddc_address_attr 192.168.100.0/24 Feb 6 23:59:14 ddc_then_object d01386a4 Feb 6 23:59:14 Inside kmd_then_config... Feb 6 23:59:14 ddc_remote_gateway_attr 168.1.114.92 Feb 6 23:59:14 ddc_dynamic_object d0138724 Feb 6 23:59:14 ddc_ike_policy_attr IKE-Policy-Vyatta Feb 6 23:59:14 ddc_ipsec_policy_attr IPSec-Policy-Vyatta Feb 6 23:59:14 ddc_tos_value 0 Feb 6 23:59:14 ddc_ttl_value 64 Feb 6 23:59:14 ddc_initiate_dead_peer_detection_attr 1 Feb 6 23:59:14 Inside kmd_if_config... Feb 6 23:59:14 interface name fxp0 Feb 6 23:59:14 Inside kmd_if_config... Feb 6 23:59:14 interface name ge-0/0/0 Feb 6 23:59:14 Inside kmd_if_config... Feb 6 23:59:14 interface name ge-0/0/1 Feb 6 23:59:14 Inside kmd_if_config... Feb 6 23:59:14 interface name si-0/0/0 Feb 6 23:59:14 Inside kmd_diff_config_now... Feb 6 23:59:14 -------------------- IKE proposal config ---------------- Feb 6 23:59:14 Name: IKE-Proposal-Vyatta, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 86400, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh19, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group19 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha384-dh20, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-384, EncAlgo: aes-cbc, DH: group20 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-proposal, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 -------------------- IKE policy config ------------------ Feb 6 23:59:14 Name: IKE-Policy-Vyatta, Mode: main Feb 6 23:59:14 Proposals list: Feb 6 23:59:14 IKE-Proposal-Vyatta Feb 6 23:59:14 Local id: unknown(any:0,[0..0]=) Feb 6 23:59:14 Remote id list: Feb 6 23:59:14 (null) Feb 6 23:59:14 Cert file format: unset, Remote cert: (null) Feb 6 23:59:14 Local cert: (null), Local keypair: (null) Feb 6 23:59:14 Feb 6 23:59:14 ------------------- IPsec proposal config --------------- Feb 6 23:59:14 Name: IPSEC-Proposal-Vyatta, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-ah-md5, Proto: AH Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: (null), DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-ah-sha1, Proto: AH Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: (null), DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-3des-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-3des-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-128-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-128-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-192-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-192-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-256-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-256-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-des-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-des-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-3des-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-3des-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-128-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-128-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-192-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-192-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-192-sha256, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-256-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-256-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-des-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-des-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-des-sha256, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-proposal, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 ------------------- IPsec policy config ----------------- Feb 6 23:59:14 Name: IPSec-Policy-Vyatta Feb 6 23:59:14 Proposals list: Feb 6 23:59:14 IPSEC-Proposal-Vyatta Feb 6 23:59:14 Perfect forward secrecy: Feb 6 23:59:14 Keys: group5, Identities: FALSE Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-policy Feb 6 23:59:14 Proposals list: Feb 6 23:59:14 junos-ipsec-proposal Feb 6 23:59:14 Perfect forward secrecy: Feb 6 23:59:14 Keys: unknown, Identities: FALSE Feb 6 23:59:14 Feb 6 23:59:14 --------------------- IPsec SA config ------------------- Feb 6 23:59:14 Name: __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__, Owned by: AS PIC Feb 6 23:59:14 Rule Direction: input Feb 6 23:59:14 Flags: iff down, not an orphan, no df copy bit action, no df set bit action, no df clear bit action, non-link type Feb 6 23:59:14 Ifname: si-0/0/0, Unit: 1, AF: 0 Feb 6 23:59:14 Type: dynamic, Mode: tunnel, Replay: 64 Feb 6 23:59:14 IKE policy: IKE-Policy-Vyatta, IPsec policy: IPSec-Policy-Vyatta Feb 6 23:59:14 Local gateway: 10.0.10.12 Install interval: 0 Feb 6 23:59:14 Remote gateway: 168.1.114.92 State: Active Feb 6 23:59:14 Backup remote gateway: State: Unknown Feb 6 23:59:14 Proxy Source: ipv4_subnet(any:0,[0..7]=10.0.20.0/24) Feb 6 23:59:14 Proxy Destination: ipv4_subnet(any:0,[0..7]=192.168.100.0/24) Feb 6 23:59:14 Feb 6 23:59:14 --------------------- Instance config ------------------- Feb 6 23:59:14 Name: IPSEC-SITE-TO-SITE, Local gateway: 10.0.10.12 Feb 6 23:59:14 Service type: next-hop, Service interface name: si-0/0/0.2 Feb 6 23:59:14 Access profile: Feb 6 23:59:14 SA cfg list: Feb 6 23:59:14 __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:14 Trusted CA profile list: Feb 6 23:59:14 (null) Feb 6 23:59:14 Feb 6 23:59:14 ------------------- IKE access profile ----------------- Feb 6 23:59:14 No IKE access profiles configured Feb 6 23:59:14 ------------------- IPsec interface id pool ----------------- Feb 6 23:59:14 No IPsec interface id pools configured Feb 6 23:59:14 Freeing the SA configuration block __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:14 Contents of es interface lists differ Feb 6 23:59:14 Comparing the trusted CA profile list. Feb 6 23:59:14 All p1 for this instance have been freed Feb 6 23:59:14 Inside kmd_security_update_config... Feb 6 23:59:14 IN kmd_ipc_send_traceoptions_cfg Feb 6 23:59:14 Rec type : 09 Feb 6 23:59:14 Rec len : 8 Feb 6 23:59:14 Enable trace flag: ffffffff trace level: 5 Feb 6 23:59:14 Total msg len : 20 Feb 6 23:59:14 Freeing the IKE policy IKE-Policy-Vyatta Feb 6 23:59:14 Freeoing up certificate policy oids 0 Feb 6 23:59:14 Freeing the IPsec policy IPSec-Policy-Vyatta Feb 6 23:59:14 Freeing the IPsec policy junos-ipsec-policy Feb 6 23:59:14 BUFFER full, flush msg len 20 to all the pics now Feb 6 23:59:14 Adding END of record type: 11 Feb 6 23:59:14 -------------------- IKE proposal config ---------------- Feb 6 23:59:14 Name: IKE-Proposal-Vyatta, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 86400, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-3des-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: 3des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh19, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group19 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-128-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-192-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha256-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-aes-256-sha384-dh20, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha-384, EncAlgo: aes-cbc, DH: group20 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-md5-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh1, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group1 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh14, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group14 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh2, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-des-sha1-dh5, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: group5 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ike-proposal, Proto: ISAKMP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: group2 Feb 6 23:59:14 AuthMeth: Pre-shared-keys, Ltsecs: 3600, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 -------------------- IKE policy config ------------------ Feb 6 23:59:14 Name: IKE-Policy-Vyatta, Mode: main Feb 6 23:59:14 Proposals list: Feb 6 23:59:14 IKE-Proposal-Vyatta Feb 6 23:59:14 Local id: unknown(any:0,[0..0]=) Feb 6 23:59:14 Remote id list: Feb 6 23:59:14 (null) Feb 6 23:59:14 Cert file format: unset, Remote cert: (null) Feb 6 23:59:14 Local cert: (null), Local keypair: (null) Feb 6 23:59:14 Feb 6 23:59:14 ------------------- IPsec proposal config --------------- Feb 6 23:59:14 Name: IPSEC-Proposal-Vyatta, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-ah-md5, Proto: AH Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: (null), DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-ah-sha1, Proto: AH Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: (null), DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-3des-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-3des-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-128-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-128-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-192-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-192-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-256-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-aes-256-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-des-md5, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-bun-des-sha1, Proto: BUNDLE Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-3des-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-3des-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-128-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-128-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-192-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-192-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-192-sha256, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-256-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-aes-256-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: aes-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-des-md5, Proto: ESP Feb 6 23:59:14 AuthAlgo: md5, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-des-sha1, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-esp-des-sha256, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha-256, EncAlgo: des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-proposal, Proto: ESP Feb 6 23:59:14 AuthAlgo: sha1, EncAlgo: 3des-cbc, DH: unknown Feb 6 23:59:14 AuthMeth: Unknown, Ltsecs: 28800, Ltkb: 0 Feb 6 23:59:14 Feb 6 23:59:14 ------------------- IPsec policy config ----------------- Feb 6 23:59:14 Name: IPSec-Policy-Vyatta Feb 6 23:59:14 Proposals list: Feb 6 23:59:14 IPSEC-Proposal-Vyatta Feb 6 23:59:14 Perfect forward secrecy: Feb 6 23:59:14 Keys: group5, Identities: FALSE Feb 6 23:59:14 Feb 6 23:59:14 Name: junos-ipsec-policy Feb 6 23:59:14 Proposals list: Feb 6 23:59:14 junos-ipsec-proposal Feb 6 23:59:14 Perfect forward secrecy: Feb 6 23:59:14 Keys: unknown, Identities: FALSE Feb 6 23:59:14 Feb 6 23:59:14 --------------------- IPsec SA config ------------------- Feb 6 23:59:14 Name: __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__, Owned by: AS PIC Feb 6 23:59:14 Rule Direction: input Feb 6 23:59:14 Flags: iff down, not an orphan, no df copy bit action, no df set bit action, no df clear bit action, non-link type Feb 6 23:59:14 Ifname: si-0/0/0, Unit: 1, AF: 0 Feb 6 23:59:14 Type: dynamic, Mode: tunnel, Replay: 64 Feb 6 23:59:14 IKE policy: IKE-Policy-Vyatta, IPsec policy: IPSec-Policy-Vyatta Feb 6 23:59:14 Local gateway: 10.0.10.12 Install interval: 0 Feb 6 23:59:14 Remote gateway: 168.1.114.92 State: Active Feb 6 23:59:14 Backup remote gateway: State: Unknown Feb 6 23:59:14 Proxy Source: ipv4_subnet(any:0,[0..7]=10.0.20.0/24) Feb 6 23:59:14 Proxy Destination: ipv4_subnet(any:0,[0..7]=192.168.100.0/24) Feb 6 23:59:14 Feb 6 23:59:14 --------------------- Instance config ------------------- Feb 6 23:59:14 Name: IPSEC-SITE-TO-SITE, Local gateway: 10.0.10.12 Feb 6 23:59:14 Service type: next-hop, Service interface name: si-0/0/0.2 Feb 6 23:59:14 Access profile: Feb 6 23:59:14 SA cfg list: Feb 6 23:59:14 __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:14 Trusted CA profile list: Feb 6 23:59:14 (null) Feb 6 23:59:14 Feb 6 23:59:14 ------------------- IKE access profile ----------------- Feb 6 23:59:14 No IKE access profiles configured Feb 6 23:59:14 ------------------- IPsec interface id pool ----------------- Feb 6 23:59:14 No IPsec interface id pools configured Feb 6 23:59:14 Considering sa_cfg __IPSEC-SITE-TO-SITE.IPSec-VYATTA.1__ Feb 6 23:59:14 kmd_update_sa_cfg_for_active_instance is called Feb 6 23:59:14 In kmd_pm_process_all_delayed_requests Feb 6 23:59:14 Triggering all tunnels Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5b80 from freelist Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5b80/0] Allocating Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5b80/0] Processing received Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5b80/0] No IKE SA for packet; requesting permission to create one. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5b80/0] Pad allows connection Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000000: 57a0 1530 6a73 573b W..0jsW; Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 57a01530 6a73573b } Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 57a01530 6a73573b [-1] / 0x00000000 } IP; New SA Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5b80/0] Destructor Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5b80/0] Freeing Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000000: 57a0 1530 6a73 573b W..0jsW; Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 00000000: cefc e2de cb98 eff3 ........ Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - cefce2de cb98eff3} / 00000000, nego = -1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Restart packet Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - cefce2de cb98eff3}, nego = -1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - cefce2de cb98eff3} Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 656aebc8 initialized using slot 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 656aebc8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Sending negotiation back, error = 14 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - cefce2de cb98eff3 } / 656aebc8, nego = 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec cefce2de cb98eff3 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Encoded packet[102] = 0xca192621 3015c1ec cefce2de cb98eff3 0b100500 656aebc8 00000066 0000004a 00000001 0110000e ca192621 3015c1ec cefce2de cb98e Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - cefce2de cb98eff3}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Sending packet[102] = 0xca192621 3015c1ec cefce2de cb98eff3 0b100500 656aebc8 00000066 0000004a 00000001 0110000e ca192621 3015c1ec cefce2de cb98e Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - cefce2de cb98eff3}, nego = 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [0] / 0x656aebc8 } Info; Deleting negotiation Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - cefce2de cb98eff3}, nego = -1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Removing negotiation Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - cefce2de cb98eff3}, nego = -1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cefce2de cb98eff3 [-1] / 0x00000000 } IP; Deleting negotiation Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - cefce2de cb98eff3 } Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 6 23:59:22 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 6 23:59:33 In kmd_pm_process_all_delayed_requests Feb 6 23:59:33 Triggering all tunnels Feb 6 23:59:33 Global timer started with 60 seconds timeout Feb 6 23:59:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5e00 from freelist Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5e00/0] Allocating Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5e00/0] Processing received Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5e00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5e00/0] Pad allows connection Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000000: bffa 98e3 c1a6 dbc8 ........ Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - bffa98e3 c1a6dbc8 } Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - bffa98e3 c1a6dbc8 [-1] / 0x00000000 } IP; New SA Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5e00/0] Destructor Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5e00/0] Freeing Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000000: bffa 98e3 c1a6 dbc8 ........ Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 84b8 9cca bfae 41ea ......A. