cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2517
Views
0
Helpful
2
Replies

Problems maintaining IKEv2 L2L SA (1 min) over NAT-T on ASAv10 in AWS

scott.sybert
Level 1
Level 1

Hello Everyone,

I have installed an ASAv instance in AWS and am trying to bring up an IKEv2 L2L using certificate authentication.  Phase I and II pass and the SA gets built up.  I get traffic to pass but only briefly, exactly 1 min... Then it dies.  I found the below in my debug logs:

IKEv2-PROTO-7: (204): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (204): SM Trace-> SA: I_SPI=EB2EC3A1CD65A93E R_SPI=FC14454A18660ED9 (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (204): Retransmitting packet
IKEv2-PROTO-2: (204): A supplied parameter is incorrect
IKEv2-PROTO-2: (204): A supplied parameter is incorrect
IKEv2-PROTO-7: (204): SM Trace-> SA: I_SPI=EB2EC3A1CD65A93E R_SPI=FC14454A18660ED9 (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (204): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission

 

There are a lot of retransmissions but what is particularly suspect is the first line "expected 3".  What is this?  Is this a sequence number or a message type?  I'm running debug level 255 and I'm not getting much for answers out of any IKEv2 debug types.  Any other suggestions or places to look?

 

For reference, AWS assigns my server (ASAv) a private IP and statically NATs me to a public.  This works great for SSH and ASDM.  IKEv2 just will not stay al

2 Replies 2

NAT-T is something IKEv2 does natively. Can you clear the tunnels and share
the debugs to see what gets negotiated.

Hi Mohammed,

 

Below is my debug level 255 just after I cleared the tunnel.  You'll see it renegotiate and eventually die and restart.  I put some blank space in around 2/3 down with a comment line in the middle to indicate the re-attempt.

 

Thank you for your help!

Scott

 

IKEv2-PROTO-4: Received Packet [From 10.10.10.100:500/To 172.31.128.100:500/VRF i0:f0]
Initiator SPI : 8C8B88698D0767CD - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-5: Next payload: SA, version: 2.0 Exchange type: IKE_SA_INIT, flags: INITIATOR Message id: 0, length: 464
Payload contents:
 SA  Next payload: KE, reserved: 0x0, length: 48
  last proposal: 0x0, reserved: 0x0, length: 44
  Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4    last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
    last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
    last transform: 0x3, reserved: 0x0: length: 8
    type: 2, reserved: 0x0, id: SHA1
    last transform: 0x0, reserved: 0x0: length: 8
    type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
 KE  Next payload: N, reserved: 0x0, length: 264
    DH group: 14, Reserved: 0x0

     91 5b b3 5c 3e 65 e6 2c 3d 5c 0c 2f cd e5 c1 17
     5f 86 d6 80 85 de 23 51 54 fa 59 af 5b 9d 08 bc
     43 10 f1 d0 7a 83 a0 ad f3 1a f3 d0 f8 cb a6 1b
     e4 b4 43 0d 24 48 f1 39 30 9b 31 0c 05 b2 ec 7e
     cd 16 4c 4a a3 e5 05 2c bf 9e ab 30 60 0b a0 2a
     20 dc ee 20 32 87 23 ed cb 6e 85 b7 82 43 a7 ab
     92 17 80 e3 d9 bb a0 f5 47 fa 2f 39 dc db b3 10
     ee d5 22 22 e8 e3 9e 78 66 4f d4 7c b6 f2 e5 42
     1b c1 44 91 f5 20 b1 15 3b e4 8a f4 89 19 3f 53
     41 99 04 1a 5a 25 b6 f3 c9 6d 54 53 2b c3 93 11
     cd 86 c0 db ff 00 07 ea 2f 60 fd d0 ff f9 99 b0
     2e ae 3f 8f 4b e0 3a 20 3c e2 a1 32 87 2c ff 5f
     47 e9 95 c5 06 2e fa 27 a3 76 f1 fc 7e a8 7a e0
     37 f0 b2 d1 3b 83 65 65 d7 8e 53 09 96 fe 79 a2
     34 81 0e 0c f0 04 0b 6f a6 b7 a3 60 89 17 32 8c
     ad 0f 6e af 5f 6b bc 37 39 8c d8 03 db 9f cc 0c
 N  Next payload: NOTIFY, reserved: 0x0, length: 36

     2a bc 71 43 fe 22 30 c0 c0 ba 16 a2 b8 88 21 eb
     02 5a a3 7d 37 7a 3f 7b f8 82 22 02 5e 84 7a fa
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP)  Next payload: NOTIFY, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_SOURCE_IP

     66 a3 c2 38 2b b2 cd b2 17 5b 32 12 df 7d 1c 97
     3c 8a bf 2d
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP)  Next payload: NOTIFY, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_DESTINATION_IP

     95 c8 f0 d9 25 7e 53 40 c7 e0 ae d4 b5 18 5b fc
     50 82 d1 c5
IKEv2-PROTO-7: Parse Notify Payload: IKEV2_FRAGMENTATION_SUPPORTED NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)  Next payload: NOTIFY, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
IKEv2-PROTO-7: Parse Notify Payload: Unknown - 16431 NOTIFY(Unknown - 16431)  Next payload: NOTIFY, reserved: 0x0, length: 16
    Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0

     00 02 00 03 00 04 00 05
IKEv2-PROTO-7: Parse Notify Payload: REDIRECT_SUPPORTED NOTIFY(REDIRECT_SUPPORTED)  Next payload: NONE, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: REDIRECT_SUPPORTED
 
Decrypted packet:Data: 464 bytes
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: IDLE Event: EV_RECV_INIT
IKEv2-PROTO-4: (158): Checking NAT discovery
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_REDIRECT
IKEv2-PROTO-7: (158): Redirect check is not needed, skipping it
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_CAC
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_COOKIE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK4_COOKIE_NOTIFY
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_INIT Event: EV_VERIFY_MSG
IKEv2-PROTO-4: (158): Verify SA init message
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_INIT Event: EV_INSERT_SA
IKEv2-PROTO-4: (158): Insert SA
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_INIT Event: EV_GET_IKE_POLICY
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_INIT Event: EV_PROC_MSG
IKEv2-PROTO-4: (158): Processing IKE_SA_INIT message
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_INIT Event: EV_DETECT_NAT
IKEv2-PROTO-7: (158): Process NAT discovery notify
IKEv2-PROTO-7: (158): Processing nat detect src notify
IKEv2-PROTO-7: (158): Remote address not matched
IKEv2-PROTO-7: (158): Processing nat detect dst notify
IKEv2-PROTO-7: (158): Local address not matched
IKEv2-PROTO-7: (158): Host is located NAT inside
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_INIT Event: EV_CHK_CONFIG_MODE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_SET_POLICY
IKEv2-PROTO-7: (158): Setting configured policies
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN
IKEv2-PROTO-7: (158): Opening a PKI session
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY
IKEv2-PROTO-4: (158): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14
IKEv2-PROTO-4: (158): Request queued for computation of DH key
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET
IKEv2-PROTO-4: (158): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14
IKEv2-PROTO-4: (158): Request queued for computation of DH secret
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_SKEYID
IKEv2-PROTO-7: (158): Generate skeyid
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_BLD_MSG
IKEv2-PROTO-4: (158): Generating IKE_SA_INIT message
IKEv2-PROTO-4: (158): IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
(158):    AES-CBC(158):    SHA1(158):    SHA96(158):    DH_GROUP_2048_MODP/Group 14IKEv2-PROTO-7: Construct Vendor Specific Payload: DELETE-REASONIKEv2-PROTO-7: Construct Vendor Specific Payload: (CUSTOM)IKEv2-PROTO-7: Construct Notify Payload: NAT_DETECTION_SOURCE_IPIKEv2-PROTO-7: Construct Notify Payload: NAT_DETECTION_DESTINATION_IPIKEv2-PROTO-7: Construct Notify Payload: IKEV2_FRAGMENTATION_SUPPORTEDIKEv2-PROTO-7: Construct Vendor Specific Payload: FRAGMENTATION(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:500/From 172.31.128.100:500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 0
(158): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SA, version: 2.0 (158): Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (158): Message id: 0, length: 639(158): 
Payload contents:
(158):  SA(158):   Next payload: KE, reserved: 0x0, length: 48
(158):   last proposal: 0x0, reserved: 0x0, length: 44
  Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(158):     last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
(158):     last transform: 0x3, reserved: 0x0: length: 8
    type: 2, reserved: 0x0, id: SHA1
(158):     last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
(158):     last transform: 0x0, reserved: 0x0: length: 8
    type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
(158):  KE(158):   Next payload: N, reserved: 0x0, length: 264
(158):     DH group: 14, Reserved: 0x0
(158):
(158):      a5 92 2c 44 d1 5c 2e 8e e6 93 de 86 f2 89 97 4b
(158):      ec 4c aa dd 68 c3 9c 69 ef ff 73 cd 59 db 90 0d
(158):      1c fe 53 c0 2d 85 75 d6 72 2a 86 76 75 d4 fc 43
(158):      6f f0 08 05 41 45 92 dc b3 b7 96 84 ac 08 ef 52
(158):      4e df 02 9b c9 f4 e9 c1 1c 4b d9 a7 fd f8 43 f3
(158):      3f 36 5e 1b c7 cb 9b 53 ba 83 d4 3d 56 28 24 17
(158):      b8 9c 30 b2 88 33 c4 45 76 d2 e7 a5 dd 9b 4a 61
(158):      b4 2b f2 91 a9 0a ab 14 3e 48 17 39 bf d6 66 d1
(158):      26 6f 82 d0 23 f4 62 8a f6 84 89 da eb b6 5d 77
(158):      a1 46 ef f1 06 2d 8a 1f 1a 95 c4 87 42 95 a8 d8
(158):      3e 0b ce 1e 51 2b 2d 03 25 6f 9f c3 b1 ac 92 22
(158):      f0 5b b9 de 3f a1 21 ca e0 95 ed f9 97 2d 62 b3
(158):      50 58 c6 b8 54 e1 15 55 56 f2 35 1e 85 d1 e1 01
(158):      07 50 fc fc 20 4b 9a 24 a5 81 b8 4f c4 f1 af b6
(158):      e7 28 b6 a8 24 85 5e 1f 2d e0 fb 25 7b c1 03 dc
(158):      32 2b 2d cc 0a ae e6 43 dd 19 42 70 e0 49 c1 99
(158):  N(158):   Next payload: VID, reserved: 0x0, length: 68
(158):
(158):      e9 4b 1b 41 4b fc 5b 1e 36 e5 a1 2d 01 8a 86 98
(158):      52 a6 9e 61 1d 2e 2a de f3 5b aa 70 34 9a a8 40
(158):      82 a2 a9 e3 58 9d c5 d3 5b 0e b5 fd df e6 8c 1f
(158):      d9 3b c9 03 81 6f 46 39 64 f9 45 29 39 01 f7 f2
(158):  VID(158):   Next payload: VID, reserved: 0x0, length: 23
(158):
(158):      43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
(158):      53 4f 4e
(158):  VID(158):   Next payload: NOTIFY, reserved: 0x0, length: 59
(158):
(158):      43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29
(158):      26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32
(158):      30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d
(158):      73 2c 20 49 6e 63 2e
(158):  NOTIFY(NAT_DETECTION_SOURCE_IP)(158):   Next payload: NOTIFY, reserved: 0x0, length: 28
(158):     Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
(158):
(158):      ee e6 a1 8f 16 c9 0d 4c 93 53 15 db 07 ed 45 f3
(158):      d4 e6 3e c2
(158):  NOTIFY(NAT_DETECTION_DESTINATION_IP)(158):   Next payload: CERTREQ, reserved: 0x0, length: 28
(158):     Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
(158):
(158):      b3 98 1c ad 8f 41 51 b1 e2 da b7 f1 16 35 1e 67
(158):      af 25 47 00
(158):  CERTREQ(158):   Next payload: NOTIFY, reserved: 0x0, length: 65
(158):     Cert encoding X.509 Certificate - signature
(158): CertReq data: 60 bytes
(158):  NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(158):   Next payload: VID, reserved: 0x0, length: 8
(158):     Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
(158):  VID(158):   Next payload: NONE, reserved: 0x0, length: 20
(158):
(158):      40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
(158): 
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
IKEv2-PROTO-4: (158): IETF Fragmentation is enabled
IKEv2-PROTO-4: (158): Completed SA init exchange
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
IKEv2-PROTO-4: (158): Starting timer (30 sec) to wait for auth message
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): Request has mess_id 1; expected 1 through 1

