ASA tunnel to Avaya debug logs: ACQBLRFW01/act/pri# debug cry IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: IDLE Event: EV_INIT_SA IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_IKE_POLICY IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_SET_POLICY IKEv2-PROTO-7: (3): Setting configured policies IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_CHK_AUTH4PKI IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GEN_DH_KEY IKEv2-PROTO-4: (3): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14 IKEv2-PROTO-4: (3): Request queued for computation of DH key IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_NO_EVENT IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP IKEv2-PROTO-7: (3): Action: Action_Null IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_CONFIG_MODE IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_BLD_MSG IKEv2-PROTO-4: (3): Generating IKE_SA_INIT message IKEv2-PROTO-4: (3): IKE Proposal: 1, SPI size: 0 (initial negotiation), Num. transforms: 4 (3): AES-CBC(3): SHA256(3): SHA256(3): DH_GROUP_2048_MODP/Group 14IKEv2-PROTO-4: (3): IKE Proposal: 2, SPI size: 0 (initial negotiation), Num. transforms: 4 (3): AES-CBC(3): SHA256(3): SHA256(3): DH_GROUP_2048_MODP/Group 14(3): IKEv2-PROTO-4: (3): Sending Packet [To 198.152.210.156:500/From 192.168.68.2:500/VRF i0:f0] (3): Initiator SPI : 4BA04414972807C8 - Responder SPI : 0000000000000000 Message id: 0 (3): IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-5: (3): Next payload: SA, version: 2.0 (3): Exchange type: IKE_SA_INIT, flags: INITIATOR (3): Message id: 0, length: 618(3): Payload contents: (3): SA(3): Next payload: KE, reserved: 0x0, length: 92 (3): last proposal: 0x2, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(3): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (3): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (3): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (3): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14 (3): last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 2, Protocol id: IKE, SPI size: 0, #trans: 4(3): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (3): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (3): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (3): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14 (3): KE(3): Next payload: N, reserved: 0x0, length: 264 (3): DH group: 14, Reserved: 0x0 (3): (3): 25 a2 79 22 a7 d0 1a 36 4a eb 4b 4e c1 09 25 0d (3): 40 3f 35 17 47 fc 23 88 75 d7 f5 c6 a0 cd 73 dd (3): 25 54 8f 5f a0 2b cf ad 70 b4 7f b0 23 42 9e ec (3): f5 aa 1d 4e 81 c1 52 9d 4a 4e 2e 18 c5 1d d9 3f (3): 9f c5 30 56 ff 61 93 24 f7 87 83 a3 93 5d 5c fa (3): 18 dc ef 3b 56 2d a8 5d 5e 58 d8 4e 50 01 46 be (3): 69 6e 7d ce fd e0 1c 5b 62 1b a1 a5 14 c9 97 67 (3): 34 f9 c3 f0 1f 82 d5 c5 cd 54 cd 86 45 93 6c 96 (3): c7 5f 31 1b 97 93 31 94 a0 ca ce 5b f2 96 02 3f (3): 97 18 15 c4 9b 8b c6 1c 75 6a ac e6 7b 85 01 3d (3): c7 df 3f 2c ff 1f 2d 73 d8 8d 0c 53 1b 0b 6d 07 (3): b9 8b 59 5b 89 5b 0b f2 53 e0 55 b9 6f f9 87 39 (3): 67 ca e4 6a 9e b0 ec d0 ae 92 92 e7 b8 8b 67 98 (3): 93 9e 7b 89 78 50 a2 6e f9 c8 36 47 31 e0 61 58 (3): dd d0 d8 f1 de 6c 35 70 92 17 f2 ae 8c d4 dd 50 (3): cb 4f 68 6d 7d 7d 97 66 5e e2 31 f1 6d 9b 2d 6b (3): N(3): Next payload: VID, reserved: 0x0, length: 68 (3): (3): 76 7a 3f a6 01 74 27 3d 99 4a 29 9a a0 f5 60 da (3): f6 02 a3 5e 70 9b f4 93 10 fb db 3a 1c a6 04 ac (3): 10 5c 0e e2 1d d7 94 6d 07 51 55 57 36 cf 03 3b (3): 65 08 3e 90 b8 ef 29 f8 b2 9c 14 b9 44 4f b4 ae (3): VID(3): Next payload: VID, reserved: 0x0, length: 23 (3): (3): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41 (3): 53 4f 4e (3): VID(3): Next payload: NOTIFY, reserved: 0x0, length: 59 (3): (3): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29 (3): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32 (3): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d (3): 73 2c 20 49 6e 63 2e (3): NOTIFY(NAT_DETECTION_SOURCE_IP)(3): Next payload: NOTIFY, reserved: 0x0, length: 28 (3): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP (3): (3): be c0 ef c2 4d bf a7 7c 1e 1c 04 21 0c 23 e0 0e (3): 71 2c 6b e7 (3): NOTIFY(NAT_DETECTION_DESTINATION_IP)(3): Next payload: NOTIFY, reserved: 0x0, length: 28 (3): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP (3): (3): 28 fb 93 c5 c0 6a 07 db 3c 61 18 62 28 d2 a2 df (3): e1 f8 e4 ae (3): NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(3): Next payload: VID, reserved: 0x0, length: 8 (3): Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED (3): VID(3): Next payload: NONE, reserved: 0x0, length: 20 (3): (3): 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 (3): IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_INSERT_SA IKEv2-PROTO-4: (3): Insert SA IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_NO_EVENT (3): IKEv2-PROTO-4: (3): Received Packet [From 198.152.210.156:500/To 192.168.68.2:500/VRF i0:f0] (3): Initiator SPI : 4BA04414972807C8 - Responder SPI : 14C6AE3E220383D7 Message id: 0 (3): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-5: (3): Next payload: SA, version: 2.0 (3): Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (3): Message id: 0, length: 376(3): Payload contents: (3): SA(3): Next payload: KE, reserved: 0x0, length: 48 (3): last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(3): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (3): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (3): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (3): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14 (3): KE(3): Next payload: N, reserved: 0x0, length: 264 (3): DH group: 14, Reserved: 0x0 (3): (3): 01 5d 21 cb f7 e7 cc a1 cd b2 0e 1a 20 17 f4 10 (3): 6e dc cf 1b c6 ce 13 74 02 2d 49 dd dc 3b 62 95 (3): 50 b6 19 f6 a8 4a 71 26 d5 c9 3b 50 ac cf 4f 9b (3): 11 66 17 6f d2 df 14 6d ac 62 a3 5a 71 5a 8e 1f (3): 5b 2b ee 23 9a ad 4a 98 bd 33 ff 46 51 fc 07 ee (3): 73 10 0e be 35 b4 61 9d 65 18 86 4e 14 fe 90 fe (3): 28 56 c7 db b8 fb e2 27 cd f4 42 dd b3 eb 9d 81 (3): dc 5e 99 a4 56 96 75 53 e0 d3 4e ba e4 88 14 ee (3): 88 10 f1 5c 00 2e 11 09 8f fd 26 f7 b6 96 14 9d (3): 8e 96 32 22 6f 26 30 53 01 f4 21 db c2 8a 6f 13 (3): 1d 7a 44 17 ec 4d 0c 38 36 52 2f c6 e1 6e 83 70 (3): 67 63 96 fe a2 d0 47 26 23 ad 96 18 7d 42 0b 14 (3): 26 d7 22 43 2c cf c9 c5 7d 21 60 79 87 79 d3 bc (3): a7 10 7d fa f4 6f d5 46 bb 18 1e e7 a1 75 62 42 (3): c7 c2 df 11 bd 30 e6 80 15 fc df 03 68 c3 14 2d (3): 11 63 cd a7 b2 7d 44 4d 03 8e 93 9d b4 88 44 93 (3): N(3): Next payload: NONE, reserved: 0x0, length: 36 (3): (3): 57 1b 88 08 de 8b 14 b3 2f 74 6c b6 1f cc f5 b9 (3): 3b 03 9a f5 0c a3 67 57 a6 2c 4b 68 85 8a 03 c5 (3): (3): Decrypted packet:(3): Data: 376 bytes IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_RECV_INIT IKEv2-PROTO-7: (3): Processing IKE_SA_INIT message IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK4_NOTIFY IKEv2-PROTO-4: (3): Processing IKE_SA_INIT message IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_VERIFY_MSG IKEv2-PROTO-4: (3): Verify SA init message IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_PROC_MSG IKEv2-PROTO-4: (3): Processing IKE_SA_INIT message IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_DETECT_NAT IKEv2-PROTO-7: (3): Process NAT discovery notify IKEv2-PROTO-7: (3): No NAT found IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_NAT_T IKEv2-PROTO-4: (3): Checking NAT discovery IKEv2-PROTO-4: (3): NAT not found IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_CONFIG_MODE IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_DH_SECRET IKEv2-PROTO-4: (3): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14 IKEv2-PROTO-4: (3): Request queued for computation of DH secret IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_NO_EVENT IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_OK_RECD_DH_SECRET_RESP IKEv2-PROTO-7: (3): Action: Action_Null IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_SKEYID IKEv2-PROTO-7: (3): Generate skeyid IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE IKEv2-PROTO-4: (3): Completed SA init exchange IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GET_CONFIG_MODE IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_EAP IKEv2-PROTO-4: (3): Check for EAP exchange IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GEN_AUTH IKEv2-PROTO-4: (3): Generate my authentication data IKEv2-PROTO-4: (3): Use preshared key for id 192.168.68.2, key len 13 IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_AUTH_TYPE IKEv2-PROTO-4: (3): Get my authentication method IKEv2-PROTO-4: (3): My authentication method is 'PSK' IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_AUTH_GEN IKEv2-PROTO-4: (3): Check for EAP exchange IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SEND_AUTH IKEv2-PROTO-4: (3): Generating IKE_AUTH message IKEv2-PROTO-4: (3): Constructing IDi payload: '192.168.68.2' of type 'IPv4 address' IKEv2-PROTO-4: (3): ESP Proposal: 1, SPI size: 4 (IPSec negotiation), Num. transforms: 3 (3): AES-CBC(3): SHA256(3): Don't use ESNIKEv2-PROTO-4: (3): Building packet for encryption. (3): Payload contents: (3): VID(3): Next payload: IDi, reserved: 0x0, length: 20 (3): (3): 49 a0 45 14 84 1f f4 8f da 11 80 8b 25 f2 69 de (3): IDi(3): Next payload: AUTH, reserved: 0x0, length: 12 (3): Id type: IPv4 address, Reserved: 0x0 0x0 (3): (3): c0 a8 44 02 (3): AUTH(3): Next payload: SA, reserved: 0x0, length: 40 (3): Auth method PSK, reserved: 0x0, reserved 0x0 (3): Auth data: 32 bytes (3): SA(3): Next payload: TSi, reserved: 0x0, length: 44 (3): last proposal: 0x0, reserved: 0x0, length: 40 Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3(3): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (3): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (3): last transform: 0x0, reserved: 0x0: length: 8 type: 5, reserved: 0x0, id: Don't use ESN (3): TSi(3): Next payload: TSr, reserved: 0x0, length: 24 (3): Num of TSs: 1, reserved 0x0, reserved 0x0 (3): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (3): start port: 0, end port: 65535 (3): start addr: 172.16.3.84, end addr: 172.16.3.84 (3): TSr(3): Next payload: NOTIFY, reserved: 0x0, length: 24 (3): Num of TSs: 1, reserved 0x0, reserved 0x0 (3): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (3): start port: 0, end port: 65535 (3): start addr: 10.133.76.129, end addr: 10.133.76.129 (3): NOTIFY(INITIAL_CONTACT)(3): Next payload: NOTIFY, reserved: 0x0, length: 8 (3): Security protocol id: IKE, spi size: 0, type: INITIAL_CONTACT (3): NOTIFY(ESP_TFC_NO_SUPPORT)(3): Next payload: NOTIFY, reserved: 0x0, length: 8 (3): Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT (3): NOTIFY(NON_FIRST_FRAGS)(3): Next payload: NONE, reserved: 0x0, length: 8 (3): Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_ENCRYPT_MSG IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_NO_EVENT IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_OK_ENCRYPT_RESP IKEv2-PROTO-7: (3): Action: Action_Null IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_TRYSEND (3): IKEv2-PROTO-4: (3): Sending Packet [To 198.152.210.156:500/From 192.168.68.2:500/VRF i0:f0] (3): Initiator SPI : 4BA04414972807C8 - Responder SPI : 14C6AE3E220383D7 Message id: 1 (3): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (3): Next payload: ENCR, version: 2.0 (3): Exchange type: IKE_AUTH, flags: INITIATOR (3): Message id: 1, length: 