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 84b89cca bfae41ea} / 00000000, nego = -1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Restart packet Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 84b89cca bfae41ea}, nego = -1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 84b89cca bfae41ea} Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 138a02ca initialized using slot 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 138a02ca Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Sending negotiation back, error = 14 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 84b89cca bfae41ea } / 138a02ca, nego = 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 84b89cca bfae41ea Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Encoded packet[102] = 0xca192621 3015c1ec 84b89cca bfae41ea 0b100500 138a02ca 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 84b89cca bfae4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 84b89cca bfae41ea}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Sending packet[102] = 0xca192621 3015c1ec 84b89cca bfae41ea 0b100500 138a02ca 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 84b89cca bfae4 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 84b89cca bfae41ea}, nego = 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [0] / 0x138a02ca } Info; Deleting negotiation Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 84b89cca bfae41ea}, nego = -1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 84b89cca bfae41ea}, nego = -1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 84b89cca bfae41ea [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 84b89cca bfae41ea } Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:00:02 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:00:33 In kmd_pm_process_all_delayed_requests Feb 7 00:00:33 Triggering all tunnels Feb 7 00:00:33 Global timer started with 60 seconds timeout Feb 7 00:00:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4c80 from freelist Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4c80/0] Allocating Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4c80/0] Processing received Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4c80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4c80/0] Pad allows connection Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000000: bc22 5f4a 0faf 5b11 ."_J..[. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - bc225f4a 0faf5b11 } Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - bc225f4a 0faf5b11 [-1] / 0x00000000 } IP; New SA Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4c80/0] Destructor Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4c80/0] Freeing Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000000: bc22 5f4a 0faf 5b11 ."_J..[. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 00000000: f403 dd5a 7a73 a710 ...Zzs.. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - f403dd5a 7a73a710} / 00000000, nego = -1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - f403dd5a 7a73a710}, nego = -1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - f403dd5a 7a73a710} Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = f4895b7d initialized using slot 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = f4895b7d Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Sending negotiation back, error = 14 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - f403dd5a 7a73a710 } / f4895b7d, nego = 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec f403dd5a 7a73a710 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Encoded packet[102] = 0xca192621 3015c1ec f403dd5a 7a73a710 0b100500 f4895b7d 00000066 0000004a 00000001 0110000e ca192621 3015c1ec f403dd5a 7a73a Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - f403dd5a 7a73a710}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Sending packet[102] = 0xca192621 3015c1ec f403dd5a 7a73a710 0b100500 f4895b7d 00000066 0000004a 00000001 0110000e ca192621 3015c1ec f403dd5a 7a73a Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - f403dd5a 7a73a710}, nego = 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [0] / 0xf4895b7d } Info; Deleting negotiation Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - f403dd5a 7a73a710}, nego = -1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - f403dd5a 7a73a710}, nego = -1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f403dd5a 7a73a710 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - f403dd5a 7a73a710 } Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:00:42 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4f00 from freelist Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4f00/0] Allocating Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4f00/0] Processing received Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4f00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4f00/0] Pad allows connection Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000000: f31b 0a68 271c c220 ...h'.. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - f31b0a68 271cc220 } Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f31b0a68 271cc220 [-1] / 0x00000000 } IP; New SA Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4f00/0] Destructor Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4f00/0] Freeing Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000000: f31b 0a68 271c c220 ...h'.. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 00000000: ca62 632e b09e e993 .bc..... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - ca62632e b09ee993} / 00000000, nego = -1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - ca62632e b09ee993}, nego = -1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - ca62632e b09ee993} Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 9ffdbcde initialized using slot 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 9ffdbcde Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Sending negotiation back, error = 14 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - ca62632e b09ee993 } / 9ffdbcde, nego = 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec ca62632e b09ee993 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Encoded packet[102] = 0xca192621 3015c1ec ca62632e b09ee993 0b100500 9ffdbcde 00000066 0000004a 00000001 0110000e ca192621 3015c1ec ca62632e b09ee Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - ca62632e b09ee993}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Sending packet[102] = 0xca192621 3015c1ec ca62632e b09ee993 0b100500 9ffdbcde 00000066 0000004a 00000001 0110000e ca192621 3015c1ec ca62632e b09ee Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - ca62632e b09ee993}, nego = 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [0] / 0x9ffdbcde } Info; Deleting negotiation Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - ca62632e b09ee993}, nego = -1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - ca62632e b09ee993}, nego = -1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ca62632e b09ee993 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - ca62632e b09ee993 } Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:01:22 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:01:33 In kmd_pm_process_all_delayed_requests Feb 7 00:01:33 Triggering all tunnels Feb 7 00:01:33 Global timer started with 60 seconds timeout Feb 7 00:01:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5180 from freelist Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5180/0] Allocating Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5180/0] Processing received Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5180/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5180/0] Pad allows connection Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000000: cb29 6829 31d3 fbba .)h)1... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - cb296829 31d3fbba } Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - cb296829 31d3fbba [-1] / 0x00000000 } IP; New SA Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5180/0] Destructor Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5180/0] Freeing Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000000: cb29 6829 31d3 fbba .)h)1... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 975b 4587 681a c5c8 .[E.h... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 975b4587 681ac5c8} / 00000000, nego = -1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 975b4587 681ac5c8}, nego = -1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 975b4587 681ac5c8} Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 495e4329 initialized using slot 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 495e4329 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Sending negotiation back, error = 14 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 975b4587 681ac5c8 } / 495e4329, nego = 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 975b4587 681ac5c8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Encoded packet[102] = 0xca192621 3015c1ec 975b4587 681ac5c8 0b100500 495e4329 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 975b4587 681ac Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 975b4587 681ac5c8}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Sending packet[102] = 0xca192621 3015c1ec 975b4587 681ac5c8 0b100500 495e4329 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 975b4587 681ac Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 975b4587 681ac5c8}, nego = 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [0] / 0x495e4329 } Info; Deleting negotiation Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 975b4587 681ac5c8}, nego = -1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 975b4587 681ac5c8}, nego = -1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 975b4587 681ac5c8 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 975b4587 681ac5c8 } Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:02:02 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:02:33 In kmd_pm_process_all_delayed_requests Feb 7 00:02:33 Triggering all tunnels Feb 7 00:02:33 Global timer started with 60 seconds timeout Feb 7 00:02:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5400 from freelist Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5400/0] Allocating Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5400/0] Processing received Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5400/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5400/0] Pad allows connection Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000000: 5ee1 6d61 e58c 3c77 ^.ma.. 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 5ee16d61 e58c3c77 } Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 5ee16d61 e58c3c77 [-1] / 0x00000000 } IP; New SA Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5400/0] Destructor Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5400/0] Freeing Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000000: 5ee1 6d61 e58c 3c77 ^.ma.. 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 00000000: d29b 6428 1f57 1f4a ..d(.W.J Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - d29b6428 1f571f4a} / 00000000, nego = -1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Restart packet Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - d29b6428 1f571f4a}, nego = -1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - d29b6428 1f571f4a} Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 6396dce0 initialized using slot 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 6396dce0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Sending negotiation back, error = 14 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - d29b6428 1f571f4a } / 6396dce0, nego = 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec d29b6428 1f571f4a Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Encoded packet[102] = 0xca192621 3015c1ec d29b6428 1f571f4a 0b100500 6396dce0 00000066 0000004a 00000001 0110000e ca192621 3015c1ec d29b6428 1f571 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - d29b6428 1f571f4a}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Sending packet[102] = 0xca192621 3015c1ec d29b6428 1f571f4a 0b100500 6396dce0 00000066 0000004a 00000001 0110000e ca192621 3015c1ec d29b6428 1f571 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - d29b6428 1f571f4a}, nego = 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [0] / 0x6396dce0 } Info; Deleting negotiation Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - d29b6428 1f571f4a}, nego = -1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - d29b6428 1f571f4a}, nego = -1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - d29b6428 1f571f4a [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - d29b6428 1f571f4a } Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:02:42 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5680 from freelist Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5680/0] Allocating Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5680/0] Processing received Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5680/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5680/0] Pad allows connection Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000000: c73d bc1b d159 51af .=...YQ. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - c73dbc1b d15951af } Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - c73dbc1b d15951af [-1] / 0x00000000 } IP; New SA Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5680/0] Destructor Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5680/0] Freeing Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000000: c73d bc1b d159 51af .=...YQ. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 00000000: 6a6b 2f26 02b8 c464 jk/&...d Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464} / 00000000, nego = -1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464}, nego = -1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464} Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 62be1ec8 initialized using slot 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 62be1ec8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Sending negotiation back, error = 14 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 6a6b2f26 02b8c464 } / 62be1ec8, nego = 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 6a6b2f26 02b8c464 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Encoded packet[102] = 0xca192621 3015c1ec 6a6b2f26 02b8c464 0b100500 62be1ec8 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 6a6b2f26 02b8c Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Sending packet[102] = 0xca192621 3015c1ec 6a6b2f26 02b8c464 0b100500 62be1ec8 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 6a6b2f26 02b8c Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464}, nego = 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [0] / 0x62be1ec8 } Info; Deleting negotiation Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464}, nego = -1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464}, nego = -1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6a6b2f26 02b8c464 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 6a6b2f26 02b8c464 } Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:03:22 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:03:33 In kmd_pm_process_all_delayed_requests Feb 7 00:03:33 Triggering all tunnels Feb 7 00:03:33 Global timer started with 60 seconds timeout Feb 7 00:03:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5900 from freelist Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5900/0] Allocating Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5900/0] Processing received Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5900/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5900/0] Pad allows connection Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 8196 b27b 3f92 e6bc ...{?... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 8196b27b 3f92e6bc } Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 8196b27b 3f92e6bc [-1] / 0x00000000 } IP; New SA Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5900/0] Destructor Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5900/0] Freeing Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 8196 b27b 3f92 e6bc ...{?... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 0528 38e3 44ba f615 .(8.D... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 052838e3 44baf615} / 00000000, nego = -1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 052838e3 44baf615}, nego = -1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 052838e3 44baf615} Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = aa2e2944 initialized using slot 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = aa2e2944 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Sending negotiation back, error = 14 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 052838e3 44baf615 } / aa2e2944, nego = 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 052838e3 44baf615 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Encoded packet[102] = 0xca192621 3015c1ec 052838e3 44baf615 0b100500 aa2e2944 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 052838e3 44baf Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 052838e3 44baf615}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Sending packet[102] = 0xca192621 3015c1ec 052838e3 44baf615 0b100500 aa2e2944 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 052838e3 44baf Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 052838e3 44baf615}, nego = 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [0] / 0xaa2e2944 } Info; Deleting negotiation Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 052838e3 44baf615}, nego = -1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 052838e3 44baf615}, nego = -1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 052838e3 44baf615 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 052838e3 44baf615 } Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:04:02 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:04:33 In kmd_pm_process_all_delayed_requests Feb 7 00:04:33 Triggering all tunnels Feb 7 00:04:33 Global timer started with 60 seconds timeout Feb 7 00:04:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5b80 from freelist Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5b80/0] Allocating Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5b80/0] Processing received Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5b80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5b80/0] Pad allows connection Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000000: f1b6 447c 281c 89ff ..D|(... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - f1b6447c 281c89ff } Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f1b6447c 281c89ff [-1] / 0x00000000 } IP; New SA Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5b80/0] Destructor Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5b80/0] Freeing Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000000: f1b6 447c 281c 89ff ..D|(... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 00000000: 3117 1694 ab89 c85c 1......\ Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 31171694 ab89c85c} / 00000000, nego = -1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Restart packet Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 31171694 ab89c85c}, nego = -1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 31171694 ab89c85c} Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = a8e457d5 initialized using slot 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = a8e457d5 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Sending negotiation back, error = 14 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 31171694 ab89c85c } / a8e457d5, nego = 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 31171694 ab89c85c Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Encoded packet[102] = 0xca192621 3015c1ec 31171694 ab89c85c 0b100500 a8e457d5 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 31171694 ab89c Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 31171694 ab89c85c}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Sending packet[102] = 0xca192621 3015c1ec 31171694 ab89c85c 0b100500 a8e457d5 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 31171694 ab89c Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 31171694 ab89c85c}, nego = 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [0] / 0xa8e457d5 } Info; Deleting negotiation Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 31171694 ab89c85c}, nego = -1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 31171694 ab89c85c}, nego = -1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 31171694 ab89c85c [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 31171694 ab89c85c } Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:04:42 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5e00 from freelist Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5e00/0] Allocating Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5e00/0] Processing received Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5e00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5e00/0] Pad allows connection Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000000: 2afb add3 7a16 b8dd *...z... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 2afbadd3 7a16b8dd } Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 2afbadd3 7a16b8dd [-1] / 0x00000000 } IP; New SA Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5e00/0] Destructor Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5e00/0] Freeing Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000000: 2afb add3 7a16 b8dd *...z... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 00000000: b757 aabd b009 8fc4 .W...... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - b757aabd b0098fc4} / 00000000, nego = -1 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - b757aabd b0098fc4}, nego = -1 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - b757aabd b0098fc4} Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 264e366e initialized using slot 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 264e366e Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Sending negotiation back, error = 14 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - b757aabd b0098fc4 } / 264e366e, nego = 0 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec b757aabd b0098fc4 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Encoded packet[102] = 0xca192621 3015c1ec b757aabd b0098fc4 0b100500 264e366e 00000066 0000004a 00000001 0110000e ca192621 3015c1ec b757aabd b0098 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:05:22 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - b757aabd b0098fc4}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Sending packet[102] = 0xca192621 3015c1ec b757aabd b0098fc4 0b100500 264e366e 00000066 0000004a 00000001 0110000e ca192621 3015c1ec b757aabd b0098 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - b757aabd b0098fc4}, nego = 0 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [0] / 0x264e366e } Info; Deleting negotiation Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - b757aabd b0098fc4}, nego = -1 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - b757aabd b0098fc4}, nego = -1 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b757aabd b0098fc4 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - b757aabd b0098fc4 } Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:05:23 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:05:33 In kmd_pm_process_all_delayed_requests Feb 7 00:05:33 Triggering all tunnels Feb 7 00:05:33 Global timer started with 60 seconds timeout Feb 7 00:05:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4c80 from freelist Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4c80/0] Allocating Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4c80/0] Processing received Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4c80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4c80/0] Pad allows connection Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 431c 8baf 35de eaae C...5... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 431c8baf 35deeaae } Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 431c8baf 35deeaae [-1] / 0x00000000 } IP; New SA Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4c80/0] Destructor Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4c80/0] Freeing Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 431c 8baf 35de eaae C...5... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 00000000: 2393 8ece 0867 ddac #....g.. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 23938ece 0867ddac} / 00000000, nego = -1 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:02 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Restart packet Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 23938ece 0867ddac}, nego = -1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 23938ece 0867ddac} Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 546b30b2 initialized using slot 0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 546b30b2 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Sending negotiation back, error = 14 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 23938ece 0867ddac } / 546b30b2, nego = 0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 23938ece 0867ddac Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Encoded packet[102] = 0xca192621 3015c1ec 23938ece 0867ddac 0b100500 546b30b2 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 23938ece 0867d Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 23938ece 0867ddac}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Sending packet[102] = 0xca192621 3015c1ec 23938ece 0867ddac 0b100500 546b30b2 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 23938ece 0867d Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 23938ece 0867ddac}, nego = 0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [0] / 0x546b30b2 } Info; Deleting negotiation Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 23938ece 0867ddac}, nego = -1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 23938ece 0867ddac}, nego = -1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 23938ece 0867ddac [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 23938ece 0867ddac } Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:06:03 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:06:33 In kmd_pm_process_all_delayed_requests Feb 7 00:06:33 Triggering all tunnels Feb 7 00:06:33 Global timer started with 60 seconds timeout Feb 7 00:06:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4f00 from freelist Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4f00/0] Allocating Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4f00/0] Processing received Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4f00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4f00/0] Pad allows connection Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000000: 7fec dbac 8a6f dde1 .....o.. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 7fecdbac 8a6fdde1 } Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 7fecdbac 8a6fdde1 [-1] / 0x00000000 } IP; New SA Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4f00/0] Destructor Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4f00/0] Freeing Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000000: 7fec dbac 8a6f dde1 .....o.. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 00000000: e451 aa7a 84fa f5f0 .Q.z.... Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - e451aa7a 84faf5f0} / 00000000, nego = -1 Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:06:42 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - e451aa7a 84faf5f0}, nego = -1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - e451aa7a 84faf5f0} Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 18adbca4 initialized using slot 0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 18adbca4 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Sending negotiation back, error = 14 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - e451aa7a 84faf5f0 } / 18adbca4, nego = 0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec e451aa7a 84faf5f0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Encoded packet[102] = 0xca192621 3015c1ec e451aa7a 84faf5f0 0b100500 18adbca4 00000066 0000004a 00000001 0110000e ca192621 3015c1ec e451aa7a 84faf Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - e451aa7a 84faf5f0}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Sending packet[102] = 0xca192621 3015c1ec e451aa7a 84faf5f0 0b100500 18adbca4 00000066 0000004a 00000001 0110000e ca192621 3015c1ec e451aa7a 84faf Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - e451aa7a 84faf5f0}, nego = 0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [0] / 0x18adbca4 } Info; Deleting negotiation Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - e451aa7a 84faf5f0}, nego = -1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - e451aa7a 84faf5f0}, nego = -1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - e451aa7a 84faf5f0 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - e451aa7a 84faf5f0 } Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:06:43 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:07:22 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5180 from freelist Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5180/0] Allocating Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5180/0] Processing received Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5180/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5180/0] Pad allows connection Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 00000000: 68af ca80 96ca ee60 h......` Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 68afca80 96caee60 } Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 68afca80 96caee60 [-1] / 0x00000000 } IP; New SA Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5180/0] Destructor Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5180/0] Freeing Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 00000000: 68af ca80 96ca ee60 h......` Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 00000000: b743 97b8 95cd 108b .C...... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - b74397b8 95cd108b} / 00000000, nego = -1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Restart packet Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - b74397b8 95cd108b}, nego = -1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - b74397b8 95cd108b} Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 24082d0f initialized using slot 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 24082d0f Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Sending negotiation back, error = 14 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - b74397b8 95cd108b } / 24082d0f, nego = 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec b74397b8 95cd108b Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Encoded packet[102] = 0xca192621 3015c1ec b74397b8 95cd108b 0b100500 24082d0f 00000066 0000004a 00000001 0110000e ca192621 3015c1ec b74397b8 95cd1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - b74397b8 95cd108b}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Sending packet[102] = 0xca192621 3015c1ec b74397b8 95cd108b 0b100500 24082d0f 00000066 0000004a 00000001 0110000e ca192621 3015c1ec b74397b8 95cd1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - b74397b8 95cd108b}, nego = 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [0] / 0x24082d0f } Info; Deleting negotiation Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - b74397b8 95cd108b}, nego = -1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - b74397b8 95cd108b}, nego = -1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - b74397b8 95cd108b [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - b74397b8 95cd108b } Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:07:23 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:07:33 In kmd_pm_process_all_delayed_requests Feb 7 00:07:33 Triggering all tunnels Feb 7 00:07:33 Global timer started with 60 seconds timeout Feb 7 00:07:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5400 from freelist Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5400/0] Allocating Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5400/0] Processing received Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5400/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5400/0] Pad allows connection Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000000: 816a 9214 e374 c745 .j...t.E Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 816a9214 e374c745 } Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 816a9214 e374c745 [-1] / 0x00000000 } IP; New SA Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5400/0] Destructor Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5400/0] Freeing Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000000: 816a 9214 e374 c745 .j...t.E Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 00000000: 9032 7b88 4b66 15a0 .2{.Kf.. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 90327b88 4b6615a0} / 00000000, nego = -1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 90327b88 4b6615a0}, nego = -1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 90327b88 4b6615a0} Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = f69148ce initialized using slot 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = f69148ce Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Sending negotiation back, error = 14 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 90327b88 4b6615a0 } / f69148ce, nego = 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 90327b88 4b6615a0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Encoded packet[102] = 0xca192621 3015c1ec 90327b88 4b6615a0 0b100500 f69148ce 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 90327b88 4b661 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 90327b88 4b6615a0}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Sending packet[102] = 0xca192621 3015c1ec 90327b88 4b6615a0 0b100500 f69148ce 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 90327b88 4b661 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 90327b88 4b6615a0}, nego = 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [0] / 0xf69148ce } Info; Deleting negotiation Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 90327b88 4b6615a0}, nego = -1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 90327b88 4b6615a0}, nego = -1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 90327b88 4b6615a0 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 90327b88 4b6615a0 } Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:08:03 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:08:33 In kmd_pm_process_all_delayed_requests Feb 7 00:08:33 Triggering all tunnels Feb 7 00:08:33 Global timer started with 60 seconds timeout Feb 7 00:08:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5680 from freelist Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5680/0] Allocating Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5680/0] Processing received Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5680/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5680/0] Pad allows connection Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000000: 9b95 5fce 9993 3d93 .._...=. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 9b955fce 99933d93 } Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9b955fce 99933d93 [-1] / 0x00000000 } IP; New SA Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5680/0] Destructor Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5680/0] Freeing Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000000: 9b95 5fce 9993 3d93 .._...=. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 00000000: 3f0c 798c 9b19 ed70 ?.y....p Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70} / 00000000, nego = -1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70}, nego = -1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70} Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 948991a3 initialized using slot 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 948991a3 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Sending negotiation back, error = 14 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 3f0c798c 9b19ed70 } / 948991a3, nego = 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 3f0c798c 9b19ed70 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Encoded packet[102] = 0xca192621 3015c1ec 3f0c798c 9b19ed70 0b100500 948991a3 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 3f0c798c 9b19e Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Sending packet[102] = 0xca192621 3015c1ec 3f0c798c 9b19ed70 0b100500 948991a3 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 3f0c798c 9b19e Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70}, nego = 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [0] / 0x948991a3 } Info; Deleting negotiation Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70}, nego = -1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70}, nego = -1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 3f0c798c 9b19ed70 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 3f0c798c 9b19ed70 } Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:08:43 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5900 from freelist Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5900/0] Allocating Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5900/0] Processing received Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5900/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5900/0] Pad allows connection Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000000: ad04 8227 d672 1826 ...'.r.& Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - ad048227 d6721826 } Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - ad048227 d6721826 [-1] / 0x00000000 } IP; New SA Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5900/0] Destructor Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5900/0] Freeing Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000000: ad04 8227 d672 1826 ...'.r.& Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 00000000: 9230 ccf9 58d3 484c .0..X.HL Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 9230ccf9 58d3484c} / 00000000, nego = -1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Restart packet Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 9230ccf9 58d3484c}, nego = -1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 9230ccf9 58d3484c} Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 9557ae65 initialized using slot 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 9557ae65 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Sending negotiation back, error = 14 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 9230ccf9 58d3484c } / 9557ae65, nego = 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 9230ccf9 58d3484c Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Encoded packet[102] = 0xca192621 3015c1ec 9230ccf9 58d3484c 0b100500 9557ae65 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 9230ccf9 58d34 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 9230ccf9 58d3484c}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Sending packet[102] = 0xca192621 3015c1ec 9230ccf9 58d3484c 0b100500 9557ae65 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 9230ccf9 58d34 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 9230ccf9 58d3484c}, nego = 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [0] / 0x9557ae65 } Info; Deleting negotiation Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 9230ccf9 58d3484c}, nego = -1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 9230ccf9 58d3484c}, nego = -1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9230ccf9 58d3484c [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 9230ccf9 58d3484c } Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:09:23 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:09:33 In kmd_pm_process_all_delayed_requests Feb 7 00:09:33 Triggering all tunnels Feb 7 00:09:33 Global timer started with 60 seconds timeout Feb 7 00:09:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5b80 from freelist Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5b80/0] Allocating Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5b80/0] Processing received Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5b80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5b80/0] Pad allows connection Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000000: 6218 007a 996f a16d b..z.o.m Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 6218007a 996fa16d } Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 6218007a 996fa16d [-1] / 0x00000000 } IP; New SA Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5b80/0] Destructor Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5b80/0] Freeing Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000000: 6218 007a 996f a16d b..z.o.m Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 00000000: f613 fa09 bfc7 50b7 ......P. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - f613fa09 bfc750b7} / 00000000, nego = -1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - f613fa09 bfc750b7}, nego = -1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - f613fa09 bfc750b7} Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = d7283670 initialized using slot 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = d7283670 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Sending negotiation back, error = 14 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - f613fa09 bfc750b7 } / d7283670, nego = 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec f613fa09 bfc750b7 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Encoded packet[102] = 0xca192621 3015c1ec f613fa09 bfc750b7 0b100500 d7283670 00000066 0000004a 00000001 0110000e ca192621 3015c1ec f613fa09 bfc75 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - f613fa09 bfc750b7}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Sending packet[102] = 0xca192621 3015c1ec f613fa09 bfc750b7 0b100500 d7283670 00000066 0000004a 00000001 0110000e ca192621 3015c1ec f613fa09 bfc75 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - f613fa09 bfc750b7}, nego = 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [0] / 0xd7283670 } Info; Deleting negotiation Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - f613fa09 bfc750b7}, nego = -1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - f613fa09 bfc750b7}, nego = -1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - f613fa09 bfc750b7 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - f613fa09 bfc750b7 } Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:10:03 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:10:33 In kmd_pm_process_all_delayed_requests Feb 7 00:10:33 Triggering all tunnels Feb 7 00:10:33 Global timer started with 60 seconds timeout Feb 7 00:10:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5e00 from freelist Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5e00/0] Allocating Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5e00/0] Processing received Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5e00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5e00/0] Pad allows connection Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000000: 9cc1 8e12 7ce2 078b ....|... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 9cc18e12 7ce2078b } Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 9cc18e12 7ce2078b [-1] / 0x00000000 } IP; New SA Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5e00/0] Destructor Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5e00/0] Freeing Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000000: 9cc1 8e12 7ce2 078b ....|... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 00000000: fa45 4fca 2450 a140 .EO.$P.@ Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - fa454fca 2450a140} / 00000000, nego = -1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - fa454fca 2450a140}, nego = -1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - fa454fca 2450a140} Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = c78e28b9 initialized using slot 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = c78e28b9 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Sending negotiation back, error = 14 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - fa454fca 2450a140 } / c78e28b9, nego = 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec fa454fca 2450a140 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Encoded packet[102] = 0xca192621 3015c1ec fa454fca 2450a140 0b100500 c78e28b9 00000066 0000004a 00000001 0110000e ca192621 3015c1ec fa454fca 2450a Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - fa454fca 2450a140}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Sending packet[102] = 0xca192621 3015c1ec fa454fca 2450a140 0b100500 c78e28b9 00000066 0000004a 00000001 0110000e ca192621 3015c1ec fa454fca 2450a Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - fa454fca 2450a140}, nego = 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [0] / 0xc78e28b9 } Info; Deleting negotiation Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - fa454fca 2450a140}, nego = -1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - fa454fca 2450a140}, nego = -1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - fa454fca 2450a140 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - fa454fca 2450a140 } Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:10:43 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000000: ca19 2621 3015 c1ec 0000 0000 0000 0000 ..&!0........... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4c80 from freelist Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4c80/0] Allocating Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4c80/0] Processing received Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4c80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4c80/0] Pad allows connection Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = ca192621 3015c1ec 00000000 00000000 ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { ca192621 3015c1ec - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000000: 2087 c7ce d187 d6ba ....... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { ca192621 3015c1ec - 2087c7ce d187d6ba } Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 2087c7ce d187d6ba [-1] / 0x00000000 } IP; New SA Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4c80/0] Destructor Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4c80/0] Freeing Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000000: 2087 c7ce d187 d6ba ....... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 00000000: 73fb ef37 4388 bca9 s..7C... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Received packet[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Packet received[252] = 0xca192621 3015c1ec 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { ca192621 3015c1ec - 73fbef37 4388bca9} / 00000000, nego = -1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { ca192621 3015c1ec - 73fbef37 4388bca9}, nego = -1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { ca192621 3015c1ec - 73fbef37 4388bca9} Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 31c585ad initialized using slot 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 31c585ad Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Sending negotiation back, error = 14 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xca192621 3015c1ec - 73fbef37 4388bca9 } / 31c585ad, nego = 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xca192621 3015c1ec 73fbef37 4388bca9 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Encoded packet[102] = 0xca192621 3015c1ec 73fbef37 4388bca9 0b100500 31c585ad 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 73fbef37 4388b Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { ca192621 3015c1ec - 73fbef37 4388bca9}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Sending packet[102] = 0xca192621 3015c1ec 73fbef37 4388bca9 0b100500 31c585ad 00000066 0000004a 00000001 0110000e ca192621 3015c1ec 73fbef37 4388b Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 73fbef37 4388bca9}, nego = 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [0] / 0x31c585ad } Info; Deleting negotiation Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { ca192621 3015c1ec - 73fbef37 4388bca9}, nego = -1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { ca192621 3015c1ec - 73fbef37 4388bca9}, nego = -1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { ca192621 3015c1ec - 73fbef37 4388bca9 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { ca192621 3015c1ec - 73fbef37 4388bca9 } Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:11:23 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:11:33 In kmd_pm_process_all_delayed_requests Feb 7 00:11:33 Triggering all tunnels Feb 7 00:11:33 Global timer started with 60 seconds timeout Feb 7 00:11:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4f00 from freelist Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4f00/0] Allocating Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4f00/0] Processing received Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4f00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4f00/0] Pad allows connection Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000000: b0eb a1d5 b6e4 7caf ......|. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - b0eba1d5 b6e47caf } Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b0eba1d5 b6e47caf [-1] / 0x00000000 } IP; New SA Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4f00/0] Destructor Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4f00/0] Freeing Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000000: b0eb a1d5 b6e4 7caf ......|. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 00000000: 1586 2413 164b 4868 ..$..KHh Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 15862413 164b4868} / 00000000, nego = -1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 15862413 164b4868}, nego = -1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 15862413 164b4868} Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 05261536 initialized using slot 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 05261536 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Sending negotiation back, error = 14 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 15862413 164b4868 } / 05261536, nego = 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 15862413 164b4868 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 15862413 164b4868 0b100500 05261536 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 15862413 164b4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 15862413 164b4868}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 15862413 164b4868 0b100500 05261536 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 15862413 164b4 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 15862413 164b4868}, nego = 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [0] / 0x05261536 } Info; Deleting negotiation Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 15862413 164b4868}, nego = -1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 15862413 164b4868}, nego = -1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 15862413 164b4868 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 15862413 164b4868 } Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:12:03 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5180 from freelist Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5180/0] Allocating Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5180/0] Processing received Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5180/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5180/0] Pad allows connection Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000000: bd07 47f4 84cf a4cb ..G..... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - bd0747f4 84cfa4cb } Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - bd0747f4 84cfa4cb [-1] / 0x00000000 } IP; New SA Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5180/0] Destructor Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5180/0] Freeing Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000000: bd07 47f4 84cf a4cb ..G..... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 5df3 278d 4d59 8394 ].'.MY.. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 5df3278d 4d598394} / 00000000, nego = -1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 5df3278d 4d598394}, nego = -1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 5df3278d 4d598394} Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = ed407f5c initialized using slot 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = ed407f5c Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Sending negotiation back, error = 14 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 5df3278d 4d598394 } / ed407f5c, nego = 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 5df3278d 4d598394 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 5df3278d 4d598394 0b100500 ed407f5c 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 5df3278d 4d598 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 5df3278d 4d598394}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Sending packet[102] = 0xb9582984 4bc22ad9 5df3278d 4d598394 0b100500 ed407f5c 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 5df3278d 4d598 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 5df3278d 4d598394}, nego = 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [0] / 0xed407f5c } Info; Deleting negotiation Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 5df3278d 4d598394}, nego = -1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 5df3278d 4d598394}, nego = -1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5df3278d 4d598394 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 5df3278d 4d598394 } Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:12:13 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5400 from freelist Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5400/0] Allocating Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5400/0] Processing received Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5400/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5400/0] Pad allows connection Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000000: 5046 b6db a40b bb6b PF.....k Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 5046b6db a40bbb6b } Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5046b6db a40bbb6b [-1] / 0x00000000 } IP; New SA Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5400/0] Destructor Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5400/0] Freeing Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000000: 5046 b6db a40b bb6b PF.....k Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 00000000: 6a62 df8f e303 74db jb....t. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 6a62df8f e30374db} / 00000000, nego = -1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Restart packet Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 6a62df8f e30374db}, nego = -1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 6a62df8f e30374db} Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = ca1575b6 initialized using slot 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = ca1575b6 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Sending negotiation back, error = 14 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 6a62df8f e30374db } / ca1575b6, nego = 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 6a62df8f e30374db Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 6a62df8f e30374db 0b100500 ca1575b6 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 6a62df8f e3037 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 6a62df8f e30374db}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 6a62df8f e30374db 0b100500 ca1575b6 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 6a62df8f e3037 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 6a62df8f e30374db}, nego = 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [0] / 0xca1575b6 } Info; Deleting negotiation Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 6a62df8f e30374db}, nego = -1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 6a62df8f e30374db}, nego = -1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 6a62df8f e30374db [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 6a62df8f e30374db } Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:12:32 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:12:33 In kmd_pm_process_all_delayed_requests Feb 7 00:12:33 Triggering all tunnels Feb 7 00:12:33 Global timer started with 60 seconds timeout Feb 7 00:12:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5680 from freelist Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5680/0] Allocating Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5680/0] Processing received Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5680/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5680/0] Pad allows connection Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 5dfa 0396 cdb5 aca7 ]....... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 5dfa0396 cdb5aca7 } Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 5dfa0396 cdb5aca7 [-1] / 0x00000000 } IP; New SA Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5680/0] Destructor Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5680/0] Freeing Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 5dfa 0396 cdb5 aca7 ]....... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 7500 ec96 3a3a 603c u...::`< Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c} / 00000000, nego = -1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Restart packet Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c}, nego = -1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c} Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = bf8c4df0 initialized using slot 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = bf8c4df0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Sending negotiation back, error = 14 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 7500ec96 3a3a603c } / bf8c4df0, nego = 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 7500ec96 3a3a603c Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 7500ec96 3a3a603c 0b100500 bf8c4df0 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 7500ec96 3a3a6 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 7500ec96 3a3a603c 0b100500 bf8c4df0 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 7500ec96 3a3a6 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c}, nego = 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [0] / 0xbf8c4df0 } Info; Deleting negotiation Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c}, nego = -1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c}, nego = -1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7500ec96 3a3a603c [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 7500ec96 3a3a603c } Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:13:13 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:13:33 In kmd_pm_process_all_delayed_requests Feb 7 00:13:33 Triggering all tunnels Feb 7 00:13:33 Global timer started with 60 seconds timeout Feb 7 00:13:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5900 from freelist Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5900/0] Allocating Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5900/0] Processing received Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5900/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5900/0] Pad allows connection Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000000: a342 da94 81fe 9c7e .B.....~ Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - a342da94 81fe9c7e } Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - a342da94 81fe9c7e [-1] / 0x00000000 } IP; New SA Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5900/0] Destructor Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5900/0] Freeing Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000000: a342 da94 81fe 9c7e .B.....~ Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 00000000: da6e 70b4 4922 0268 .np.I".h Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - da6e70b4 49220268} / 00000000, nego = -1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - da6e70b4 49220268}, nego = -1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - da6e70b4 49220268} Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 407db57f initialized using slot 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 407db57f Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Sending negotiation back, error = 14 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - da6e70b4 49220268 } / 407db57f, nego = 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 da6e70b4 49220268 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 da6e70b4 49220268 0b100500 407db57f 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 da6e70b4 49220 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - da6e70b4 49220268}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Sending packet[102] = 0xb9582984 4bc22ad9 da6e70b4 49220268 0b100500 407db57f 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 da6e70b4 49220 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - da6e70b4 49220268}, nego = 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [0] / 0x407db57f } Info; Deleting negotiation Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - da6e70b4 49220268}, nego = -1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - da6e70b4 49220268}, nego = -1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - da6e70b4 49220268 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - da6e70b4 49220268 } Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:13:53 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5b80 from freelist Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5b80/0] Allocating Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5b80/0] Processing received Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5b80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5b80/0] Pad allows connection Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 5168 9590 a692 62a8 Qh....b. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 51689590 a69262a8 } Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 51689590 a69262a8 [-1] / 0x00000000 } IP; New SA Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5b80/0] Destructor Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5b80/0] Freeing Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 5168 9590 a692 62a8 Qh....b. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 85ca d415 2cac 814e ....,..N Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 85cad415 2cac814e} / 00000000, nego = -1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:14:33 In kmd_pm_process_all_delayed_requests Feb 7 00:14:33 Triggering all tunnels Feb 7 00:14:33 Global timer started with 60 seconds timeout Feb 7 00:14:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Restart packet Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 85cad415 2cac814e}, nego = -1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 85cad415 2cac814e} Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 9434f02b initialized using slot 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 9434f02b Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Sending negotiation back, error = 14 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 85cad415 2cac814e } / 9434f02b, nego = 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 85cad415 2cac814e Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 85cad415 2cac814e 0b100500 9434f02b 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 85cad415 2cac8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 85cad415 2cac814e}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Sending packet[102] = 0xb9582984 4bc22ad9 85cad415 2cac814e 0b100500 9434f02b 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 85cad415 2cac8 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 85cad415 2cac814e}, nego = 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [0] / 0x9434f02b } Info; Deleting negotiation Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 85cad415 2cac814e}, nego = -1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 85cad415 2cac814e}, nego = -1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 85cad415 2cac814e [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 85cad415 2cac814e } Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:14:33 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5e00 from freelist Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5e00/0] Allocating Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5e00/0] Processing received Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5e00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5e00/0] Pad allows connection Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 64c4 8a8a ec34 b26d d....4.m Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 64c48a8a ec34b26d } Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 64c48a8a ec34b26d [-1] / 0x00000000 } IP; New SA Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5e00/0] Destructor Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5e00/0] Freeing Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 64c4 8a8a ec34 b26d d....4.m Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 61b0 c639 7060 32db a..9p`2. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 61b0c639 706032db} / 00000000, nego = -1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Restart packet Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 61b0c639 706032db}, nego = -1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 61b0c639 706032db} Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 4e7e1329 initialized using slot 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 4e7e1329 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Sending negotiation back, error = 14 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 61b0c639 706032db } / 4e7e1329, nego = 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 61b0c639 706032db Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 61b0c639 706032db 0b100500 4e7e1329 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 61b0c639 70603 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 61b0c639 706032db}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 61b0c639 706032db 0b100500 4e7e1329 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 61b0c639 70603 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 61b0c639 706032db}, nego = 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [0] / 0x4e7e1329 } Info; Deleting negotiation Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 61b0c639 706032db}, nego = -1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 61b0c639 706032db}, nego = -1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61b0c639 706032db [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 61b0c639 706032db } Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:15:13 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:15:33 In kmd_pm_process_all_delayed_requests Feb 7 00:15:33 Triggering all tunnels Feb 7 00:15:33 Global timer started with 60 seconds timeout Feb 7 00:15:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4c80 from freelist Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4c80/0] Allocating Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4c80/0] Processing received Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4c80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4c80/0] Pad allows connection Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 07ef 2198 da65 5cc1 ..!..e\. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 07ef2198 da655cc1 } Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 07ef2198 da655cc1 [-1] / 0x00000000 } IP; New SA Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4c80/0] Destructor Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4c80/0] Freeing Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 07ef 2198 da65 5cc1 ..!..e\. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 2f7e 1284 acb0 4602 /~....F. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602} / 00000000, nego = -1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602}, nego = -1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602} Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = f15c1c67 initialized using slot 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = f15c1c67 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Sending negotiation back, error = 14 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 2f7e1284 acb04602 } / f15c1c67, nego = 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 2f7e1284 acb04602 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 2f7e1284 acb04602 0b100500 f15c1c67 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 2f7e1284 acb04 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 2f7e1284 acb04602 0b100500 f15c1c67 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 2f7e1284 acb04 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602}, nego = 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [0] / 0xf15c1c67 } Info; Deleting negotiation Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602}, nego = -1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602}, nego = -1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f7e1284 acb04602 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 2f7e1284 acb04602 } Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:15:53 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:16:33 In kmd_pm_process_all_delayed_requests Feb 7 00:16:33 Triggering all tunnels Feb 7 00:16:33 Global timer started with 60 seconds timeout Feb 7 00:16:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4f00 from freelist Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4f00/0] Allocating Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4f00/0] Processing received Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4f00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4f00/0] Pad allows connection Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 5794 9ee7 8376 85ae W....v.. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 57949ee7 837685ae } Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 57949ee7 837685ae [-1] / 0x00000000 } IP; New SA Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4f00/0] Destructor Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4f00/0] Freeing Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 5794 9ee7 8376 85ae W....v.. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 9934 960a 2ee5 38fb .4....8. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb} / 00000000, nego = -1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Restart packet Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb}, nego = -1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb} Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = e33611a0 initialized using slot 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = e33611a0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Sending negotiation back, error = 14 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 9934960a 2ee538fb } / e33611a0, nego = 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 9934960a 2ee538fb Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 9934960a 2ee538fb 0b100500 e33611a0 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 9934960a 2ee53 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 9934960a 2ee538fb 0b100500 e33611a0 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 9934960a 2ee53 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb}, nego = 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [0] / 0xe33611a0 } Info; Deleting negotiation Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb}, nego = -1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb}, nego = -1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 9934960a 2ee538fb [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 9934960a 2ee538fb } Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:16:33 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5180 from freelist Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5180/0] Allocating Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5180/0] Processing received Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5180/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5180/0] Pad allows connection Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 1f35 15b7 1f64 8d3f .5...d.? Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 1f3515b7 1f648d3f } Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1f3515b7 1f648d3f [-1] / 0x00000000 } IP; New SA Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5180/0] Destructor Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5180/0] Freeing Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 1f35 15b7 1f64 8d3f .5...d.? Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 1e40 4bf4 2904 6b93 .@K.).k. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93} / 00000000, nego = -1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93}, nego = -1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93} Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = b3c9b048 initialized using slot 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = b3c9b048 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Sending negotiation back, error = 14 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 1e404bf4 29046b93 } / b3c9b048, nego = 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 1e404bf4 29046b93 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 1e404bf4 29046b93 0b100500 b3c9b048 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 1e404bf4 29046 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 1e404bf4 29046b93 0b100500 b3c9b048 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 1e404bf4 29046 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93}, nego = 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [0] / 0xb3c9b048 } Info; Deleting negotiation Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93}, nego = -1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93}, nego = -1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 1e404bf4 29046b93 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 1e404bf4 29046b93 } Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:17:13 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:17:33 In kmd_pm_process_all_delayed_requests Feb 7 00:17:33 Triggering all tunnels Feb 7 00:17:33 Global timer started with 60 seconds timeout Feb 7 00:17:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5400 from freelist Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5400/0] Allocating Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5400/0] Processing received Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5400/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5400/0] Pad allows connection Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 7ecc a4b2 0f32 5299 ~....2R. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 7ecca4b2 0f325299 } Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7ecca4b2 0f325299 [-1] / 0x00000000 } IP; New SA Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5400/0] Destructor Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5400/0] Freeing Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 7ecc a4b2 0f32 5299 ~....2R. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 3899 26c4 a17c ddf1 8.&..|.. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1} / 00000000, nego = -1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1}, nego = -1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1} Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 9534d3e7 initialized using slot 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 9534d3e7 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Sending negotiation back, error = 14 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 389926c4 a17cddf1 } / 9534d3e7, nego = 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 389926c4 a17cddf1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 389926c4 a17cddf1 0b100500 9534d3e7 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 389926c4 a17cd Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 389926c4 a17cddf1 0b100500 9534d3e7 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 389926c4 a17cd Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1}, nego = 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [0] / 0x9534d3e7 } Info; Deleting negotiation Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1}, nego = -1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1}, nego = -1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 389926c4 a17cddf1 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 389926c4 a17cddf1 } Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:17:53 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:18:33 In kmd_pm_process_all_delayed_requests Feb 7 00:18:33 Triggering all tunnels Feb 7 00:18:33 Global timer started with 60 seconds timeout Feb 7 00:18:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5680 from freelist Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5680/0] Allocating Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5680/0] Processing received Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5680/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5680/0] Pad allows connection Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 61bf 08af 83fa 2e6d a......m Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 61bf08af 83fa2e6d } Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61bf08af 83fa2e6d [-1] / 0x00000000 } IP; New SA Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5680/0] Destructor Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5680/0] Freeing Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 61bf 08af 83fa 2e6d a......m Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 00000000: ec3d 2b4a ac42 4bf8 .=+J.BK. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8} / 00000000, nego = -1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8}, nego = -1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8} Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 573ac12b initialized using slot 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 573ac12b Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Sending negotiation back, error = 14 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - ec3d2b4a ac424bf8 } / 573ac12b, nego = 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 ec3d2b4a ac424bf8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 ec3d2b4a ac424bf8 0b100500 573ac12b 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 ec3d2b4a ac424 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Sending packet[102] = 0xb9582984 4bc22ad9 ec3d2b4a ac424bf8 0b100500 573ac12b 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 ec3d2b4a ac424 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8}, nego = 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [0] / 0x573ac12b } Info; Deleting negotiation Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8}, nego = -1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8}, nego = -1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - ec3d2b4a ac424bf8 } Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:18:33 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5900 from freelist Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5900/0] Allocating Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5900/0] Processing received Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5900/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5900/0] Pad allows connection Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 40e0 bf7d bf36 7d93 @..}.6}. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 40e0bf7d bf367d93 } Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 40e0bf7d bf367d93 [-1] / 0x00000000 } IP; New SA Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5900/0] Destructor Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5900/0] Freeing Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 40e0 bf7d bf36 7d93 @..}.6}. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 3df4 d3c2 3725 3faf =...7%?. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf} / 00000000, nego = -1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Restart packet Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf}, nego = -1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf} Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 297ebc0a initialized using slot 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 297ebc0a Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Sending negotiation back, error = 14 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 3df4d3c2 37253faf } / 297ebc0a, nego = 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 3df4d3c2 37253faf Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 3df4d3c2 37253faf 0b100500 297ebc0a 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 3df4d3c2 37253 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Sending packet[102] = 0xb9582984 4bc22ad9 3df4d3c2 37253faf 0b100500 297ebc0a 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 3df4d3c2 37253 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf}, nego = 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [0] / 0x297ebc0a } Info; Deleting negotiation Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf}, nego = -1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf}, nego = -1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 3df4d3c2 37253faf [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 3df4d3c2 37253faf } Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:19:13 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:19:33 In kmd_pm_process_all_delayed_requests Feb 7 00:19:33 Triggering all tunnels Feb 7 00:19:33 Global timer started with 60 seconds timeout Feb 7 00:19:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5b80 from freelist Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5b80/0] Allocating Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5b80/0] Processing received Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5b80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5b80/0] Pad allows connection Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000000: e17a 85b6 0b24 db2a .z...