(158): 
IKEv2-PROTO-4: (158): Received Packet [From 10.10.10.100:4500/To 172.31.128.100:500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: INITIATOR (158): Message id: 1, length: 1248(158): 
Payload contents:
IKEv2-PROTO-4: decrypt queued(158): 
(158): Decrypted packet:(158): Data: 1248 bytes
SKF Fragment number: 1 OF Total Fragments: 2
     25 00 00 20 02 00 00 00 30 30 30 35 42 39 35 31
     41 44 30 34 2e 61 69 72 76 61 6e 61 2e 63 6f 6d
     26 00 04 b9 04 30 82 04 b0 30 82 03 98 a0 03 02
     01 02 02 02 00 95 30 0d 06 09 2a 86 48 86 f7 0d
     01 01 0b 05 00 30 81 83 31 0b 30 09 06 03 55 04
     06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c
     41 69 72 76 61 6e 61 20 4c 4c 43 2e 31 34 30 32
     06 03 55 04 0b 13 2b 41 69 72 76 61 6e 61 20 4f
     6e 65 43 65 6c 6c 20 43 6f 70 79 72 69 67 68 74
     20 32 30 31 35 20 41 69 72 76 61 6e 61 20 4c 4c
     43 2e 31 27 30 25 06 03 55 04 03 13 1e 41 69 72
     76 61 6e 61 20 4f 6e 65 43 65 6c 6c 20 52 6f 6f
     74 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 31
     38 31 30 32 34 31 38 35 35 31 39 5a 17 0d 32 38
     31 30 32 31 31 38 35 35 31 39 5a 30 72 31 0b 30
     09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03
     55 04 0a 13 0d 41 69 72 76 61 6e 61 2c 20 4c 4c
     43 2e 31 34 30 32 06 03 55 04 0b 13 2b 41 69 72
     76 61 6e 61 20 4f 6e 65 43 65 6c 6c 2c 43 6f 70
     79 72 69 67 68 74 20 32 30 31 35 20 41 69 72 76
     61 6e 61 2c 4c 4c 43 2e 31 15 30 13 06 03 55 04
     03 13 0c 30 30 30 35 42 39 35 31 41 44 30 34 30
     82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
     05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00
     cc 67 0c ca 02 a1 09 2a 80 32 7c a1 cf 40 93 8e
     45 6b be 27 9b bf 08 a4 1b 76 c2 3c 2d 51 16 b5
     34 9b 28 e9 e8 8e aa 8f f4 c5 04 63 fa 4f 03 5c
     68 b0 4e 40 65 a2 fb 2e 45 74 fd b9 7d 60 cd 9b
     ab f2 aa 37 eb c4 7d a5 6b d1 55 7b 8b 4d 9c d1
     d5 f9 23 d1 47 0f e2 97 1e 41 78 37 84 d0 6c 4e
     8b 09 b5 58 1e da d2 8b 4f 32 58 a3 c1 a6 7d 27
     66 e7 e8 86 4a 6e e7 d7 70 1f a7 4d 22 26 3d d7
     00 c9 49 68 4e b3 46 af f7 30 82 da 58 25 02 a1
     06 49 08 2b fa 25 a2 5b d2 06 2a 09 31 1f 3b 60
     9e 91 e4 3c b2 e5 ed 37 d8 27 24 39 0b 7e c4 9c
     80 fa f6 b8 f5 dc b3 bb 48 63 7e 8b 2e 4c db 8c
     62 91 77 53 54 9b 8b 92 66 91 7a 6e cf c0 24 e5
     7d 75 4a e1 2d 50 16 fb e9 2b e9 2c 2c dd 66 d2
     2b e2 65 d5 0f ef de 00 17 dd 82 f0 6c 2e 10 c2
     99 ee 3d 57 6f 21 a9 94 72 9e 30 ce 6e 90 bc f1
     02 03 01 00 01 a3 82 01 3c 30 82 01 38 30 09 06
     03 55 1d 13 04 02 30 00 30 2c 06 09 60 86 48 01
     86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 53 4c
     20 47 65 6e 65 72 61 74 65 64 20 43 65 72 74 69
     66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 16 04
     14 3b 08 81 5f bd 05 be 14 26 39 01 89 be 54 fd
     3c c4 cf 4e 0b 30 81 b8 06 03 55 1d 23 04 81 b0
     30 81 ad 80 14 7b ef ce fa bb e1 f5 84 0b 83 98
     31 8a 19 18 14 27 db 75 5f a1 81 89 a4 81 86 30
     81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31
     15 30 13 06 03 55 04 0a 13 0c 41 69 72 76 61 6e
     61 20 4c 4c 43 2e 31 34 30 32 06 03 55 04 0b 13
     2b 41 69 72 76 61 6e 61 20 4f 6e 65 43 65 6c 6c
     20 43 6f 70 79 72 69 67 68 74 20 32 30 31 35 20
     41 69 72 76 61 6e 61 20 4c 4c 43 2e 31 27 30 25
     06 03 55 04 03 13 1e 41 69 72 76 61 6e 61 20 4f
     6e 65 43 65 6c 6c 20 52 6f 6f 74 20 41 75 74 68
     6f 72 69 74 79 82 09 00 c3 9e 5e ee e3 45 70 96
     30 23 06 03 55 1d 11 04 1c 30 1a 82 18 30 30 30
     35 42 39 35 31 41 44 30 34 2e 61 69 72 76 61 6e
     61 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01
     01 0b 05 00 03 82 01 01 00 0f 2e 98 41 18 18 d9
     40 08 92 cb fc d5 bf 20 42 27 cf 42 60 f8 ac 6a
     89 7e 45 86 f6 24 a1 a7 3e 63 14 3a d0 52 44 ca
     12 65 59 d8 62 50 dd 62 39 33 ce de b6 c0 f5 95
     74 22 5c a2 73 01 60 17 ca 9b 50 03 86 ac c8 88
     3c ce d2 3a 0a d4 63 b8 0a 23 3f b4 a3 4b 9c 3c
     5f d3 fd 02 bc fd 8f e2 04 bd cd bd 07 b7 65 24
     10 62 27 86 be fe 6d 27 8e 2c 0d cb fc 31 9f 5b
     76 e6 2e 72 a8 48 94 53 b7 74 8a 4c 8b 47 5d 79
     5a ef 04 99 ae 61 ab e1 46 c8 48 98 fb 0b 7c 48
     70 32 d5 fb 2e 48 a1 41 53 a2 30 32 c2 63 6e 8a
     da dd f9 fe 35 33 a3 ad 85 c4 78 21 44 5b 3b 75
     6c 7b 73 1d 7d fc 43 05 f6 87 30 73 de 4d c7
IKEv2-PROTO-7: (158): Request has mess_id 1; expected 1 through 1