256(3): Payload contents: (3): ENCR(3): Next payload: VID, reserved: 0x0, length: 228 (3): Encrypted data: 224 bytes (3): IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_CHK_EAP_POST_ASYNC IKEv2-PROTO-4: (3): Check for EAP exchange IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT (3): IKEv2-PROTO-4: (3): Received Packet [From 198.152.210.156:500/To 192.168.68.2:500/VRF i0:f0] (3): Initiator SPI : 4BA04414972807C8 - Responder SPI : 14C6AE3E220383D7 Message id: 1 (3): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (3): Next payload: ENCR, version: 2.0 (3): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (3): Message id: 1, length: 80(3): Payload contents: (3): (3): Decrypted packet:(3): Data: 80 bytes (3): REAL Decrypted packet:(3): Data: 8 bytes IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RECV_AUTH IKEv2-PROTO-7: (3): Action: Action_Null IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: I_PROC_AUTH Event: EV_CHK4_NOTIFY IKEv2-PROTO-4: (3): Process auth response notify IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: AUTH_DONE Event: EV_FAIL IKEv2-PROTO-4: (3): Auth exchange failed IKEv2-PROTO-2: (3): Auth exchange failed IKEv2-PROTO-2: (3): Auth exchange failed IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: EXIT Event: EV_ABORT IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: EXIT Event: EV_CHK_PENDING_ABORT IKEv2-PROTO-7: (3): SM Trace-> SA: I_SPI=4BA04414972807C8 R_SPI=14C6AE3E220383D7 (I) MsgID = 00000001 CurState: EXIT Event: EV_UPDATE_CAC_STATS IKEv2-PROTO-4: (3): Abort exchange IKEv2-PROTO-4: (3): Deleting SA IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: IDLE Event: EV_INIT_SA IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_IKE_POLICY IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_SET_POLICY IKEv2-PROTO-7: (265): Setting configured policies IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_CHK_AUTH4PKI IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GEN_DH_KEY IKEv2-PROTO-4: (265): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14 IKEv2-PROTO-4: (265): Request queued for computation of DH key IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_NO_EVENT IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP IKEv2-PROTO-7: (265): Action: Action_Null IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_CONFIG_MODE IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_BLD_MSG IKEv2-PROTO-4: (265): Generating IKE_SA_INIT message IKEv2-PROTO-4: (265): IKE Proposal: 1, SPI size: 0 (initial negotiation), Num. transforms: 4 (265): AES-CBC(265): SHA256(265): SHA256(265): DH_GROUP_2048_MODP/Group 14IKEv2-PROTO-4: (265): IKE Proposal: 2, SPI size: 0 (initial negotiation), Num. transforms: 4 (265): AES-CBC(265): SHA256(265): SHA256(265): DH_GROUP_2048_MODP/Group 14(265): IKEv2-PROTO-4: (265): Sending Packet [To 198.152.210.156:500/From 192.168.68.2:500/VRF i0:f0] (265): Initiator SPI : D5F41CF8F38E7743 - Responder SPI : 0000000000000000 Message id: 0 (265): IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-5: (265): Next payload: SA, version: 2.0 (265): Exchange type: IKE_SA_INIT, flags: INITIATOR (265): Message id: 0, length: 618(265): Payload contents: (265): SA(265): Next payload: KE, reserved: 0x0, length: 92 (265): last proposal: 0x2, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(265): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (265): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (265): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (265): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14 (265): last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 2, Protocol id: IKE, SPI size: 0, #trans: 4(265): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (265): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (265): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (265): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14 (265): KE(265): Next payload: N, reserved: 0x0, length: 264 (265): DH group: 14, Reserved: 0x0 (265): (265): 8c 31 35 46 de b2 e9 11 2a a1 ee de 3e 0e c9 eb (265): d4 f8 28 51 6b 84 a2 8c fe f4 04 aa 35 2d fe 98 (265): 05 14 63 a3 72 0e 96 f2 2c b3 aa 9c 41 91 a1 ad (265): ec af 0a bf f7 00 c6 cd 06 e7 3e 18 68 dd bf 9b (265): 03 33 f8 1d a2 22 90 0f a7 28 68 15 96 c5 ac 5f (265): 60 f0 a2 62 16 1d c1 85 4d 9d 6a 94 0b fb d5 50 (265): f0 90 c7 12 5f 86 d0 6f cf 8b dd a0 8b c3 bf bf (265): c3 ca f1 6d 35 11 c0 95 03 43 55 23 09 f6 d2 eb (265): 48 54 d5 d6 5a 02 1a bd 56 c0 9d 75 79 06 45 e4 (265): 71 84 84 8e fa 98 01 86 01 4b 78 5e 95 b5 72 a6 (265): 86 93 bf 55 17 59 5b fa a4 f2 78 8c 12 7c a2 c4 (265): 41 32 d6 8f 32 6d 8a dd f2 a7 86 b1 3d 9c c8 47 (265): 63 d4 59 5c 16 85 52 50 ba e1 94 1d 89 d8 42 c3 (265): 36 29 a6 eb 19 c9 ff 8d d9 a6 8b 88 a2 ca 62 a2 (265): 25 6c ba 9c 2b 63 61 25 42 1f ca 7b 3e 4c ee 0f (265): 5f 6e f3 5f df e8 21 aa fa 2b 85 84 97 de b5 b3 (265): N(265): Next payload: VID, reserved: 0x0, length: 68 (265): (265): 85 1c a8 f1 00 a8 88 43 08 11 80 66 f9 b7 dd e1 (265): 71 ab 08 54 a9 3b 0f 53 45 18 08 ab 54 b2 08 29 (265): 42 c6 e4 8d a0 79 98 2c 8f 6e 3f b0 25 21 d4 68 (265): e0 96 fb e9 d2 f9 3a 34 4a c6 46 63 da 8e 0c f7 (265): VID(265): Next payload: VID, reserved: 0x0, length: 23 (265): (265): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41 (265): 53 4f 4e (265): VID(265): Next payload: NOTIFY, reserved: 0x0, length: 59 (265): (265): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29 (265): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32 (265): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d (265): 73 2c 20 49 6e 63 2e (265): NOTIFY(NAT_DETECTION_SOURCE_IP)(265): Next payload: NOTIFY, reserved: 0x0, length: 28 (265): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP (265): (265): 9a 60 83 86 bc 96 c9 8f d4 06 74 66 47 28 e7 1d (265): ba b0 71 27 (265): NOTIFY(NAT_DETECTION_DESTINATION_IP)(265): Next payload: NOTIFY, reserved: 0x0, length: 28 (265): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP (265): (265): 4d 57 bd 83 d0 e0 dd 85 ba 7c 47 eb f1 58 e4 50 (265): 30 78 9c 66 (265): NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(265): Next payload: VID, reserved: 0x0, length: 8 (265): Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED (265): VID(265): Next payload: NONE, reserved: 0x0, length: 20 (265): (265): 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 (265): IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_INSERT_SA IKEv2-PROTO-4: (265): Insert SA IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_NO_EVENT (265): IKEv2-PROTO-4: (265): Received Packet [From 198.152.210.156:500/To 192.168.68.2:500/VRF i0:f0] (265): Initiator SPI : D5F41CF8F38E7743 - Responder SPI : 3CBB968AF1DB58AC Message id: 0 (265): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-5: (265): Next payload: SA, version: 2.0 (265): Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (265): Message id: 0, length: 376(265): Payload contents: (265): SA(265): Next payload: KE, reserved: 0x0, length: 48 (265): last proposal: 0x0, reserved: 0x0, length: 44 Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(265): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (265): last transform: 0x3, reserved: 0x0: length: 8 type: 2, reserved: 0x0, id: SHA256 (265): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (265): last transform: 0x0, reserved: 0x0: length: 8 type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14 (265): KE(265): Next payload: N, reserved: 0x0, length: 264 (265): DH group: 14, Reserved: 0x0 (265): (265): 7f 58 50 87 39 4b f6 1d 6e 0b a3 e6 e4 e5 08 ee (265): e3 