*Mar 18 12:55:28.830: IKEv2:Got a packet from dispatcher *Mar 18 12:55:28.830: IKEv2:Processing an item off the pak queue *Mar 18 12:55:28.830: IKEv2:New ikev2 sa request admitted *Mar 18 12:55:28.830: IKEv2:Incrementing incoming negotiating sa count by one *Mar 18 12:55:28.830: IKEv2:Next payload: SA, version: 2.0 Exchange type: IKE_SA_INIT, flags: INITIATOR Message id: 0, length: 496 Payload contents: SA Next payload: KE, reserved: 0x0, length: 144 last proposal: 0x0, reserved: 0x0, length: 140 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 15 last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA512 last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA384 last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA1 last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: MD5 last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA512 last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA384 last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA96 last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: MD596 last transform: 0x3, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_1536_MODP/Group 5 last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2 KE Next payload: N, reserved: 0x0, length: 200 DH group: 5, Reserved: 0x0 N Next payload: VID, reserved: 0x0, length: 24 *Mar 18 12:55:28.830: IKEv2:Parse Vendor Specific Payload: CISCO-DELETE-REASON VID Next payload: VID, reserved: 0x0, length: 23 *Mar 18 12:55:28.830: IKEv2:Parse Vendor Specific Payload: (CUSTOM) VID Next payload: NOTIFY, reserved: 0x0, length: 21 *Mar 18 12:55:28.830: IKEv2:Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28 Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP *Mar 18 12:55:28.830: IKEv2:Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: NONE, reserved: 0x0, length: 28 Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: IDLE Event: EV_RECV_INIT *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_INIT Event: EV_VERIFY_MSG *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_INIT Event: EV_INSERT_SA *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_INIT Event: EV_GET_IKE_POLICY *Mar 18 12:55:28.830: IKEv2:Adding Proposal default to toolkit policy *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_INIT Event: EV_PROC_MSG *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_INIT Event: EV_DETECT_NAT *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Process NAT discovery notify *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Processing nat detect src notify *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Remote address matched *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Processing nat detect dst notify *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Local address matched *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):No NAT found *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_INIT Event: EV_CHK_CONFIG_MODE *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_SET_POLICY *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Setting configured policies *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Opening a PKI session *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_NO_EVENT *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):Action: Action_Null *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET *Mar 18 12:55:28.830: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_NO_EVENT *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):Action: Action_Null *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_GEN_SKEYID *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):Generate skeyid *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE *Mar 18 12:55:28.838: IKEv2:No config data to send to toolkit: *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_BLD_INIT Event: EV_BLD_MSG *Mar 18 12:55:28.838: IKEv2:Construct Vendor Specific Payload: DELETE-REASON *Mar 18 12:55:28.838: IKEv2:Construct Vendor Specific Payload: (CUSTOM) *Mar 18 12:55:28.838: IKEv2:Construct Notify Payload: NAT_DETECTION_SOURCE_IP *Mar 18 12:55:28.838: IKEv2:Construct Notify Payload: NAT_DETECTION_DESTINATION_IP *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):Next payload: SA, version: 2.0 Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE Message id: 0, length: 425 Payload contents: SA Next payload: KE, reserved: 0x0, length: 48 last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4 last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA512 last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA512 last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_1536_MODP/Group 5 KE Next payload: N, reserved: 0x0, length: 200 DH group: 5, Reserved: 0x0 N Next payload: VID, reserved: 0x0, length: 24 VID Next payload: VID, reserved: 0x0, length: 23 VID Next payload: NOTIFY, reserved: 0x0, length: 21 NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28 Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: CERTREQ, reserved: 0x0, length: 28 Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP CERTREQ Next payload: NONE, reserved: 0x0, length: 25 Cert encoding X.509 Certificate - signature *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: INIT_DONE Event: EV_DONE *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):Cisco DeleteReason Notify is enabled *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: INIT_DONE Event: EV_CHK4_ROLE *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: INIT_DONE Event: EV_START_TMR *Mar 18 12:55:28.838: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 0 CurState: R_WAIT_AUTH Event: EV_NO_EVENT *Mar 18 12:55:28.854: IKEv2:Got a packet from dispatcher *Mar 18 12:55:28.854: IKEv2:Processing an item off the pak queue *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):Request has mess_id 1; expected 1 through 1 *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):Next payload: ENCR, version: 2.0 Exchange type: IKE_AUTH, flags: INITIATOR Message id: 1, length: 1312 Payload contents: *Mar 18 12:55:28.858: IKEv2:Parse Vendor Specific Payload: (CUSTOM) VID Next payload: IDi, reserved: 0x0, length: 20 IDi Next payload: CERT, reserved: 0x0, length: 15 Id type: FQDN, Reserved: 0x0 0x0 CERT Next payload: CERTREQ, reserved: 0x0, length: 584 Cert encoding X.509 Certificate - signature CERTREQ Next payload: AUTH, reserved: 0x0, length: 25 Cert encoding X.509 Certificate - signature AUTH Next payload: CFG, reserved: 0x0, length: 136 Auth method RSA, reserved: 0x0, reserved 0x0 CFG Next payload: SA, reserved: 0x0, length: 302 cfg type: CFG_REQUEST, reserved: 0x0, reserved: 0x0 *Mar 18 12:55:28.858: attrib type: internal IP4 DNS, length: 0 *Mar 18 12:55:28.858: attrib type: internal IP4 DNS, length: 0 *Mar 18 12:55:28.858: attrib type: internal IP4 NBNS, length: 0 *Mar 18 12:55:28.858: attrib type: internal IP4 NBNS, length: 0 *Mar 18 12:55:28.858: attrib type: internal IP4 subnet, length: 0 *Mar 18 12:55:28.858: attrib type: internal IP6 DNS, length: 0 *Mar 18 12:55:28.858: attrib type: internal IP6 subnet, length: 0 *Mar 18 12:55:28.858: attrib type: application version, length: 242 attrib type: Unknown - 28675, length: 0 *Mar 18 12:55:28.858: attrib type: Unknown - 28672, length: 0 *Mar 18 12:55:28.858: attrib type: Unknown - 28692, length: 0 *Mar 18 12:55:28.858: attrib type: Unknown - 28681, length: 0 *Mar 18 12:55:28.858: attrib type: Unknown - 28674, length: 0 *Mar 18 12:55:28.858: SA Next payload: TSi, reserved: 0x0, length: 44 last proposal: 0x0, reserved: 0x0, length: 40 Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3 last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA96 last transform: 0x0, reserved: 0x0: length: 8 type: 5, reserved: 0x0, id: Don't use ESN TSi Next payload: TSr, reserved: 0x0, length: 24 Num of TSs: 1, reserved 0x0, reserved 0x0 TS type: TS_IPV4_ADDR_RANGE, proto id: 47, length: 16 start port: 0, end port: 65535 start addr: 6.6.6.183, end addr: 6.6.6.183 TSr Next payload: NOTIFY, reserved: 0x0, length: 24 Num of TSs: 1, reserved 0x0, reserved 0x0 TS type: TS_IPV4_ADDR_RANGE, proto id: 47, length: 16 start port: 0, end port: 65535 start addr: 6.6.6.180, end addr: 6.6.6.180 *Mar 18 12:55:28.858: IKEv2:Parse Notify Payload: INITIAL_CONTACT NOTIFY(INITIAL_CONTACT) Next payload: NOTIFY, reserved: 0x0, length: 8 Security protocol id: IKE, spi size: 0, type: INITIAL_CONTACT *Mar 18 12:55:28.858: IKEv2:Parse Notify Payload: USE_TRANSPORT_MODE NOTIFY(USE_TRANSPORT_MODE) Next payload: NOTIFY, reserved: 0x0, length: 8 Security protocol id: IKE, spi size: 0, type: USE_TRANSPORT_MODE *Mar 18 12:55:28.858: IKEv2:Parse Notify Payload: SET_WINDOW_SIZE NOTIFY(SET_WINDOW_SIZE) Next payload: NOTIFY, reserved: 0x0, length: 12 Security protocol id: IKE, spi size: 0, type: SET_WINDOW_SIZE *Mar 18 12:55:28.858: IKEv2:Parse Notify Payload: ESP_TFC_NO_SUPPORT NOTIFY(ESP_TFC_NO_SUPPORT) Next payload: NOTIFY, reserved: 0x0, length: 8 Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT *Mar 18 12:55:28.858: IKEv2:Parse Notify Payload: NON_FIRST_FRAGS NOTIFY(NON_FIRST_FRAGS) Next payload: NONE, reserved: 0x0, length: 8 Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_PROC_ID *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):Received valid parameteres in process id *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID *Mar 18 12:55:28.858: IKEv2:(1): Choosing IKE profile default *Mar 18 12:55:28.858: IKEv2:Optional profile description not updated in PSH *Mar 18 12:55:28.858: IKEv2:Adding Proposal default to toolkit policy *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_SET_POLICY *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):Setting configured policies *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID *Mar 18 12:55:28.858: IKEv2:Sending certificates as X509 certificates *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):Matching certificate found *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP *Mar 18 12:55:28.858: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_CHK_CERT_ENC *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_VERIFY_X509_CERTS *Mar 18 12:55:28.862: IKEv2:Peer has sent X509 certificates *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_SAVE_PUBKEY *Mar 18 12:55:28.862: IKEv2:Peer has sent its own certificate as the first certificate in the chain *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_NO_EVENT *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_OK_RECD_VERIFY_SIG *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):Action: Action_Null *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):Redirect check is not needed, skipping it *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_NOTIFY_AUTH_DONE *Mar 18 12:55:28.862: IKEv2:AAA group author request failed *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 0,SA ID = 1):AAA group authorization failed *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 0,SA ID = 1): *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: R_VERIFY_AUTH Event: EV_AUTH_FAIL *Mar 18 12:55:28.862: IKEv2:Construct Notify Payload: AUTHENTICATION_FAILED Payload contents: NOTIFY(AUTHENTICATION_FAILED) Next payload: NONE, reserved: 0x0, length: 8 Security protocol id: IKE, spi size: 0, type: AUTHENTICATION_FAILED *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):Next payload: ENCR, version: 2.0 Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE Message id: 1, length: 96 Payload contents: ENCR Next payload: NOTIFY, reserved: 0x0, length: 68 *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: AUTH_DONE Event: EV_FAIL *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):: Auth exchange failed *Mar 18 12:55:28.862: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: EXIT Event: EV_ABORT *Mar 18 12:55:28.866: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: EXIT Event: EV_CHK_PENDING_ABORT *Mar 18 12:55:28.866: IKEv2:Negotiating SA request deleted *Mar 18 12:55:28.866: IKEv2:Decrement count for incoming negotiating *Mar 18 12:55:28.866: IKEv2:(SESSION ID = 19069,SA ID = 1):SM Trace-> SA: I_SPI=6580C74CBAF73D15 R_SPI=097240A23587396C (R) MsgID = 1 CurState: EXIT Event: EV_UPDATE_CAC_STATS