(158): 
IKEv2-PROTO-4: (158): Received Packet [From 10.10.10.100:4500/To 172.31.128.100:500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: INITIATOR (158): Message id: 1, length: 688(158): 
Payload contents:
IKEv2-PROTO-4: decrypt queued(158): 
(158): Decrypted packet:(158): Data: 688 bytes
SKF Fragment number: 2 OF Total Fragments: 2
     c7 77 e6 89 0e e4 09 97 89 ad ea 43 8c 69 48 b3
     7a 38 ce 09 12 be 1e 99 25 c5 bd 11 17 ba 3c 87
     ad 26 f6 bf 37 9b 53 9c f1 c2 3e 19 58 19 43 a9
     db f4 6f b1 f9 40 fc 7c 4d b5 27 00 00 19 04 c3
     53 df f1 fc e7 34 78 2b 69 cc 15 cc 45 5e 3c ce
     a0 f8 9d 21 00 01 08 01 00 00 00 a0 b8 f9 22 f6
     a9 29 2e da 36 df f1 84 57 f5 e2 e2 ea b5 3d d5
     6e 63 0f 4a 4f 53 8f 3e f1 a8 28 de 66 1a ad c2
     cd 80 ef e1 52 d5 64 9a 14 27 31 f1 e2 3f 48 30
     b2 9e 68 df 3c f6 6f 7b ae 93 66 aa 25 fa ad 02
     e4 32 d6 26 d1 82 08 7a ee 1c 62 bb 9f 1e 4c e3
     c8 87 70 15 31 b1 50 b7 e6 b7 ad 65 ad ea a9 cd
     d5 3f 2c 95 a2 68 47 63 ef fa 92 22 85 e8 00 35
     fd 32 c8 cd 8f 42 53 3b de 53 6c 6d 7c 91 8f af
     2f 7e e8 6c df 3a d9 46 bb 68 b6 8e 91 20 c5 03
     37 ea c2 f7 a3 bd f2 a9 fe fb 1f 66 88 cf e1 84
     7f fb 21 eb 01 11 35 f7 97 bb 59 78 e6 28 0b 9a
     e4 9c db 90 92 49 fe 63 a0 98 2c d3 a2 11 a8 93
     1b c8 e9 16 a8 d6 a2 05 96 d8 d3 ba 5e b1 e2 0b
     e3 bf ec 5e f9 a0 47 5d 0c 86 eb ec 13 3d 87 7b
     0b e5 9d 02 e0 ad cb 09 eb e2 08 72 80 0d 02 df
     bd f2 fc de 8b c2 62 45 2b 0f dc 2c 00 00 2c 00
     00 00 28 01 03 04 03 c0 68 98 26 03 00 00 0c 01
     00 00 0c 80 0e 01 00 03 00 00 08 03 00 00 02 00
     00 00 08 05 00 00 00 2d 00 00 30 01 00 00 00 08
     00 00 28 00 00 ff ff fd 40 00 05 b9 51 ad 04 00
     00 00 00 00 00 00 01 fd 40 00 05 b9 51 ad 04 00
     00 00 00 00 00 00 01 29 00 00 30 01 00 00 00 08
     00 00 28 00 00 ff ff 00 00 00 00 00 00 00 00 00
     00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff
     ff ff ff ff ff ff ff 29 00 00 08 00 00 40 0c 29
     00 00 0c 00 00 40 0d c0 a8 06 01 29 00 00 0c 00
     00 40 0d 0a 0a 89 cb 29 00 00 0c 00 00 40 0d 0a
     78 89 64 29 00 00 0c 00 00 40 0d c0 a8 08 01 29
     00 00 0c 00 00 40 0d c0 a8 09 01 29 00 00 18 00
     00 40 0e fd 40 00 05 b9 51 ad 04 00 00 00 00 00
     00 00 01 29 00 00 18 00 00 40 0e 26 05 60 00 15
     1d 8a 98 02 05 b9 ff fe 51 ad 06 29 00 00 08 00
     00 40 21 00 00 00 08 00 00 40 24
IKEv2-PROTO-7: (158): All SKF Fragments received for this Msg, starting Assembly
IKEv2-PROTO-7: SKF Assembled Pkt Payloads:
IKEv2-PROTO-7: Next Payload type : 37, Current Length 32
IKEv2-PROTO-7: Next Payload type : 38, Current Length 1209
IKEv2-PROTO-7: Next Payload type : 39, Current Length 25
IKEv2-PROTO-7: Next Payload type : 33, Current Length 264
IKEv2-PROTO-7: Next Payload type : 44, Current Length 44
IKEv2-PROTO-7: Next Payload type : 45, Current Length 48
IKEv2-PROTO-7: Next Payload type : 41, Current Length 48
IKEv2-PROTO-7: Next Payload type : 41, Current Length 8
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 24
IKEv2-PROTO-7: Next Payload type : 41, Current Length 24
IKEv2-PROTO-7: Next Payload type : 41, Current Length 8
IKEv2-PROTO-7: Next Payload type : 0, Current Length 8
 IDi  Next payload: CERT, reserved: 0x0, length: 32
    Id type: FQDN, Reserved: 0x0 0x0

     30 30 30 35 42 39 35 31 41 44 30 34 2e 61 69 72
     76 61 6e 61 2e 63 6f 6d
 CERT  Next payload: CERTREQ, reserved: 0x0, length: 1209
    Cert encoding X.509 Certificate - signature
Cert data: 1204 bytes
 CERTREQ  Next payload: AUTH, reserved: 0x0, length: 25
    Cert encoding X.509 Certificate - signature
CertReq data: 20 bytes
 AUTH  Next payload: SA, reserved: 0x0, length: 264
    Auth method RSA, reserved: 0x0, reserved 0x0
Auth data: 256 bytes
 SA  Next payload: TSi, reserved: 0x0, length: 44
  last proposal: 0x0, reserved: 0x0, length: 40
  Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3    last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
    last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
    last transform: 0x0, reserved: 0x0: length: 8
    type: 5, reserved: 0x0, id: Don't use ESN
 TSi  Next payload: TSr, reserved: 0x0, length: 48
    Num of TSs: 1, reserved 0x0, reserved 0x0
    TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
    start port: 0, end port: 65535
    start addr: fd40:5:b951:ad04::1, end addr: fd40:5:b951:ad04::1
 TSr  Next payload: NOTIFY, reserved: 0x0, length: 48
    Num of TSs: 1, reserved 0x0, reserved 0x0
    TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
    start port: 0, end port: 65535
    start addr: ::, end addr: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
IKEv2-PROTO-7: Parse Notify Payload: MOBIKE_SUPPORTED NOTIFY(MOBIKE_SUPPORTED)  Next payload: NOTIFY, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: MOBIKE_SUPPORTED
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     c0 a8 06 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     0a 0a 89 cb
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     0a 78 89 64
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     c0 a8 08 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     c0 a8 09 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV6_ADDRESS NOTIFY(ADDITIONAL_IPV6_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 24
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV6_ADDRESS

     fd 40 00 05 b9 51 ad 04 00 00 00 00 00 00 00 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV6_ADDRESS NOTIFY(ADDITIONAL_IPV6_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 24
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV6_ADDRESS

     26 05 60 00 15 1d 8a 98 02 05 b9 ff fe 51 ad 06
IKEv2-PROTO-7: Parse Notify Payload: Unknown - 16417 NOTIFY(Unknown - 16417)  Next payload: NOTIFY, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0
IKEv2-PROTO-7: Parse Notify Payload: Unknown - 16420 NOTIFY(Unknown - 16420)  Next payload: NONE, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0
 