16 58 ff f6 ed 99 fb 17 ee cc b5 7a b8 c1 0c (265): ad 84 d6 51 74 09 0a a1 af e9 e1 86 36 bd 8a 86 (265): 14 a3 e7 14 6c 0f 7d 55 0a c5 60 ec 20 84 75 53 (265): 08 e8 28 54 c7 43 b7 53 f4 22 04 12 f4 b2 d6 49 (265): e1 74 aa fc b8 ad 6c 04 47 90 26 5a 3f e6 6f 30 (265): 36 c0 d1 a9 c2 26 ba da 0c 41 c8 73 7f af 28 8b (265): b3 bf d0 08 86 42 de 35 f0 74 aa cb 58 18 2b ae (265): 57 12 f2 53 cf 80 fd df 71 b5 9c 32 52 58 d7 b8 (265): 25 d2 fa 00 4b e0 7d 86 ce 74 a6 97 79 2b 7d cb (265): a4 11 17 31 86 a6 62 99 16 6e a0 97 d8 32 c2 9f (265): 10 f9 56 12 19 d5 9a 59 c9 dd a2 85 0c 2b eb 72 (265): cf 08 2d 67 bf b4 7e 77 48 d3 5d 42 37 ca 30 49 (265): 3b 7e 13 61 59 87 36 25 76 09 77 9f b6 df 8f ed (265): 1f 65 b9 84 c0 ee 0a c5 2c b1 9e 35 b7 45 97 f0 (265): 9b 59 d7 0d cc 07 16 e0 2a d1 36 c7 21 47 43 02 (265): N(265): Next payload: NONE, reserved: 0x0, length: 36 (265): (265): 8f a3 93 af 97 27 de 5a 5d 03 03 34 d0 56 7c fd (265): b2 e6 2e 65 59 e1 e2 f6 68 9b 44 20 a3 da 2a 2d (265): (265): Decrypted packet:(265): Data: 376 bytes IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_RECV_INIT IKEv2-PROTO-7: (265): Processing IKE_SA_INIT message IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK4_NOTIFY IKEv2-PROTO-4: (265): Processing IKE_SA_INIT message IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_VERIFY_MSG IKEv2-PROTO-4: (265): Verify SA init message IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_PROC_MSG IKEv2-PROTO-4: (265): Processing IKE_SA_INIT message IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_DETECT_NAT IKEv2-PROTO-7: (265): Process NAT discovery notify IKEv2-PROTO-7: (265): No NAT found IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_NAT_T IKEv2-PROTO-4: (265): Checking NAT discovery IKEv2-PROTO-4: (265): NAT not found IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_CONFIG_MODE IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_DH_SECRET IKEv2-PROTO-4: (265): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14 IKEv2-PROTO-4: (265): Request queued for computation of DH secret IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_NO_EVENT IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_OK_RECD_DH_SECRET_RESP IKEv2-PROTO-7: (265): Action: Action_Null IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_SKEYID IKEv2-PROTO-7: (265): Generate skeyid IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE IKEv2-PROTO-4: (265): Completed SA init exchange IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GET_CONFIG_MODE IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_EAP IKEv2-PROTO-4: (265): Check for EAP exchange IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GEN_AUTH IKEv2-PROTO-4: (265): Generate my authentication data IKEv2-PROTO-4: (265): Use preshared key for id 192.168.68.2, key len 13 IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_AUTH_TYPE IKEv2-PROTO-4: (265): Get my authentication method IKEv2-PROTO-4: (265): My authentication method is 'PSK' IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_AUTH_GEN IKEv2-PROTO-4: (265): Check for EAP exchange IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SEND_AUTH IKEv2-PROTO-4: (265): Generating IKE_AUTH message IKEv2-PROTO-4: (265): Constructing IDi payload: '192.168.68.2' of type 'IPv4 address' IKEv2-PROTO-4: (265): ESP Proposal: 1, SPI size: 4 (IPSec negotiation), Num. transforms: 3 (265): AES-CBC(265): SHA256(265): Don't use ESNIKEv2-PROTO-4: (265): Building packet for encryption. (265): Payload contents: (265): VID(265): Next payload: IDi, reserved: 0x0, length: 20 (265): (265): d7 f4 1d f8 e0 b9 84 04 a4 a1 5d 4e 38 03 63 3c (265): IDi(265): Next payload: AUTH, reserved: 0x0, length: 12 (265): Id type: IPv4 address, Reserved: 0x0 0x0 (265): (265): c0 a8 44 02 (265): AUTH(265): Next payload: