ASA# packet-tracer input VOICE-LAN tcp 192.168.200.199 345 192.168.201.2 123 Phase: 1 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: MAC Access list Phase: 2 Type: ROUTE-LOOKUP Subtype: Resolve Egress Interface Result: ALLOW Config: Additional Information: found next-hop x.x.x.17 using egress ifc outside Phase: 3 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (VOICE-LAN,outside) source static NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_2 4 destination static NETWORK_OBJ_192.168.201.0_24 NETWORK_OBJ_192.168.201.0_24 no-proxy-arp ro ute-lookup Additional Information: <--- More --->IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: IDLE Event: EV_INIT_SA IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_GET_IKE_POLICY IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_SET_POLICY IKEv2-PROTO-5: (6): Setting configured policies IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_CHK_AUTH4PKI IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_GEN_DH_KEY IKEv2-PROTO-2: (6): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 2 IKEv2-PROTO-2: (6): Request queued for computation of DH key IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP IKEv2-PROTO-5: (6): Action: Action_Null IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_GET_CONFIG_MODE IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_BLD_MSG IKEv2-PROTO-2: (6): Generating IKE_SA_INIT message IKEv2-PROTO-2: (6): IKE Proposal: 1, SPI size: 0 (initial negotiation), Num. transforms: 4 (6): AES-CBC(6): SHA256(6): SHA256(6): DH_GROUP_1024_MODP/Group 2IKEv2-PROTO-5: Co nstruct Vendor Specific Payload: DELETE-REASONIKEv2-PROTO-5: Construct Vendor Specific Payload : (CUSTOM)IKEv2-PROTO-5: Construct Notify Payload: NAT_DETECTION_SOURCE_IPIKEv2-PROTO-5: Const ruct Notify Payload: NAT_DETECTION_DESTINATION_IPIKEv2-PROTO-5: Construct Vendor Specific Payl oad: FRAGMENTATION(6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : 0000000000000000 Message id: 0 (6): IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: SA, version: 2.0 (6): Exchange type: IKE_SA_INIT, flags: INITIATOR (6): Message id: 0, length: 438(6): Payload contents: (6): SA(6): Next payload: KE, reserved: 0x0, length: 48 (6): last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(6): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (6): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (6): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (6): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2 (6): KE(6): Next payload: N, reserved: 0x0, length: 136 (6): DH group: 2, Reserved: 0x0 (6): (6): 5b 60 aa 1f a3 04 be 35 22 81 22 c0 18 04 2b e4 (6): 4f be 39 de 95 e4 05 de ee 22 ce 21 c6 5a 32 23 (6): 38 12 12 b5 3c 4c 6e 67 6e 25 ed 95 31 f5 8d b5 (6): 67 9a fc 27 74 e0 99 f0 01 1a a7 07 a7 26 ba 85 (6): 37 2b 1c 85 00 3e f9 4f 60 55 9b ae ab 36 be ee (6): ae b1 69 06 a7 4f 29 b3 b5 b4 87 73 62 6f 58 1f (6): d7 bc 0c 6c 88 ee fc 98 84 0c 16 91 eb 5a 21 43 (6): f7 76 7b 73 6a 02 9f e7 38 47 f2 70 86 f5 d6 66 (6): N(6): Next payload: VID, reserved: 0x0, length: 68 (6): (6): 66 f8 a5 32 11 7b 31 3d 4b 3c c1 15 71 e4 ec 3d (6): d9 7d c8 5b f5 ef 8a 77 7a 7e b9 ca 16 63 0f c5 (6): 20 ec bf 71 13 45 a5 a5 01 cb b1 eb dd dd 00 f0 (6): f8 e2 b7 71 f4 9f 4c 58 ba 29 07 6c 88 8e a1 43 (6): VID(6): Next payload: VID, reserved: 0x0, length: 23 (6): (6): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41 (6): 53 4f 4e (6): VID(6): Next payload: NOTIFY, reserved: 0x0, length: 59 (6): (6): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29 (6): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32 (6): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d (6): 73 2c 20 49 6e 63 2e (6): NOTIFY(NAT_DETECTION_SOURCE_IP)(6): Next payload: NOTIFY, reserved: 0x0, length: 28 (6): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP (6): (6): 25 2d df 45 1e 04 03 11 55 b9 16 bd 2e b3 18 1e (6): 03 53 a6 00 (6): NOTIFY(NAT_DETECTION_DESTINATION_IP)(6): Next payload: VID, reserved: 0x0, length: 28 (6): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP (6): (6): 9c 48 65 bd 3a c4 ae aa aa 53 99 29 9c 2a 2e 93 (6): 17 ba b6 59 (6): VID(6): Next payload: NONE, reserved: 0x0, length: 20 (6): (6): 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_BLD_INIT Event: EV_INSERT_SA IKEv2-PROTO-2: (6): Insert SA IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=0000000000000000 (I) MsgID = 0 0000000 CurState: I_WAIT_INIT Event: EV_NO_EVENT (6): IKEv2-PROTO-2: (6): Received Packet [From x.x.x.x:500/To x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 0 (6): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-3: (6): Next payload: SA, version: 2.0 (6) : Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (6): Message id: 0, length: 374(6) : Payload contents: (6): SA(6): Next payload: KE, reserved: 0x0, length: 48 (6): last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(6): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (6): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (6): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (6): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2 (6): KE(6): Next payload: N, reserved: 0x0, length: 136 (6): DH group: 2, Reserved: 0x0 (6): (6): 1e d0 0a 67 d2 47 7d d5 27 bb 40 e6 01 13 2d 6c (6): e1 52 f6 62 60 c4 06 4a fb e9 69 e2 9e 6e 49 42 (6): 3f 2f f4 df dc 05 3f 3c 20 4f 5f 59 a4 3a e5 4a (6): f6 46 c2 9b ca ce c9 1a 73 94 d2 a9 11 5e da 65 (6): 8a 48 c4 57 bd 2d b4 c8 cc d0 c8 be df e7 5c 95 (6): 37 9a cd a9 ee ff a8 d2 6f 82 92 fd 9d 17 e1 e3 (6): 83 ef 4f 05 37 c8 8a 81 91 a2 9b cb bf 80 19 14 (6): 25 7f 0a 43 f1 67 5c 52 05 eb 9e 0f 57 f0 4c 7e (6): N(6): Next payload: VID, reserved: 0x0, length: 24 (6): (6): 87 d9 bc 46 d1 1b 8e 2b 74 16 3e 0f 1e e0 25 b2 (6): cc 18 38 1f IKEv2-PROTO-5: Parse Vendor Specific Payload: CISCO-DELETE-REASON(6): VID(6): Next payload: VID, reserved: 0x0, length: 23 (6): (6): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41 (6): 53 4f 4e IKEv2-PROTO-5: Parse Vendor Specific Payload: (CUSTOM)(6): VID(6): Next payload: NOTIFY, re served: 0x0, length: 59 (6): (6): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29 (6): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32 (6): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d (6): 73 2c 20 49 6e 63 2e IKEv2-PROTO-5: Parse Notify Payload: NAT_DETECTION_SOURCE_IP(6): NOTIFY(NAT_DETECTION_SOURCE_ IP)(6): Next payload: NOTIFY, reserved: 0x0, length: 28 (6): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP (6): (6): 05 e2 a2 7e d3 fc 0a 91 ca ce 74 99 ee 2a 94 c2 (6): 6f 51 75 2d IKEv2-PROTO-5: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP(6): NOTIFY(NAT_DETECTION_DE STINATION_IP)(6): Next payload: NONE, reserved: 0x0, length: 28 (6): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP (6): (6): f8 37 a4 4b a9 7d f9 8f 1b 2d 06 6d 79 10 44 a4 (6): d6 b0 ba 4e (6): (6): Decrypted packet:(6): Data: 374 bytes IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_WAIT_INIT Event: EV_RECV_INIT IKEv2-PROTO-5: (6): Processing IKE_SA_INIT message IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_PROC_INIT Event: EV_CHK4_NOTIFY IKEv2-PROTO-2: (6): Processing IKE_SA_INIT message IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_PROC_INIT Event: EV_VERIFY_MSG IKEv2-PROTO-2: (6): Verify SA init message IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_PROC_INIT Event: EV_PROC_MSG IKEv2-PROTO-2: (6): Processing IKE_SA_INIT message IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_PROC_INIT Event: EV_DETECT_NAT IKEv2-PROTO-5: (6): Process NAT discovery notify IKEv2-PROTO-5: (6): Processing nat detect src notify IKEv2-PROTO-5: (6): Remote address matched IKEv2-PROTO-5: (6): Processing nat detect dst notify IKEv2-PROTO-5: (6): Local address matched IKEv2-PROTO-5: (6): No NAT found IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_PROC_INIT Event: EV_CHK_NAT_T IKEv2-PROTO-2: (6): Checking NAT discovery IKEv2-PROTO-2: (6): NAT not found IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_PROC_INIT Event: EV_CHK_CONFIG_MODE IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: INIT_DONE Event: EV_GEN_DH_SECRET IKEv2-PROTO-2: (6): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 2 IKEv2-PROTO-2: (6): Request queued for computation of DH secret IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: INIT_DONE Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: INIT_DONE Event: EV_OK_RECD_DH_SECRET_RESP IKEv2-PROTO-5: (6): Action: Action_Null IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: INIT_DONE Event: EV_GEN_SKEYID IKEv2-PROTO-5: (6): Generate skeyid IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: INIT_DONE Event: EV_DONE IKEv2-PROTO-5: (6): Cisco DeleteReason Notify is enabled IKEv2-PROTO-2: (6): Completed SA init exchange IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: INIT_DONE Event: EV_CHK4_ROLE IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_BLD_AUTH Event: EV_GET_CONFIG_MODE IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_BLD_AUTH Event: EV_CHK_EAP IKEv2-PROTO-2: (6): Check for EAP exchange IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_BLD_AUTH Event: EV_GEN_AUTH IKEv2-PROTO-2: (6): Generate my authentication data IKEv2-PROTO-2: (6): Use preshared key for id 184.68.114.18, key len 18 IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_BLD_AUTH Event: EV_CHK_AUTH_TYPE IKEv2-PROTO-2: (6): Get my authentication method IKEv2-PROTO-2: (6): My authentication method is 'PSK' IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_BLD_AUTH Event: EV_OK_AUTH_GEN IKEv2-PROTO-2: (6): Check for EAP exchange IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 0 0000000 CurState: I_BLD_AUTH Event: EV_SEND_AUTH IKEv2-PROTO-2: (6): Generating IKE_AUTH message IKEv2-PROTO-5: Construct Vendor Specific Payload: CISCO-GRANITEIKEv2-PROTO-2: (6): Constructin g IDi payload: '184.68.114.18' of type 'IPv4 address' IKEv2-PROTO-2: (6): ESP Proposal: 1, SPI size: 4 (IPSec negotiation), Num. transforms: 6 (6): AES-CBC(6): 3DES(6): SHA256(6): SHA96(6): MD596(6): Don't use ESNIKEv2- PROTO-2: (6): ESP Proposal: 2, SPI size: 4 (IPSec negotiation), Num. transforms: 2 (6): AES-GMAC(6): Don't use ESNIKEv2-PROTO-5: Construct Notify Payload: INITIAL_CONTACTI KEv2-PROTO-5: Construct Notify Payload: ESP_TFC_NO_SUPPORTIKEv2-PROTO-5: Construct Notify Payl oad: NON_FIRST_FRAGSIKEv2-PROTO-2: (6): Building packet for encryption. (6): Payload contents: (6): VID(6): Next payload: IDi, reserved: 0x0, length: 20 (6): (6): bf 6e 22 a1 42 b2 ed 9f 21 47 70 9b cc 4e 45 3c (6): IDi(6): Next payload: AUTH, reserved: 0x0, length: 12 (6): Id type: IPv4 address, Reserved: 0x0 0x0 (6): (6): b8 44 72 12 (6): AUTH(6): Next payload: SA, reserved: 0x0, length: 40 (6): Auth method PSK, reserved: 0x0, reserved 0x0 (6): Auth data: 32 bytes (6): SA(6): Next payload: TSi, reserved: 0x0, length: 100 (6): last proposal: 0x2, reserved: 0x0, length: 64 Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 6(6): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (6): last transform: 0x3, reserved: 0x0: length: 8 type: 1, reserved: 0x0, id: 3DES (6): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (6): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA96 (6): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: MD596 (6): last transform: 0x0, reserved: 0x0: length: 8 type: 5, reserved: 0x0, id: Don't use ESN (6): last proposal: 0x0, reserved: 0x0, length: 32 Proposal: 2, Protocol id: ESP, SPI size: 4, #trans: 2(6): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-GMAC (6): last transform: 0x0, reserved: 0x0: length: 8 type: 5, reserved: 0x0, id: Don't use ESN (6): TSi(6): Next payload: TSr, reserved: 0x0, length: 40 (6): Num of TSs: 2, reserved 0x0, reserved 0x0 (6): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (6): start port: 0, end port: 65535 (6): start addr: 192.168.200.199, end addr: 192.168.200.199 (6): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (6): start port: 0, end port: 65535 (6): start addr: 192.168.200.0, end addr: 192.168.200.255 (6): TSr(6): Next payload: NOTIFY, reserved: 