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH
IKEv2-PROTO-4: (158): Stopping timer to wait for auth message
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T
IKEv2-PROTO-4: (158): Checking NAT discovery
IKEv2-PROTO-4: (158): NAT INSIDE found
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHG_NAT_T_PORT
IKEv2-PROTO-4: (158): NAT detected float to init port 4500, resp port 4500
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID
IKEv2-PROTO-7: (158): Received valid parameteres in process id
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID
IKEv2-PROTO-4: (158): Searching policy based on peer's identity '0005B951AD04.airvana.com' of type 'FQDN'
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_SET_POLICY
IKEv2-PROTO-7: (158): Setting configured policies
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID
IKEv2-PROTO-4: (158): Verify peer's policy
IKEv2-PROTO-4: (158): Peer's policy verified
IKEv2-PROTO-7: (158): Matching certificate found
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE
IKEv2-PROTO-4: (158): Get peer's authentication method
IKEv2-PROTO-4: (158): Peer's authentication method is 'RSA'
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_CERT_ENC
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_X509_CERTS
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_OK_RECD_VERIFY_CERT
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_SAVE_PUBKEY
IKEv2-PROTO-4: (158): Save pubkey
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH
IKEv2-PROTO-4: (158): Verify peer's authentication data
IKEv2-PROTO-4: (158): Verification of peer's authenctication data PASSED
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC
IKEv2-PROTO-4: (158): Processing INITIAL_CONTACT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT
IKEv2-PROTO-4: (158): Redirect check with platform for load-balancing
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NOTIFY_AUTH_DONE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_CONFIG_MODE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_PROC_SA_TS
IKEv2-PROTO-4: (158): Processing IKE_AUTH message
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_OK_RECD_IPSEC_RESP
IKEv2-PROTO-4: (158): Processing IKE_AUTH message
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_MY_AUTH_METHOD
IKEv2-PROTO-4: (158): Get my authentication method
IKEv2-PROTO-4: (158): My authentication method is 'RSA'
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GEN_AUTH
IKEv2-PROTO-4: (158): Generate my authentication data
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK4_SIGN
IKEv2-PROTO-4: (158): Get my authentication method
IKEv2-PROTO-4: (158): My authentication method is 'RSA'
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SIGN
IKEv2-PROTO-4: (158): Sign authentication data
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_AUTH_GEN
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SEND_AUTH
IKEv2-PROTO-4: (158): Generating IKE_AUTH message
IKEv2-PROTO-7: Construct Vendor Specific Payload: CISCO-GRANITEIKEv2-PROTO-4: (158): Constructing IDr payload: 'cn=ciscoasa' of type 'DER ASN1 DN'
IKEv2-PROTO-4: (158): ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
(158):    AES-CBC(158):    SHA96(158):    Don't use ESNIKEv2-PROTO-7: Construct Notify Payload: ESP_TFC_NO_SUPPORTIKEv2-PROTO-7: Construct Notify Payload: NON_FIRST_FRAGSIKEv2-PROTO-7: Construct Notify Payload: MOBIKE_SUPPORTEDIKEv2-PROTO-4: (158): Building packet for encryption.
(158): 
Payload contents:
(158):  VID(158):   Next payload: IDr, reserved: 0x0, length: 20
(158):
(158):      2f fa ea 67 9b 7d d0 7a fd 27 6f 80 79 c7 08 aa
(158):  IDr(158):   Next payload: CERT, reserved: 0x0, length: 29
(158):     Id type: DER ASN1 DN, Reserved: 0x0 0x0
(158):
(158):      30 13 31 11 30 0f 06 03 55 04 03 13 08 63 69 73
(158):      63 6f 61 73 61
(158):  CERT(158):   Next payload: CERT, reserved: 0x0, length: 1170
(158):     Cert encoding X.509 Certificate - signature
(158): Cert data: 1165 bytes
(158):  CERT(158):   Next payload: AUTH, reserved: 0x0, length: 1137
(158):     Cert encoding X.509 Certificate - signature
(158): Cert data: 1132 bytes
(158):  AUTH(158):   Next payload: SA, reserved: 0x0, length: 264
(158):     Auth method RSA, reserved: 0x0, reserved 0x0
(158): Auth data: 256 bytes
(158):  SA(158):   Next payload: TSi, reserved: 0x0, length: 44
(158):   last proposal: 0x0, reserved: 0x0, length: 40
  Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3(158):     last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
(158):     last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
(158):     last transform: 0x0, reserved: 0x0: length: 8
    type: 5, reserved: 0x0, id: Don't use ESN
(158):  TSi(158):   Next payload: TSr, reserved: 0x0, length: 48
(158):     Num of TSs: 1, reserved 0x0, reserved 0x0
(158):     TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
(158):     start port: 0, end port: 65535
(158):     start addr: fd40:5:b951:ad04::1, end addr: fd40:5:b951:ad04::1
(158):  TSr(158):   Next payload: NOTIFY, reserved: 0x0, length: 48
(158):     Num of TSs: 1, reserved 0x0, reserved 0x0
(158):     TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
(158):     start port: 0, end port: 65535
(158):     start addr: 2600:1f16:b92:1404:654:2724:ef17:3f34, end addr: 2600:1f16:b92:1404:654:2724:ef17:3f34
(158):  NOTIFY(ESP_TFC_NO_SUPPORT)(158):   Next payload: NOTIFY, reserved: 0x0, length: 8
(158):     Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT
(158):  NOTIFY(NON_FIRST_FRAGS)(158):   Next payload: NOTIFY, reserved: 0x0, length: 8
(158):     Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS
(158):  NOTIFY(MOBIKE_SUPPORTED)(158):   Next payload: NONE, reserved: 0x0, length: 8
(158):     Security protocol id: Unknown - 0, spi size: 0, type: MOBIKE_SUPPORTED
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_ENCRYPT_MSG
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_NO_EVENT
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 528(158): 
Payload contents:
(158):  SKF(158):   Next payload: VID, reserved: 0x0, length: 500
(158): SKF Fragment number: 1 OF Total Fragments: 7(158):
(158):      a7 6c 5e 2e 89 b8 4b 7b cd e0 75 25 e2 1c a8 1f
(158):      47 41 5c b9 9a 5a 1a aa 7a b8 53 73 f0 8f a5 4b
(158):      f6 ca e5 b3 cf c1 d2 ad 4d 90 42 e5 7e 61 94 5c
(158):      13 2f 12 e3 ac 0c c4 f8 a7 8d f1 3a e4 db db 25
(158):      b0 a0 85 55 3c 08 24 e8 ce 93 89 c6 84 8c 5d 45
(158):      50 a5 09 f4 20 36 49 8c 84 bd 46 98 ac 29 e1 b7
(158):      1a 28 a4 df 12 20 4e a8 1d c1 cc 74 64 7b e4 9e
(158):      05 4a 02 74 ba 52 e9 7d f9 b4 ae 2a 4b ad fb 38
(158):      52 5c 42 d5 a3 26 58 e2 30 b2 1e 83 2f 56 29 3f
(158):      18 85 07 1d 1f 6c 67 67 62 78 ac d9 e9 e8 3e 1a
(158):      cf 7e b7 fc e8 3e b3 a2 cf 42 89 da df 12 50 bc
(158):      54 ab 53 34 3e e5 61 a4 b3 3c c5 54 03 2b d8 f0
(158):      18 1d 40 5b 6a 70 2b a5 1a 76 3b 59 64 11 46 70
(158):      1d ba e1 6d 46 ad 10 bf 72 68 67 ca c5 e5 71 7b
(158):      33 2b 46 16 62 97 26 76 76 4c f6 bf 2b 01 08 d7
(158):      61 52 94 98 ce 2c 5e 79 18 ec 8a 48 34 e5 24 a8
(158):      2c 58 72 b6 fd 62 d7 89 d3 09 3b 13 a9 1e 9b 34
(158):      e1 0d 80 c7 5f d4 ed 28 bc f0 d4 03 73 6f 1c 5b
(158):      4e e6 4f 77 0a d4 96 93 49 eb db 4e 6f 66 a0 a9
(158):      8b b4 11 6e a0 b2 df ef b7 5c 68 3a 6d bb 63 4f
(158):      9c f5 d6 53 de 09 81 76 34 ef bb 9e d5 7e 8b 6f
(158):      78 ae 01 89 14 fa b0 93 d9 cf 8b 1e 2e 88 25 30
(158):      73 62 5d 29 7c 57 8f d0 2a d8 83 7f 15 3b 7b 77
(158):      e6 c4 b5 28 f2 34 18 fd 34 fc c1 4b 61 b7 8f e2
(158):      df a5 89 13 8f 1e 44 32 ff d6 c6 f6 45 10 bd 09
(158):      30 f1 2c 26 7c 15 76 2f d2 7e bd a2 a5 4f c8 94
(158):      d5 0d 61 7a f1 11 44 be e8 ed b7 24 7f 86 a4 fe
(158):      6e e7 13 c9 7b 53 d4 f0 fb cc 3d 35 53 13 93 d1
(158):      80 28 b8 79 36 02 13 f0 24 b7 4d f9 e4 0b f3 54
(158):      42 7b c7 15 46 f1 68 2a f9 4d 25 a9 7f 65 86 7d
(158):      31 96 c6 78 93 b9 5b bd 87 7d 11 66
(158): 
IKEv2-PROTO-7: Added encrypted fragment 1 of (7) to the list
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 528(158): 
Payload contents:
(158):  SKF(158):   Next payload: NONE, reserved: 0x0, length: 500
(158): SKF Fragment number: 2 OF Total Fragments: 7(158):
(158):      42 7b c7 15 46 f1 68 2a f9 4d 25 a9 7f 65 86 7d
(158):      f5 5e db d4 a1 f0 39 b1 d0 cd fa a2 40 a1 47 02
(158):      da c0 a6 9b 04 16 ce 42 04 b1 80 4b 29 4f 02 c1
(158):      cb 4b b8 00 38 3f 0b 69 1e aa f9 24 84 f2 77 fe
(158):      6d d2 6e 16 0c ed 0d 13 03 4c c4 f4 63 48 52 b0
(158):      03 fa 72 a2 98 95 ee 21 fc 11 96 ee 67 fd 30 dc
(158):      49 87 bc af 01 7d 8b b6 23 f1 49 5c 70 da db 12
(158):      61 2a 9a 7f 83 87 75 b7 0e 4b 61 ad f8 64 67 8e
(158):      47 af 70 d1 4e 1e 8f be 49 7e 58 3f b5 c0 72 6e
(158):      f2 d7 fc 16 18 59 4e 08 31 7e 0b 3c 17 62 b0 bc
(158):      ec 73 81 b4 42 a6 4d e9 bd ec 31 eb 9b a3 6e 44
(158):      b5 ba eb 57 16 79 cb ca 8e c8 cc 4d aa d9 71 1c
(158):      a1 40 ae b5 61 35 47 40 d4 10 40 05 d3 cd 60 51
(158):      af 01 8b a7 55 fb 77 6a db 57 82 27 87 b1 71 e1
(158):      9b ac 00 0a 22 36 b3 1f 1f 77 9c a1 ac 33 c6 05
(158):      6c 06 41 60 1b b7 f5 38 09 8d c5 02 e5 61 b4 ed
(158):      4e 2c 04 70 a8 3e 65 19 83 42 be fa 96 d0 25 49
(158):      8e 85 70 7c 79 ca 8a 35 5b fe c0 57 42 fa bd f6
(158):      81 2c fa a7 38 64 30 09 97 ee 15 de ea 82 d0 4d
(158):      64 be 85 40 b2 b5 af 92 14 24 e1 e2 67 fc 3a 34
(158):      fb ba 4d 00 1b 48 26 4d 4b f3 5d 39 96 17 25 7b
(158):      e6 01 01 fb 60 4b 11 26 8c 5e 1f 36 bd 27 41 24
(158):      4a d0 bf b1 4c 3c 67 5f b1 ba 42 13 30 20 8b 0f
(158):      da 32 42 18 dd 06 c0 cc f1 67 c3 12 10 bf 59 60
(158):      c0 a5 b9 2b 12 ef ec c3 d7 d6 2d 29 94 28 c9 1a
(158):      be 48 aa 59 25 ee f1 59 34 22 87 b4 0c 27 19 ff
(158):      74 da c0 0f 86 88 40 f2 23 df d5 a3 15 46 5e e2
(158):      e8 49 b8 39 1b d2 ea 78 78 58 10 81 c4 b9 7f 02
(158):      eb d0 51 d1 42 3c 49 7d d3 91 14 dc 2e 7e 24 c2
(158):      cc 51 0d 49 97 69 05 65 ad 37 56 e0 56 9a 9f e3
(158):      ee a3 7b 3a 37 70 90 38 48 eb c4 9b
(158): 
IKEv2-PROTO-7: Added encrypted fragment 2 of (7) to the list
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 528(158): 
Payload contents:
(158):  SKF(158):   Next payload: NONE, reserved: 0x0, length: 500
(158): SKF Fragment number: 3 OF Total Fragments: 7(158):
(158):      cc 51 0d 49 97 69 05 65 ad 37 56 e0 56 9a 9f e3
(158):      0d 39 57 aa b6 39 a4 89 da 19 cf a8 cd cb 64 0f
(158):      13 1a 44 f6 d0 51 e3 03 f0 c0 13 10 f5 72 ba 7f
(158):      58 0a 1a 9e 8c d3 ff aa b1 57 bb 3c 8f 8b af bc
(158):      6f ea 65 8a e4 7d 95 1b e3 ea af f4 77 bc 8c d4
(158):      0a 26 20 e7 4b d5 58 6c d5 f3 1a 30 1f 4f 85 53
(158):      d3 d5 c4 1b 75 49 62 34 d9 f8 be a7 bf 4a 5b 73
(158):      a1 63 4e b9 59 ba 93 9c 29 d4 a1 25 28 cc 66 0d
(158):      d2 90 23 74 44 ce ae 26 6e cb 4f 3a 08 c5 7a 85
(158):      a2 0d 66 33 2d 28 fe 24 28 af 24 c1 f4 4c 8e 6e
(158):      31 2a 9f a9 73 0d b6 3f f8 ce ef 0c 62 93 1e d3
(158):      2c e9 0e 77 40 85 8b 7c c9 fb fd 60 03 d9 8a b9
(158):      d8 87 4e c8 b3 64 e7 f6 a6 37 6a 18 09 54 f5 3f
(158):      ea 36 67 4a 21 2f b7 68 55 18 34 b1 b2 e1 8a a5
(158):      c7 a9 70 d3 3f f2 a5 67 08 d7 a2 88 a6 2c ff 36
(158):      25 88 a9 f1 60 30 8b b7 0a 30 b2 68 57 33 47 a2
(158):      0d ac 77 8f 86 f6 8f e6 da 5c 13 0f 32 1c 75 f2
(158):      6c e1 05 df c9 e4 39 ad 7c 45 81 a8 52 cf f7 1f
(158):      92 4f b1 42 c4 a4 14 eb db 04 0c 7e c3 09 86 d5
(158):      d4 e0 d3 ab ed 36 2d e6 7c 6e 0a 76 56 c7 d7 c0
(158):      22 e8 4f ab c1 3d da 1d c9 6e 76 61 65 27 81 36
(158):      1d b2 63 2e 4d 6f 2f 13 50 70 2b df 24 27 81 b9
(158):      c8 42 f7 0c 59 3a 5e 29 1d 68 30 a8 11 a5 5e 63
(158):      02 ed eb 96 e9 0f 9a b7 df 0f 90 ca 4f 5b a4 9e
(158):      0e 09 91 7e 0f ac 84 0b 1c 1d c8 09 9a 8d 54 7f
(158):      f0 3e 62 8c 4f a7 af 0a fc b0 9a 1a 12 ae 1d dd
(158):      e9 b8 2d f9 0b 38 35 48 74 53 15 d0 91 a1 2d 3f
(158):      62 50 79 35 36 2a d0 36 a9 6d 10 c2 5c ff 1f 9d
(158):      7f 23 da 9c 4f 4e d6 98 bc 68 40 c3 1a 15 5d 33
(158):      51 77 dd 37 4e 88 f7 e7 17 88 ab 22 c8 28 20 13
(158):      7a 0a af 5e 85 ad fd 7d e2 54 dd c9
(158): 
IKEv2-PROTO-7: Added encrypted fragment 3 of (7) to the list
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 528(158): 
Payload contents:
(158):  SKF(158):   Next payload: NONE, reserved: 0x0, length: 500
(158): SKF Fragment number: 4 OF Total Fragments: 7(158):
(158):      51 77 dd 37 4e 88 f7 e7 17 88 ab 22 c8 28 20 13
(158):      25 a4 16 b2 2a f3 7f 52 de d7 fb 0a 11 ab 9e e0
(158):      4e ad 85 76 ed 00 2c 2e 43 50 d6 d7 84 cc a3 b8
(158):      18 56 34 0c 1c 28 7c 85 07 a7 6c c6 ef 0d 9f a6
(158):      15 91 c6 5b d6 69 b2 b3 6d ad 8c da b5 db a9 02
(158):      97 0f cc f5 d4 2a 39 06 3e fb 12 4a a6 42 98 7d
(158):      63 55 46 9b 53 e9 bd bc bb a9 bc 9d 9b 04 f7 ed
(158):      00 1e 65 b3 4c 46 1b 11 59 e2 1f 7c 26 71 4e 6a
(158):      8b de b7 a6 4b 0f 52 2b a1 e1 26 f8 09 9a 7c 7d
(158):      78 63 54 ad 11 3f 7e 95 e6 02 9a 16 13 9a 05 cb
(158):      e3 e3 7e 77 bb ad 89 5b 81 ec 50 ea a4 32 fe 7e
(158):      a7 e1 80 18 0e 37 1b 6f e8 3b c3 3f cc 69 f3 ed
(158):      76 fc 91 fc 0c 4d df ce e3 f6 32 41 f1 d3 95 a2
(158):      23 23 a8 04 28 43 29 51 2f a4 42 77 63 0a 2b 19
(158):      e8 e6 c6 3f 8a c5 48 b1 11 b1 04 00 9e 60 05 91
(158):      f0 67 70 18 e2 96 1d e5 5b 92 2a a1 14 39 33 78
(158):      29 5c 17 80 0d 8a 68 39 6b 52 14 52 be c0 77 8a
(158):      6f f0 f9 c2 00 e8 1a 62 74 a5 f9 4e 57 23 5f 37
(158):      9e 0b 21 6b 71 f3 eb 18 87 f5 63 b2 a1 ff 5e a9
(158):      f3 0c 6d 2f f1 df f4 12 2c 64 d3 54 00 d9 8c ad
(158):      71 a9 2d b6 47 c4 24 5e 34 da 82 a3 ac a1 1b 48
(158):      41 ea 36 6d 72 8e e9 9b 16 25 25 82 e9 d2 ef d7
(158):      31 4c 88 60 d7 27 5a 6f d8 70 43 5b 5b 3e fe 4d
(158):      5a 6a 5f ff eb dd 79 e0 f6 c6 b4 9a 61 9e 70 7f
(158):      b6 f6 37 b3 4e 27 42 57 b6 3c 30 ec 5d 89 7f 5e
(158):      c2 af d7 66 50 34 a3 80 0f 87 99 5c 19 73 eb 5d
(158):      32 93 6e 38 85 74 e0 66 13 10 c6 23 d5 42 fe c3
(158):      ef 06 21 bc 14 da dd f4 31 06 4a 2f 77 5e 33 68
(158):      46 33 4e 10 85 39 1d 12 5e de 06 26 21 93 7d 7b
(158):      a9 b3 fc 1c 5c cd d1 a7 82 3e ed 37 18 94 95 a6
(158):      93 2b fd 13 c7 cf a7 a7 1c d9 50 55
(158): 
IKEv2-PROTO-7: Added encrypted fragment 4 of (7) to the list
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 528(158): 
Payload contents:
(158):  SKF(158):   Next payload: NONE, reserved: 0x0, length: 500
(158): SKF Fragment number: 5 OF Total Fragments: 7(158):
(158):      a9 b3 fc 1c 5c cd d1 a7 82 3e ed 37 18 94 95 a6
(158):      d0 82 00 03 73 b0 bd 66 36 c9 7b e8 a8 6c 18 38
(158):      15 14 a7 f2 05 d5 81 20 33 9c 1b ee 7d cd a0 2b
(158):      57 ca 78 3e 83 20 51 45 a4 49 f5 03 c7 b5 95 e2
(158):      c0 da d2 a4 13 f2 b5 00 a4 59 55 8e 85 5e 52 65
(158):      92 37 44 18 20 3f 66 e5 e4 29 ba ee ca 86 84 ad
(158):      d1 0b 62 f9 5c a2 45 50 93 1b 3e 46 1b 08 d4 67
(158):      a0 47 37 fa a9 ad 3c 0b ba 18 14 aa 8c c5 d0 23
(158):      fb c4 3c 5e bd b6 c9 04 e5 f4 9c 7a 59 9c 62 2a
(158):      3f 2b 78 67 ee a8 76 c7 86 3c 9e 59 a2 da 5b f4
(158):      65 d0 4f d9 8e db 90 8e 4a ac d4 c0 5c 03 66 dc
(158):      80 9f 5f 72 57 55 6d 4d d2 b1 34 f9 ee 44 65 e2
(158):      08 86 98 9e 6b 00 53 a9 35 b3 e0 ad ba c6 f7 e3
(158):      44 a5 9d 4d eb 21 da 13 0c ee e4 1f db 8c b0 7a
(158):      ea b8 02 98 c3 d0 a1 20 61 b5 75 44 49 55 24 10
(158):      5e 8a 06 d8 37 5a 96 30 02 b5 61 8d 9e ef ce b0
(158):      10 31 ca fb b8 48 0b 3e 3d 37 36 ce b4 a8 b7 62
(158):      ab 17 3e 5e fb 73 4e 22 17 1b 09 fe b8 77 47 04
(158):      ae 9d 46 f1 88 36 30 de cb de 49 71 45 cc 56 72
(158):      81 55 e3 94 fe 38 91 d7 cc 20 a6 12 14 59 fe 9a
(158):      e9 89 6f a4 2b 7d a8 5b 04 f8 8b 1a 0d 0f 29 08
(158):      24 d1 60 e8 12 1a d1 ab 5e b5 b8 47 62 8c ee 39
(158):      8a f4 ff fa a0 da ed 5a 9a 54 bb b6 f4 a6 e4 76
(158):      6f bd 78 e5 20 5c be 63 b8 31 a0 6d ae 8d e0 77
(158):      27 a1 97 e6 86 54 b9 19 41 27 50 93 d3 23 a6 4a
(158):      64 de e2 db 3c bd 53 e0 f5 16 10 79 22 05 76 79
(158):      f4 0d b5 10 81 b3 db 8b 4f 2e 6f c8 d9 cf d0 5f
(158):      c4 c5 90 2b d4 a3 41 2a 74 84 a8 6d 62 27 96 90
(158):      4a ae 9d e2 9c 60 62 f8 06 8d c1 fb 14 17 05 5e
(158):      a1 30 24 1a ba f7 29 86 d1 bd 5f 00 bb 89 03 48
(158):      b9 5e 9a c4 13 91 73 7b 5b c7 ae fb
(158): 
IKEv2-PROTO-7: Added encrypted fragment 5 of (7) to the list
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 528(158): 
Payload contents:
(158):  SKF(158):   Next payload: NONE, reserved: 0x0, length: 500
(158): SKF Fragment number: 6 OF Total Fragments: 7(158):
(158):      a1 30 24 1a ba f7 29 86 d1 bd 5f 00 bb 89 03 48
(158):      32 ca 2b 34 05 ba b4 1a 16 27 13 a3 9b 13 13 6d
(158):      b3 e6 64 e4 d9 ce b8 d7 31 04 59 5b 76 9e 5d a7
(158):      5c b5 5c 6c a4 4a a9 7c e7 0e 3b 47 6e eb c8 de
(158):      78 00 df 59 fe fb 75 d5 bd ec d6 20 98 65 01 7d
(158):      d9 14 4b ea b3 25 1d 0f 84 95 fc 80 f3 1b d4 f8
(158):      c0 e0 41 9c c5 24 a4 7c ae 9a c8 29 a3 e4 3c 62
(158):      b6 15 8e c1 1d e7 5a 77 ee e7 4e eb 44 41 0b 4c
(158):      bc e3 15 bb f9 20 7c da 81 e7 0f 64 21 0f 3d 09
(158):      9a 19 b7 77 13 88 59 96 87 ed 02 2f a5 e6 6e d9
(158):      1c 8c 37 e3 6f ff b8 a8 28 c8 39 82 ad c1 37 37
(158):      49 52 49 ae 36 97 43 ea c9 76 b8 d3 8f b5 86 c8
(158):      07 66 2a eb 03 02 6c 6d 05 c8 fd 07 ed 74 f1 6a
(158):      22 83 8d 64 e9 a9 19 84 26 ec 5d ac 17 9a 0f a1
(158):      d4 56 e4 fe e2 50 49 40 95 5f cb 49 b2 f3 9e a5
(158):      f7 bc e5 2a 23 64 27 4e 9f cd ed 34 61 06 88 e8
(158):      ff 0e 2e 9d 87 17 71 90 ac b6 ca 01 3e ab e6 a3
(158):      3e bf cb 69 ab 74 17 5f 99 27 37 b5 00 1e f1 03
(158):      e5 9c 70 a5 11 f4 22 d6 1e e3 c5 78 0a 2a e6 f3
(158):      6f 1c 03 76 1d cf a1 4f c6 05 86 a2 8a 57 11 fc
(158):      94 9a 23 41 f8 a2 ed 1b 46 21 77 f6 9f f6 40 d1
(158):      de 03 44 9a d3 26 14 04 e8 99 0e 72 6f 60 5d b2
(158):      b7 6d 77 ae d6 27 1a 5b 97 2d 7b 88 36 c9 f6 b6
(158):      b6 46 eb b1 c5 fb 39 02 64 08 00 24 10 c9 33 95
(158):      e6 3e 9e 21 d6 59 22 df 5f 7c 78 d0 98 48 6a 85
(158):      ab 7b 4a b9 f9 4d 79 02 11 9b c7 42 cc cf 08 15
(158):      62 6d d2 53 74 65 01 cd 30 60 19 89 34 38 dd 99
(158):      2b 6a 6a 93 68 39 99 f8 e0 18 e4 8d ae 7f 78 7a
(158):      9f 01 5c 40 4f 31 34 f6 80 76 fb 2a b2 87 03 20
(158):      9b c6 9d 56 97 05 93 f6 df ec 2c 3b 1a a0 2a 27
(158):      16 62 7c 74 92 bb a0 f4 12 4d 5a 45
(158): 
IKEv2-PROTO-7: Added encrypted fragment 6 of (7) to the list
(158): 
IKEv2-PROTO-4: (158): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 1
(158): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (158): Next payload: SKF, version: 2.0 (158): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (158): Message id: 1, length: 144(158): 
Payload contents:
(158):  SKF(158):   Next payload: NONE, reserved: 0x0, length: 116
(158): SKF Fragment number: 7 OF Total Fragments: 7(158):
(158):      9b c6 9d 56 97 05 93 f6 df ec 2c 3b 1a a0 2a 27
(158):      5c 0a 3c ba 3d 6e a3 d7 c7 4f 04 12 fc e0 5e eb
(158):      76 24 f9 53 7e 1e 28 ac 63 d5 ba 58 d2 61 8f 37
(158):      08 20 dd dd 16 39 3c fc 12 66 28 8f 94 a7 45 84
(158):      56 0d 8e 0e dd aa d5 28 1c 61 f3 76 c5 2c 03 9c
(158):      58 a4 bc 01 40 82 d0 1d b2 01 76 81 da 60 ef c5
(158):      0b 54 11 26 49 b6 7a 0a c7 b9 62 5e
(158): 
IKEv2-PROTO-7: Added encrypted fragment 7 of (7) to the list
IKEv2-PROTO-7: (158): All fragments encrypted ready to be sent