SA, reserved: 0x0, length: 40 (265): Auth method PSK, reserved: 0x0, reserved 0x0 (265): Auth data: 32 bytes (265): SA(265): Next payload: TSi, reserved: 0x0, length: 44 (265): last proposal: 0x0, reserved: 0x0, length: 40 Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3(265): last transform: 0x3, reserved: 0x0: length: 12 type: 1, reserved: 0x0, id: AES-CBC (265): last transform: 0x3, reserved: 0x0: length: 8 type: 3, reserved: 0x0, id: SHA256 (265): last transform: 0x0, reserved: 0x0: length: 8 type: 5, reserved: 0x0, id: Don't use ESN (265): TSi(265): Next payload: TSr, reserved: 0x0, length: 24 (265): Num of TSs: 1, reserved 0x0, reserved 0x0 (265): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (265): start port: 0, end port: 65535 (265): start addr: 172.16.3.84, end addr: 172.16.3.84 (265): TSr(265): Next payload: NOTIFY, reserved: 0x0, length: 24 (265): Num of TSs: 1, reserved 0x0, reserved 0x0 (265): TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16 (265): start port: 0, end port: 65535 (265): start addr: 10.133.76.129, end addr: 10.133.76.129 (265): NOTIFY(INITIAL_CONTACT)(265): Next payload: NOTIFY, reserved: 0x0, length: 8 (265): Security protocol id: IKE, spi size: 0, type: INITIAL_CONTACT (265): NOTIFY(ESP_TFC_NO_SUPPORT)(265): Next payload: NOTIFY, reserved: 0x0, length: 8 (265): Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT (265): NOTIFY(NON_FIRST_FRAGS)(265): Next payload: NONE, reserved: 0x0, length: 8 (265): Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_ENCRYPT_MSG IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_NO_EVENT IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_OK_ENCRYPT_RESP IKEv2-PROTO-7: (265): Action: Action_Null IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_TRYSEND (265): IKEv2-PROTO-4: (265): Sending Packet [To 198.152.210.156:500/From 192.168.68.2:500/VRF i0:f0] (265): Initiator SPI : D5F41CF8F38E7743 - Responder SPI : 3CBB968AF1DB58AC Message id: 1 (265): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (265): Next payload: ENCR, version: 2.0 (265): Exchange type: IKE_AUTH, flags: INITIATOR (265): Message id: 1, length: 256(265): Payload contents: (265): ENCR(265): Next payload: VID, reserved: 0x0, length: 228 (265): Encrypted data: 224 bytes (265): IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_BLD_AUTH Event: EV_CHK_EAP_POST_ASYNC IKEv2-PROTO-4: (265): Check for EAP exchange IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT (265): IKEv2-PROTO-4: (265): Received Packet [From 198.152.210.156:500/To 192.168.68.2:500/VRF i0:f0] (265): Initiator SPI : D5F41CF8F38E7743 - Responder SPI : 3CBB968AF1DB58AC Message id: 1 (265): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (265): Next payload: ENCR, version: 2.0 (265): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (265): Message id: 1, length: 80(265): Payload contents: (265): (265): Decrypted packet:(265): Data: 80 bytes (265): REAL Decrypted packet:(265): Data: 8 bytes IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RECV_AUTH IKEv2-PROTO-7: (265): Action: Action_Null IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: I_PROC_AUTH Event: EV_CHK4_NOTIFY IKEv2-PROTO-4: (265): Process auth response notify IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: AUTH_DONE Event: EV_FAIL IKEv2-PROTO-4: (265): Auth exchange failed IKEv2-PROTO-2: (265): Auth exchange failed IKEv2-PROTO-2: (265): Auth exchange failed IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: EXIT Event: EV_ABORT IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: EXIT Event: EV_CHK_PENDING_ABORT IKEv2-PROTO-7: (265): SM Trace-> SA: I_SPI=D5F41CF8F38E7743 R_SPI=3CBB968AF1DB58AC (I) MsgID = 00000001 CurState: EXIT Event: EV_UPDATE_CAC_STATS IKEv2-PROTO-4: (265): Abort exchange IKEv2-PROTO-4: (265): Deleting SA