$.* Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - e17a85b6 0b24db2a } Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - e17a85b6 0b24db2a [-1] / 0x00000000 } IP; New SA Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5b80/0] Destructor Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5b80/0] Freeing Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000000: e17a 85b6 0b24 db2a .z...$.* Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 0142 3ab1 9c97 43b7 .B:...C. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7} / 00000000, nego = -1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7}, nego = -1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7} Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 42d3578a initialized using slot 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 42d3578a Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Sending negotiation back, error = 14 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 01423ab1 9c9743b7 } / 42d3578a, nego = 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 01423ab1 9c9743b7 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 01423ab1 9c9743b7 0b100500 42d3578a 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 01423ab1 9c974 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Sending packet[102] = 0xb9582984 4bc22ad9 01423ab1 9c9743b7 0b100500 42d3578a 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 01423ab1 9c974 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7}, nego = 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [0] / 0x42d3578a } Info; Deleting negotiation Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7}, nego = -1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7}, nego = -1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 01423ab1 9c9743b7 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 01423ab1 9c9743b7 } Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:19:53 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:20:33 In kmd_pm_process_all_delayed_requests Feb 7 00:20:33 Triggering all tunnels Feb 7 00:20:33 Global timer started with 60 seconds timeout Feb 7 00:20:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5e00 from freelist Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5e00/0] Allocating Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5e00/0] Processing received Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5e00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5e00/0] Pad allows connection Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 4524 f978 f189 2141 E$.x..!A Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 4524f978 f1892141 } Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 4524f978 f1892141 [-1] / 0x00000000 } IP; New SA Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5e00/0] Destructor Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5e00/0] Freeing Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 4524 f978 f189 2141 E$.x..!A Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 2f76 4fd6 071c db28 /vO....( Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28} / 00000000, nego = -1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28}, nego = -1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28} Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = e2c3f123 initialized using slot 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = e2c3f123 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Sending negotiation back, error = 14 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 2f764fd6 071cdb28 } / e2c3f123, nego = 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 2f764fd6 071cdb28 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 2f764fd6 071cdb28 0b100500 e2c3f123 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 2f764fd6 071cd Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 2f764fd6 071cdb28 0b100500 e2c3f123 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 2f764fd6 071cd Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28}, nego = 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [0] / 0xe2c3f123 } Info; Deleting negotiation Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28}, nego = -1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28}, nego = -1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 2f764fd6 071cdb28 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 2f764fd6 071cdb28 } Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:20:33 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4c80 from freelist Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4c80/0] Allocating Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4c80/0] Processing received Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4c80/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4c80/0] Pad allows connection Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 7c87 6c68 dac1 faed |.lh.... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 7c876c68 dac1faed } Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 7c876c68 dac1faed [-1] / 0x00000000 } IP; New SA Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4c80/0] Destructor Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4c80/0] Freeing Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 7c87 6c68 dac1 faed |.lh.... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 00000000: 0c27 6384 7c57 65d4 .'c.|We. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4} / 00000000, nego = -1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4}, nego = -1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4} Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = f8e114b8 initialized using slot 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = f8e114b8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Sending negotiation back, error = 14 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 0c276384 7c5765d4 } / f8e114b8, nego = 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 0c276384 7c5765d4 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 0c276384 7c5765d4 0b100500 f8e114b8 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 0c276384 7c576 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 0c276384 7c5765d4 0b100500 f8e114b8 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 0c276384 7c576 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4}, nego = 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [0] / 0xf8e114b8 } Info; Deleting negotiation Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4}, nego = -1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4}, nego = -1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 0c276384 7c5765d4 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 0c276384 7c5765d4 } Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:21:13 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:21:33 In kmd_pm_process_all_delayed_requests Feb 7 00:21:33 Triggering all tunnels Feb 7 00:21:33 Global timer started with 60 seconds timeout Feb 7 00:21:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc4f00 from freelist Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc4f00/0] Allocating Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc4f00/0] Processing received Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc4f00/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc4f00/0] Pad allows connection Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 8f50 726d efde 6b36 .Prm..k6 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 8f50726d efde6b36 } Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 8f50726d efde6b36 [-1] / 0x00000000 } IP; New SA Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc4f00/0] Destructor Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc4f00/0] Freeing Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 8f50 726d efde 6b36 .Prm..k6 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 00000000: 73fb 6b35 0fdd cf36 s.k5...6 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36} / 00000000, nego = -1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Restart packet Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36}, nego = -1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36} Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = 246eb453 initialized using slot 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = 246eb453 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Sending negotiation back, error = 14 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - 73fb6b35 0fddcf36 } / 246eb453, nego = 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 73fb6b35 0fddcf36 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 73fb6b35 0fddcf36 0b100500 246eb453 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 73fb6b35 0fddc Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 73fb6b35 0fddcf36 0b100500 246eb453 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 73fb6b35 0fddc Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36}, nego = 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [0] / 0x246eb453 } Info; Deleting negotiation Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36}, nego = -1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36}, nego = -1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - 73fb6b35 0fddcf36 } Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:21:53 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start Feb 7 00:22:33 In kmd_pm_process_all_delayed_requests Feb 7 00:22:33 Triggering all tunnels Feb 7 00:22:33 Global timer started with 60 seconds timeout Feb 7 00:22:33 Inside kmd_poll_sa_incoming_stats..... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: *** Packet RX (len 252) from 168.1.114.92:500, VR id 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_recv: Received packet from 168.1.114.92:500 to :500 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000000: b958 2984 4bc2 2ad9 0000 0000 0000 0000 .X).K.*......... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000010: 0110 0200 0000 0000 0000 00fc 0d00 0034 ...............4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000020: 0000 0001 0000 0001 0000 0028 0001 0001 ...........(.... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000030: 0000 0020 0001 0000 800b 0001 800c 7080 ... ..........p. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000040: 8001 0005 8002 0001 8003 0001 8004 0005 ................ Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000050: 0d00 0014 882f e56d 6fd2 0dbc 2251 613b ...../.mo..."Qa; Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000060: 2ebe 5beb 0d00 0014 12f5 f28c 4571 68a9 ..[.........Eqh. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000070: 702d 9fe2 74cc 0100 0d00 000c 0900 2689 p-..t.........&. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000080: dfd6 b712 0d00 0014 afca d713 68a1 f1c9 ............h... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000090: 6b86 96fc 7757 0100 0d00 0014 4a13 1c81 k...wW......J... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 000000a0: 0703 5845 5c57 28f2 0e95 452f 0d00 0014 ..XE\W(...E/.... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 000000b0: 7d94 19a6 5310 ca6f 2c17 9d92 1552 9d56 }...S..o,....R.V Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 000000c0: 0d00 0014 cd60 4643 35df 21f8 7cfd b2fc .....`FC5.!.|... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 000000d0: 68b6 a448 0d00 0014 90cb 8091 3ebb 696e h..H........>.in Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 000000e0: 0863 81b5 ec42 7b1f 0000 0014 4485 152d .c...B{.....D..- Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 000000f0: 18b6 bbcd 0be8 a846 9579 ddcc .......F.y.. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: Allocated packet 8cc5180 from freelist Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_allocate: [8cc5180/0] Allocating Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_start: [8cc5180/0] Processing received Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Looking up instance for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_get Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_input_v1_create_sa: [8cc5180/0] No IKE SA for packet; requesting permission to create one. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_new_connection Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_st_connect_decision: [8cc5180/0] Pad allows connection Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: Packet from 168.1.114.92:500, use_natt=0 data[0..252] = b9582984 4bc22ad9 00000000 00000000 ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: Start, SA = { b9582984 4bc22ad9 - 00000000 00000000 } / 00000000, remote = 168.1.114.92:500 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_get_sa: We are responder and this is initiators first packet Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_cookie_create: Cookie create Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 6181 9539 c103 8cbc a..9.... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_allocate: Start, SA = { b9582984 4bc22ad9 - 61819539 c1038cbc } Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_udp_callback_common: New SA Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_init_isakmp_sa: Start, remote = 168.1.114.92:500, initiator = 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - 61819539 c1038cbc [-1] / 0x00000000 } IP; New SA Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_new_connection: New ISAKMP connection from remote address 168.1.114.92/500 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Taking reference to fallback negotiation 8d16400 (now 1 references) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation 8d16400 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_new_connection: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_destroy: [8cc5180/0] Destructor Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_packet_free: [8cc5180/0] Freeing Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_allocate_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_p1_negotiation_allocate_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x0 ike_sa 0x0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Suspending until the IKE SA is done (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_start: FB; Calling v2 policy function ike_sa_allocate Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_allocate Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_alloc Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Allocated p1 data 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Returning SA 8cad200, ref count 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_ike_sa_allocate_cb: New IKE SA allocated successfully 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_take_ref: Calling ike_sa_take_ref Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_take_ref Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Taking reference to IKE SA 8cad200 to ref count:2 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Calling exchange_data_alloc Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_alloc Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Allocate IKE exchange data for SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Exchange data allocated ED 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data: Successfully allocated exchange data for SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Allocating IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ike: Successfully allocated IKE exchange data for SA 8cad200 ED 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Allocating IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_allocate_exchange_data_ipsec: Successfully allocated IPsec exchange data for SA 8cad200 ED 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Updating responder IKE cookie Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: Original IKE cookie Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000000: 6181 9539 c103 8cbc a..9.... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_isakmp_update_responder_cookie: New IKE cookie Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 00000000: b4e1 ccfc 5f5c 27fd ...._\'. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=10.0.10.12:500, remote=168.1.114.92:500 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_new_p1_connection_local_addresses: FB; Calling v2 policy function get_local_address_list Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Received packet[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Packet received[252] = 0xb9582984 4bc22ad9 00000000 00000000 01100200 00000000 000000fc 0d000034 00000001 00000001 00000028 00010001 00000020 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: Start, SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd} / 00000000, nego = -1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: first_payload_type:1. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:13. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_packet: next_payload_type:0. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: doi = 1, sit = 0x1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_sa: Found 1 proposals Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: Proposal[0] = 0 .protocol[0] = 1, # transforms = 1, spi[0] Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_decode_payload_t: Start, # trans = 1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 11 (0x000b), value = 1 (0x0001), size = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 12 (0x000c), value = 28800 (0x7080), size = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 1 (0x0001), value = 5 (0x0005), size = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 2 (0x0002), value = 1 (0x0001), size = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 3 (0x0003), value = 1 (0x0001), size = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute_size: decode_size B: type = 4 (0x0004), value = 5 (0x0005), size = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: trans[0] = 0, id = 1, # sa = #6 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 11 (0x000b), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: da[0], type = 11, value[2] = 0x0001 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 12 (0x000c), value = 28800 (0x7080), len = 2, used_bytes = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: da[1], type = 12, value[2] = 0x7080 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 1 (0x0001), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: da[2], type = 1, value[2] = 0x0005 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 2 (0x0002), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: da[3], type = 2, value[2] = 0x0001 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 3 (0x0003), value = 1 (0x0001), len = 2, used_bytes = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: da[4], type = 3, value[2] = 0x0001 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_decode_data_attribute: decode B: type = 4 (0x0004), value = 5 (0x0005), len = 2, used_bytes = 4 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode SA: da[5], type = 4, value[2] = 0x0005 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x882fe56d 6fd20dbc 2251613b 2ebe5beb Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x12f5f28c 457168a9 702d9fe2 74cc0100 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[8] = 0x09002689 dfd6b712 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xafcad713 68a1f1c9 6b8696fc 77570100 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4a131c81 07035845 5c5728f2 0e95452f Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x7d9419a6 5310ca6f 2c179d92 15529d56 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0xcd604643 35df21f8 7cfdb2fc 68b6a448 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x90cb8091 3ebb696e 086381b5 ec427b1f Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Decode VID: data[16] = 0x4485152d 18b6bbcd 0be8a846 9579ddcc Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[0] = ike_st_i_vid Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 882fe56d 6fd20dbc ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 12f5f28c 457168a9 ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for CISCO-UNITY Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..8] = 09002689 dfd6b712 ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 8, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-beaulieu-ike-xauth-02.txt Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3706 (Dead Peer Detection) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4a131c81 07035845 ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [RFC 3947] Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for RFC 3947 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 7d9419a6 5310ca6f ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-03] Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-03 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = cd604643 35df21f8 ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 90cb8091 3ebb696e ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Received NAT-T vendor id [draft-ietf-ipsec-nat-t-ike-02] Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_pad_received_vendor_id: Received vendor-id for draft-ietf-ipsec-nat-t-ike-02 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_vid: VID[0..16] = 4485152d 18b6bbcd ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: Received vendor ID, length 16, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_check_natt_vendor_id: Start ike_sa 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_vendor_id: FB; Calling v2 policy function vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_pad_received_vendor_id Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Select IKE SA policy call entered, IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_allocate Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Allocated SA payload 8cb5600 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_select_sa: Taking reference to fallback negotiation 8d16400 (now 2 references) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_thread_debug_info: ikev2_fb_isakmp_select_sa: set thread debug info - local 0xc0a000a remote 0x5c7201a8neg 0x8d16400 neg->ike_sa 0x8cad200 ike_sa 0x0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Input function[1] = ike_st_i_sa_proposal asked retry later Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_process_packet: No output packet, returning Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_st_select_ike_sa: FB; Calling v2 policy function select_ike_sa Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_spd_select_ike_sa: Enter SA 8cad200 ED 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Looking up IKE gateway for server: 10.0.10.12 and routing instance id: 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] instance: IPSEC-SITE-TO-SITE found for server: 10.0.10.12 in routing instance id: 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Instance: IPSEC-SITE-TO-SITE is down as service interface: si-0/0/0.2 is not up, Lookup failed. Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] No instance available to serve this request Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_spd_select_sa_cb: IKEv2 SA select failed with error Invalid argument (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_isakmp_sa_reply: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Fallback negotiation 8d16400 has still 1 references Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Restart packet Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Start, restart packet SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd}, nego = -1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Version = 1.0, Input packet fields = 0401 SA VID Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = any, Responder Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matching with state = Start sa negotiation R (2), xchg = 2, auth = 0, fields = 0001 / 06c0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Matched state = Start sa negotiation R (2) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[1] = ike_st_i_sa_proposal Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_sa_proposal: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[2] = ike_st_i_cr Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cr: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[3] = ike_st_i_cert Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_cert: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[4] = ike_st_i_status_n Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling input function[5] = ike_st_i_private Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_i_private: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Calling output function[0] = ike_st_o_sa_values Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_st_o_sa_values: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_step: Output function[0] = ike_st_o_sa_values failed Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_state_restart_packet: Error, send notify Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_done_isakmp: Entered IKE error code No proposal chosen (14), IKE SA 8cad200 (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Error = No proposal chosen (14) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Start, SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd} Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_alloc_negotiation: Found slot 0, max 1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: New informational negotiation message_id = c9f2c672 initialized using slot 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: Created random message id = c9f2c672 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_init_info_exchange: No phase 1 done, use only N or D payload Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 12 (0x000c), len = 2, value = 0001 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode V: type = 6 (0x0006), len = 34 (0x0022), value = 436f756c ... Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_encode_data_attribute: encode B: type = 8 (0x0008), len = 2, value = 0000 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Sending negotiation back, error = 14 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Start, SA = { 0xb9582984 4bc22ad9 - b4e1ccfc 5f5c27fd } / c9f2c672, nego = 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Encode packet, version = 1.0, flags = 0x00000000 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Encode N: doi = 1, proto = 1, type = 14, spi[16] = 0xb9582984 4bc22ad9 b4e1ccfc 5f5c27fd Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Encode N: data[46] = 0x800c0001 00060022 436f756c 64206e6f 74206669 6e642061 63636570 7461626c 65207072 6f706f73 616c8008 0000 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 74 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Payload length = 102 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Encoded packet[102] = 0xb9582984 4bc22ad9 b4e1ccfc 5f5c27fd 0b100500 c9f2c672 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 b4e1ccfc 5f5c2 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_encode_packet: Final length = 102 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_send_notify: Sending notification to 168.1.114.92:500 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In: juniper_get_rtb_idx_from_pm_info pm: 8cf0180 local_gw: 8c51a60 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Return local_gw: 10.0.10.12 and routing instance id: 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_send_packet: <-------- sending SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd}, len = 102, nego = 0, local ip= 10.0.10.12, dst = 168.1.114.92:500, routing table id = 8 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Sending packet[102] = 0xb9582984 4bc22ad9 b4e1ccfc 5f5c27fd 0b100500 c9f2c672 00000066 0000004a 00000001 0110000e b9582984 4bc22ad9 b4e1ccfc 5f5c2 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd}, nego = 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] :500 (Initiator) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [0] / 0xc9f2c672 } Info; Deleting negotiation Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_info: Start, nego = 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_phase_ii_sa_freed: Phase-II free Entered Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: Phase-I negotiation is now done (neg 8d16400) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_wait_sa_done: FB; Calling v2 policy function ike_sa_done Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_done Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] kmd_pm_ike_sa_delete_notif_done_cb: Received success IKE SA 8cad200 delete notification Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] IKE SA negotiation failed for remote-ip:168.1.114.92,do tunnel failover Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] IKEv1 Error : No proposal chosen Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_p1_negotiation_destructor: Freeing fallback negotiation context Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In ssh_ikev2_sa_free Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_negotiation_clear_pm_data: Clearing fb pm_data Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fallback_negotiation_free: Freeing fallback negotiation 8d16400 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Freeing exchange data from SA 8cad200, ED 8e25028 (1) Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Freeing IPsec exchange data from SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ipsec: Successfully freed IPsec exchange data from SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Freeing IKE exchange data from SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data_ike: Successfully freed IKE exchange data from SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Calling exchange_data_free Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_exchange_data_free : ed 8e25028 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] SA 8cad200, ED 8e25028 application context 0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_free_exchange_data: Successfully freed exchange data from SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ikev2_ike_sa_free: Calling ike_sa_free_ref Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_sad_sa_free_ref Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_set_debug_gw_info: ssh_set_debug_gw_info: set gw debug info - local 10.0.10.12 remote 168.1.114.92 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_remove_callback: Start, delete SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd}, nego = -1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Removing negotiation Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_delete_negotiation: Start, SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd}, nego = -1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] 10.0.10.12:500 (Responder) <-> 168.1.114.92:500 { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd [-1] / 0x00000000 } IP; Deleting negotiation Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_sa_delete: Start, SA = { b9582984 4bc22ad9 - b4e1ccfc 5f5c27fd } Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation_isakmp: Start, nego = -1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_negotiation: Start, nego = -1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_packet: Start Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA 8cad200 is freed Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_fb_isakmp_sa_freed: FB; Calling v2 policy function ike_sa_delete Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sa_delete Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Deleting IKE SA 8cad200 current ref_cnt: 1 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Removing DPD server entry for remote peer: 168.1.114.92:500 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_abort_ike_operations Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Freeing reference to IKE SA 8cad200 to ref count:0 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_destroy Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_hash Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ike_sad_ike_sa_compare Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In: kmd_pm_ike_remove_p1_negotiation p1_data: 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_tree_entry_delete Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Calling IKE SA uninit from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ikev2_udp_window_uninit: Freeing transmission windows for SA 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] Calling kmd_pm_p1_data_free from kmd_pm_p1_destroyfor p1 8cad200 Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_p1_data_free Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] In kmd_pm_ikev2_id_free Feb 7 00:22:33 [10.0.10.12 <-> 168.1.114.92] ike_free_sa: Start