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_TRYSEND
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK_AUTH_FAIL
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_UPDATE_CAC_STATS
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_INSERT_IKE
IKEv2-PROTO-4: (158): IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started
IKEv2-PROTO-4: (158): Set NAT keepalive timer 10
IKEv2-PROTO-4: (158): Session with IKE ID PAIR (0005B951AD04.airvana.com, cn=ciscoasa) is UP
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_REGISTER_SESSION
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_RECD_REGISTER_SESSION_RESP
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_GEN_LOAD_IPSEC
IKEv2-PROTO-4: (158): Load IPSEC key material
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK_RECD_LOAD_IPSEC
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_START_ACCT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_PARENT_NEG_COMPLETE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_PKI_SESH_CLOSE
IKEv2-PROTO-7: (158): Closing the PKI session
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHECK_DUPE
IKEv2-PROTO-4: (158): Checking for duplicate IKEv2 SA
IKEv2-PROTO-4: (158): No duplicate IKEv2 SA found
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: READY Event: EV_R_OK
IKEv2-PROTO-4: (158): Starting timer (8 sec) to delete negotiation context
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: READY Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000001 CurState: READY Event: EV_DEL_NEG_TMO
IKEv2-PROTO-7: (158): Deleting negotiation context for peer message ID: 0x1
IKEv2-PROTO-7: Freeing all fragments in OUTBOUND fragment list
IKEv2-PROTO-7: Freeing all fragments in INBOUND fragment list
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 2 through 2