0x0, length: 40 (6): Num of TSs: 2, reserved 0x0, reserved 0x0 (6): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (6): start port: 0, end port: 65535 (6): start addr: 192.168.201.2, end addr: 192.168.201.2 (6): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (6): start port: 0, end port: 65535 (6): start addr: 192.168.201.0, end addr: 192.168.201.255 (6): NOTIFY(INITIAL_CONTACT)(6): Next payload: NOTIFY, reserved: 0x0, length: 8 (6): Security protocol id: IKE, spi size: 0, type: INITIAL_CONTACT (6): NOTIFY(ESP_TFC_NO_SUPPORT)(6): Next payload: NOTIFY, reserved: 0x0, length: 8 (6): Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT (6): NOTIFY(NON_FIRST_FRAGS)(6): Next payload: NONE, reserved: 0x0, length: 8 (6): Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_ENCRYPT_MSG IKEv2-PROTO-2: (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_OK_ENCRYPT_RESP IKEv2-PROTO-5: (6): Action: Action_Null IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_TRYSEND (6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_CHK_EAP_POST_ASYNC IKEv2-PROTO-2: (6): Check for EAP exchange IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-2: (6): Retransmitting packet (6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-2: (6): Retransmitting packet (6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-2: (6): Retransmitting packet (6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT NAT divert to egress interface outside Untranslate 192.168.201.2/123 to 192.168.201.2/123 Phase: 4 Type: NAT Subtype: Result: ALLOW Config: nat (VOICE-LAN,outside) source static NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 destination static NETWORK_OBJ_192.168.201.0_24 NETWORK_OBJ_192.168.201.0_24 no-proxy-arp route-lookup Additional Information: Static translate 192.168.200.199/345 to 192.168.200.199/345 Phase: 5 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Phase: 6 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: <--- More --->IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-2: (6): Retransmitting packet (6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT Phase: 7 Type: VPN Subtype: encrypt Result: DROP Config: Additional Information: Result: input-interface: VOICE-LAN input-status: up input-line-status: up output-interface: outside output-status: up output-line-status: up Action: drop Drop-reason: (acl-drop) Flow is denied by configured rule IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-2: (6): Retransmitting packet (6): IKEv2-PROTO-2: (6): Sending Packet [To x.x.x.202:500/From x.x.x.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT PCC-ASA# IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-2: (6): Retransmitting packet (6): IKEv2-PROTO-2: (6): Sending Packet [To 184.71.52.202:500/From 184.68.114.18:500/VRF i0:f0] (6): Initiator SPI : BD6E23A151851ED8 - Responder SPI : AC77005C86E9DD85 Message id: 1 (6): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-3: (6): Next payload: ENCR, version: 2.0 (6): Exchange type: IKE_AUTH, flags: INITIATOR (6): Message id: 1, length: 352(6): Payload contents: (6): ENCR(6): Next payload: VID, reserved: 0x0, length: 324 (6): Encrypted data: 320 bytes (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT_EXCEED IKEv2-PROTO-1: (6): Maximum number of retransmissions reached IKEv2-PROTO-1: (6): IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: AUTH_DONE Event: EV_FAIL IKEv2-PROTO-2: (6): Auth exchange failed IKEv2-PROTO-1: (6): Auth exchange failed IKEv2-PROTO-1: (6): Auth exchange failed IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: EXIT Event: EV_ABORT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: EXIT Event: EV_CHK_PENDING_ABORT IKEv2-PROTO-5: (6): SM Trace-> SA: I_SPI=BD6E23A151851ED8 R_SPI=AC77005C86E9DD85 (I) MsgID = 00000001 CurState: EXIT Event: EV_UPDATE_CAC_STATS IKEv2-PROTO-2: (6): Abort exchange IKEv2-PROTO-2: (6): Deleting SA IKEv2-PROTO-5: Process delete IPSec API IKEv2-PROTO-5: ipsec delete IKEv2-PROTO-5: Process delete IPSec API IKEv2-PROTO-5: ipsec delete