(158): 
IKEv2-PROTO-4: (158): Received Packet [From 10.10.10.100:4500/To 172.31.128.100:4500/VRF i0:f0]
(158): Initiator SPI : 8C8B88698D0767CD - Responder SPI : 2DFAEB67884A233D Message id: 2
(158): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (158): Next payload: ENCR, version: 2.0 (158): Exchange type: INFORMATIONAL, flags: INITIATOR (158): Message id: 2, length: 124(158): 
Payload contents:
IKEv2-PROTO-4: decrypt queued(158): 
(158): Decrypted packet:(158): Data: 124 bytes
(158): REAL Decrypted packet:(158): Data: 56 bytes
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP)  Next payload: NOTIFY, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_SOURCE_IP

     31 40 7a 36 87 72 02 a2 16 bf e8 e5 68 cd c1 6e
     35 ea f8 1a
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP)  Next payload: NONE, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_DESTINATION_IP

     46 48 a4 65 59 10 0a e8 3e 49 9a 15 1f a8 77 dd
     cd 52 ad 8c
 
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (158): Action: Action_Null
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: INFO_R Event: EV_TRYSEND
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (158): Sent response with message id 2, Requests can be accepted from range 3 to 3
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (158): Request has mess_id 2; expected 3 through 3

IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_RE_XMT_RESP
IKEv2-PROTO-4: (158): Retransmitting packet
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-2: (158): A supplied parameter is incorrect
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-4: (158): Packet is a retransmission
IKEv2-PROTO-2: Packet is a retransmission
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500

 


#####################Above is where the SA and IPSec goes away and below restarts######################################

 

 
IKEv2-PROTO-4: Received Packet [From 10.10.10.100:500/To 172.31.128.100:500/VRF i0:f0]
Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-5: Next payload: SA, version: 2.0 Exchange type: IKE_SA_INIT, flags: INITIATOR Message id: 0, length: 464
Payload contents:
 SA  Next payload: KE, reserved: 0x0, length: 48
  last proposal: 0x0, reserved: 0x0, length: 44
  Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4    last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
    last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
    last transform: 0x3, reserved: 0x0: length: 8
    type: 2, reserved: 0x0, id: SHA1
    last transform: 0x0, reserved: 0x0: length: 8
    type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
 KE  Next payload: N, reserved: 0x0, length: 264
    DH group: 14, Reserved: 0x0

     b3 fa 82 47 f0 4b ab d9 f5 12 07 3b 4f e1 27 61
     ba b3 ed 3c f4 9a 2a 2b 35 62 10 e4 97 1c 98 dc
     5e 84 d2 cc cc cc af 15 80 ad 2f 85 29 5d 11 b0
     b2 5d fd e9 b8 99 fc 52 04 bf 71 2a b4 a1 3e d3
     67 fa 8f 7b 3b f3 bf 0a d8 ec 12 ce 5c 22 49 e5
     16 5e b8 37 80 06 38 53 ef 4f e2 30 91 a4 ce 92
     d4 2c c1 ea f8 58 96 8f 64 c7 b3 f3 63 11 93 8f
     0c 0d dc ef 60 8c 24 3f cc 46 de ac c1 2c f5 84
     eb 1c 34 94 9b cf be 4a b6 1c f9 8a 0e fd 2e b2
     7f 30 43 7a a8 8f 14 55 25 cb 19 09 fd 85 55 b9
     4c e6 b5 db e2 f0 97 ea a7 c4 7d 77 e8 d2 35 24
     7b cc bb 4d 73 07 5f 9c 04 8b 6c 16 92 e8 55 94
     b3 d0 f9 45 dc aa af 1c 26 c9 c7 90 8b 7a a4 9b
     0d 89 59 82 fe 81 69 6b fa 56 59 b3 11 55 84 6b
     54 b9 55 a1 8f b7 32 d3 ea cf e7 71 a8 e3 52 ec
     71 d3 04 81 b4 f5 65 80 89 5b 3b 30 16 4e 19 a7
 N  Next payload: NOTIFY, reserved: 0x0, length: 36

     1a a2 7c 9f ee ee 11 ee c4 fd 64 a9 f0 f1 67 ab
     75 90 94 a9 22 c8 40 75 8e a9 4a 0a b1 36 1d 53
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP)  Next payload: NOTIFY, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_SOURCE_IP

     d7 d7 0f 68 28 2a 46 cc a4 1d 83 66 92 fa 0b 96
     84 74 4c 6f
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP)  Next payload: NOTIFY, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_DESTINATION_IP

     0e 66 76 32 fe 23 31 69 40 c6 dd 10 55 75 8d a4
     84 3d 91 44
IKEv2-PROTO-7: Parse Notify Payload: IKEV2_FRAGMENTATION_SUPPORTED NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)  Next payload: NOTIFY, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
IKEv2-PROTO-7: Parse Notify Payload: Unknown - 16431 NOTIFY(Unknown - 16431)  Next payload: NOTIFY, reserved: 0x0, length: 16
    Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0

     00 02 00 03 00 04 00 05
IKEv2-PROTO-7: Parse Notify Payload: REDIRECT_SUPPORTED NOTIFY(REDIRECT_SUPPORTED)  Next payload: NONE, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: REDIRECT_SUPPORTED
 
Decrypted packet:Data: 464 bytes
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: IDLE Event: EV_RECV_INIT
IKEv2-PROTO-4: (322): Checking NAT discovery
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_REDIRECT
IKEv2-PROTO-7: (322): Redirect check is not needed, skipping it
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_CAC
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_COOKIE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK4_COOKIE_NOTIFY
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_INIT Event: EV_VERIFY_MSG
IKEv2-PROTO-4: (322): Verify SA init message
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_INIT Event: EV_INSERT_SA
IKEv2-PROTO-4: (322): Insert SA
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_INIT Event: EV_GET_IKE_POLICY
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_INIT Event: EV_PROC_MSG
IKEv2-PROTO-4: (322): Processing IKE_SA_INIT message
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_INIT Event: EV_DETECT_NAT
IKEv2-PROTO-7: (322): Process NAT discovery notify
IKEv2-PROTO-7: (322): Processing nat detect src notify
IKEv2-PROTO-7: (322): Remote address not matched
IKEv2-PROTO-7: (322): Processing nat detect dst notify
IKEv2-PROTO-7: (322): Local address not matched
IKEv2-PROTO-7: (322): Host is located NAT inside
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_INIT Event: EV_CHK_CONFIG_MODE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_SET_POLICY
IKEv2-PROTO-7: (322): Setting configured policies
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN
IKEv2-PROTO-7: (322): Opening a PKI session
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY
IKEv2-PROTO-4: (322): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14
IKEv2-PROTO-4: (322): Request queued for computation of DH key
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET
IKEv2-PROTO-4: (322): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14
IKEv2-PROTO-4: (322): Request queued for computation of DH secret
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_SKEYID
IKEv2-PROTO-7: (322): Generate skeyid
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_BLD_MSG
IKEv2-PROTO-4: (322): Generating IKE_SA_INIT message
IKEv2-PROTO-4: (322): IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
(322):    AES-CBC(322):    SHA1(322):    SHA96(322):    DH_GROUP_2048_MODP/Group 14IKEv2-PROTO-7: Construct Vendor Specific Payload: DELETE-REASONIKEv2-PROTO-7: Construct Vendor Specific Payload: (CUSTOM)IKEv2-PROTO-7: Construct Notify Payload: NAT_DETECTION_SOURCE_IPIKEv2-PROTO-7: Construct Notify Payload: NAT_DETECTION_DESTINATION_IPIKEv2-PROTO-7: Construct Notify Payload: IKEV2_FRAGMENTATION_SUPPORTEDIKEv2-PROTO-7: Construct Vendor Specific Payload: FRAGMENTATION(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:500/From 172.31.128.100:500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 0
(322): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SA, version: 2.0 (322): Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (322): Message id: 0, length: 639(322): 
Payload contents:
(322):  SA(322):   Next payload: KE, reserved: 0x0, length: 48
(322):   last proposal: 0x0, reserved: 0x0, length: 44
  Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(322):     last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
(322):     last transform: 0x3, reserved: 0x0: length: 8
    type: 2, reserved: 0x0, id: SHA1
(322):     last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
(322):     last transform: 0x0, reserved: 0x0: length: 8
    type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
(322):  KE(322):   Next payload: N, reserved: 0x0, length: 264
(322):     DH group: 14, Reserved: 0x0
(322):
(322):      4a 7a 75 e6 1e 45 5c ab 54 73 e6 aa c4 ef 2e ef
(322):      20 e9 f5 33 87 3b 44 ca 9e 20 6c 38 fe e9 96 ef
(322):      fb 7e 9b e7 3a 02 37 8a c5 84 12 ea ec e1 ca 0e
(322):      55 ce d8 00 ea 4f 66 5a 39 40 55 94 0f 71 54 29
(322):      8d 85 77 c6 9b d0 f2 7b 6c 78 3d 3f 08 91 e6 7b
(322):      35 28 e5 41 1e d7 bb 23 d4 7d 65 78 25 25 9a b4
(322):      b4 d5 43 8f 43 39 9b 2d 0b 17 c1 f9 4f 4f 2f 42
(322):      41 93 5c 89 79 ec c2 b7 14 14 af f3 09 8b 74 f0
(322):      f8 95 e8 ac b6 63 9f c0 5f 6b f4 c5 eb 84 ab df
(322):      18 3b e6 f6 3d db 2b eb 82 e1 9a 9a fb 3e 79 d1
(322):      25 c4 d8 72 1e 02 db 8b c0 7f c4 1c 2b b5 5b cd
(322):      8c 04 f1 cf 73 72 fe 25 01 b6 6e aa be b7 13 f9
(322):      b5 5f 8f 3e a9 b1 f4 26 bc 3f f3 aa 3e 4e 48 b3
(322):      9e c2 56 b5 d1 58 55 7b 8b 74 47 2a 26 95 67 82
(322):      bd 8e 21 88 3a 44 98 b1 ae 09 28 d5 64 ce 9f 47
(322):      53 b3 d8 fc 06 ce 7f 27 de f7 ca 46 bb 55 75 3f
(322):  N(322):   Next payload: VID, reserved: 0x0, length: 68
(322):
(322):      8a 24 f0 66 44 45 05 8d d8 c4 16 69 23 ef 11 9f
(322):      99 38 02 79 59 a0 b1 c5 c3 58 99 f6 ee a8 9d 57
(322):      4a 65 bc 6e 58 19 96 2b c7 c6 fe e3 09 3c 21 b6
(322):      1a 91 fc 8c 6e b1 01 d8 2f 48 f8 75 d4 90 c9 7f
(322):  VID(322):   Next payload: VID, reserved: 0x0, length: 23
(322):
(322):      43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
(322):      53 4f 4e
(322):  VID(322):   Next payload: NOTIFY, reserved: 0x0, length: 59
(322):
(322):      43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29
(322):      26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32
(322):      30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d
(322):      73 2c 20 49 6e 63 2e
(322):  NOTIFY(NAT_DETECTION_SOURCE_IP)(322):   Next payload: NOTIFY, reserved: 0x0, length: 28
(322):     Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
(322):
(322):      ca 4c e3 cb d7 86 ab cc cc ca 51 b1 c4 08 8e 3e
(322):      b9 55 f9 65
(322):  NOTIFY(NAT_DETECTION_DESTINATION_IP)(322):   Next payload: CERTREQ, reserved: 0x0, length: 28
(322):     Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
(322):
(322):      8e 7b 69 9e 12 6f 32 ad e9 d0 1e 7e f0 42 5b ec
(322):      23 42 55 e2
(322):  CERTREQ(322):   Next payload: NOTIFY, reserved: 0x0, length: 65
(322):     Cert encoding X.509 Certificate - signature
(322): CertReq data: 60 bytes
(322):  NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(322):   Next payload: VID, reserved: 0x0, length: 8
(322):     Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
(322):  VID(322):   Next payload: NONE, reserved: 0x0, length: 20
(322):
(322):      40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
(322): 
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
IKEv2-PROTO-4: (322): IETF Fragmentation is enabled
IKEv2-PROTO-4: (322): Completed SA init exchange
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
IKEv2-PROTO-4: (322): Starting timer (30 sec) to wait for auth message
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (322): Request has mess_id 1; expected 1 through 1

(322): 
IKEv2-PROTO-4: (322): Received Packet [From 10.10.10.100:4500/To 172.31.128.100:500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: INITIATOR (322): Message id: 1, length: 1248(322): 
Payload contents:
IKEv2-PROTO-4: decrypt queued(322): 
(322): Decrypted packet:(322): Data: 1248 bytes
IKEv2-PROTO-7: (322): Request has mess_id 1; expected 1 through 1

(322): 
IKEv2-PROTO-4: (322): Received Packet [From 10.10.10.100:4500/To 172.31.128.100:500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: INITIATOR (322): Message id: 1, length: 688(322): 
Payload contents:
IKEv2-PROTO-4: decrypt queued(322): 
(322): Decrypted packet:(322): Data: 688 bytes
SKF Fragment number: 1 OF Total Fragments: 2
     25 00 00 20 02 00 00 00 30 30 30 35 42 39 35 31
     41 44 30 34 2e 61 69 72 76 61 6e 61 2e 63 6f 6d
     26 00 04 b9 04 30 82 04 b0 30 82 03 98 a0 03 02
     01 02 02 02 00 95 30 0d 06 09 2a 86 48 86 f7 0d
     01 01 0b 05 00 30 81 83 31 0b 30 09 06 03 55 04
     06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c
     41 69 72 76 61 6e 61 20 4c 4c 43 2e 31 34 30 32
     06 03 55 04 0b 13 2b 41 69 72 76 61 6e 61 20 4f
     6e 65 43 65 6c 6c 20 43 6f 70 79 72 69 67 68 74
     20 32 30 31 35 20 41 69 72 76 61 6e 61 20 4c 4c
     43 2e 31 27 30 25 06 03 55 04 03 13 1e 41 69 72
     76 61 6e 61 20 4f 6e 65 43 65 6c 6c 20 52 6f 6f
     74 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 31
     38 31 30 32 34 31 38 35 35 31 39 5a 17 0d 32 38
     31 30 32 31 31 38 35 35 31 39 5a 30 72 31 0b 30
     09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03
     55 04 0a 13 0d 41 69 72 76 61 6e 61 2c 20 4c 4c
     43 2e 31 34 30 32 06 03 55 04 0b 13 2b 41 69 72
     76 61 6e 61 20 4f 6e 65 43 65 6c 6c 2c 43 6f 70
     79 72 69 67 68 74 20 32 30 31 35 20 41 69 72 76
     61 6e 61 2c 4c 4c 43 2e 31 15 30 13 06 03 55 04
     03 13 0c 30 30 30 35 42 39 35 31 41 44 30 34 30
     82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
     05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00
     cc 67 0c ca 02 a1 09 2a 80 32 7c a1 cf 40 93 8e
     45 6b be 27 9b bf 08 a4 1b 76 c2 3c 2d 51 16 b5
     34 9b 28 e9 e8 8e aa 8f f4 c5 04 63 fa 4f 03 5c
     68 b0 4e 40 65 a2 fb 2e 45 74 fd b9 7d 60 cd 9b
     ab f2 aa 37 eb c4 7d a5 6b d1 55 7b 8b 4d 9c d1
     d5 f9 23 d1 47 0f e2 97 1e 41 78 37 84 d0 6c 4e
     8b 09 b5 58 1e da d2 8b 4f 32 58 a3 c1 a6 7d 27
     66 e7 e8 86 4a 6e e7 d7 70 1f a7 4d 22 26 3d d7
     00 c9 49 68 4e b3 46 af f7 30 82 da 58 25 02 a1
     06 49 08 2b fa 25 a2 5b d2 06 2a 09 31 1f 3b 60
     9e 91 e4 3c b2 e5 ed 37 d8 27 24 39 0b 7e c4 9c
     80 fa f6 b8 f5 dc b3 bb 48 63 7e 8b 2e 4c db 8c
     62 91 77 53 54 9b 8b 92 66 91 7a 6e cf c0 24 e5
     7d 75 4a e1 2d 50 16 fb e9 2b e9 2c 2c dd 66 d2
     2b e2 65 d5 0f ef de 00 17 dd 82 f0 6c 2e 10 c2
     99 ee 3d 57 6f 21 a9 94 72 9e 30 ce 6e 90 bc f1
     02 03 01 00 01 a3 82 01 3c 30 82 01 38 30 09 06
     03 55 1d 13 04 02 30 00 30 2c 06 09 60 86 48 01
     86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 53 4c
     20 47 65 6e 65 72 61 74 65 64 20 43 65 72 74 69
     66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 16 04
     14 3b 08 81 5f bd 05 be 14 26 39 01 89 be 54 fd
     3c c4 cf 4e 0b 30 81 b8 06 03 55 1d 23 04 81 b0
     30 81 ad 80 14 7b ef ce fa bb e1 f5 84 0b 83 98
     31 8a 19 18 14 27 db 75 5f a1 81 89 a4 81 86 30
     81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31
     15 30 13 06 03 55 04 0a 13 0c 41 69 72 76 61 6e
     61 20 4c 4c 43 2e 31 34 30 32 06 03 55 04 0b 13
     2b 41 69 72 76 61 6e 61 20 4f 6e 65 43 65 6c 6c
     20 43 6f 70 79 72 69 67 68 74 20 32 30 31 35 20
     41 69 72 76 61 6e 61 20 4c 4c 43 2e 31 27 30 25
     06 03 55 04 03 13 1e 41 69 72 76 61 6e 61 20 4f
     6e 65 43 65 6c 6c 20 52 6f 6f 74 20 41 75 74 68
     6f 72 69 74 79 82 09 00 c3 9e 5e ee e3 45 70 96
     30 23 06 03 55 1d 11 04 1c 30 1a 82 18 30 30 30
     35 42 39 35 31 41 44 30 34 2e 61 69 72 76 61 6e
     61 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01
     01 0b 05 00 03 82 01 01 00 0f 2e 98 41 18 18 d9
     40 08 92 cb fc d5 bf 20 42 27 cf 42 60 f8 ac 6a
     89 7e 45 86 f6 24 a1 a7 3e 63 14 3a d0 52 44 ca
     12 65 59 d8 62 50 dd 62 39 33 ce de b6 c0 f5 95
     74 22 5c a2 73 01 60 17 ca 9b 50 03 86 ac c8 88
     3c ce d2 3a 0a d4 63 b8 0a 23 3f b4 a3 4b 9c 3c
     5f d3 fd 02 bc fd 8f e2 04 bd cd bd 07 b7 65 24
     10 62 27 86 be fe 6d 27 8e 2c 0d cb fc 31 9f 5b
     76 e6 2e 72 a8 48 94 53 b7 74 8a 4c 8b 47 5d 79
     5a ef 04 99 ae 61 ab e1 46 c8 48 98 fb 0b 7c 48
     70 32 d5 fb 2e 48 a1 41 53 a2 30 32 c2 63 6e 8a
     da dd f9 fe 35 33 a3 ad 85 c4 78 21 44 5b 3b 75
     6c 7b 73 1d 7d fc 43 05 f6 87 30 73 de 4d c7
SKF Fragment number: 2 OF Total Fragments: 2
     c7 77 e6 89 0e e4 09 97 89 ad ea 43 8c 69 48 b3
     7a 38 ce 09 12 be 1e 99 25 c5 bd 11 17 ba 3c 87
     ad 26 f6 bf 37 9b 53 9c f1 c2 3e 19 58 19 43 a9
     db f4 6f b1 f9 40 fc 7c 4d b5 27 00 00 19 04 c3
     53 df f1 fc e7 34 78 2b 69 cc 15 cc 45 5e 3c ce
     a0 f8 9d 21 00 01 08 01 00 00 00 0e b1 f5 f9 c9
     ab 7a 01 92 28 cf 1a 8d 58 9d 0e 19 24 9e 82 ac
     20 94 22 39 52 c1 a9 1f ec c6 07 66 0a 4b 0e 1c
     ac ff 13 99 40 26 6a 31 78 62 91 bf 21 8a 05 1d
     5e 10 42 18 84 aa ed 8b d5 72 aa 83 69 3d e5 23
     4c 3d d8 ab d4 7e 3e a8 48 cd ff d6 e3 b1 47 e1
     7e 60 dd 79 68 3e 77 af f4 00 65 d9 d5 69 af 09
     81 75 ba e3 f1 a6 ad c8 01 f2 af 0c 63 2c 7a 6e
     00 b0 3a f0 1c 47 e6 24 2d c7 cd 82 dd b0 99 25
     45 79 6e ed 43 04 bc 33 34 2f 74 03 5a 6a ac 3e
     ea b8 f4 a2 74 4f cd b1 8d fa 71 84 4b 16 98 15
     d7 d4 ea 5c 3c b8 8c 2f 6d 6f 37 0e dc 6a 08 ec
     7d d3 69 0d 4f 8a a2 1a f8 a9 cf bf 95 d9 d5 a1
     9c 46 ae 66 be 7a ce de e7 3b a2 f3 ed cf 59 b2
     90 e6 30 fb f4 33 db 5b 10 03 98 e9 a4 62 6f 5f
     b6 d0 56 13 86 f7 af cf 36 16 96 0d 21 41 1a 4c
     97 a1 48 a0 71 c1 6b 32 3b 26 fa 2c 00 00 2c 00
     00 00 28 01 03 04 03 c8 4b 31 4b 03 00 00 0c 01
     00 00 0c 80 0e 01 00 03 00 00 08 03 00 00 02 00
     00 00 08 05 00 00 00 2d 00 00 30 01 00 00 00 08
     00 00 28 00 00 ff ff fd 40 00 05 b9 51 ad 04 00
     00 00 00 00 00 00 01 fd 40 00 05 b9 51 ad 04 00
     00 00 00 00 00 00 01 29 00 00 30 01 00 00 00 08
     00 00 28 00 00 ff ff 00 00 00 00 00 00 00 00 00
     00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff
     ff ff ff ff ff ff ff 29 00 00 08 00 00 40 0c 29
     00 00 0c 00 00 40 0d c0 a8 06 01 29 00 00 0c 00
     00 40 0d 0a 0a 89 cb 29 00 00 0c 00 00 40 0d 0a
     78 89 64 29 00 00 0c 00 00 40 0d c0 a8 08 01 29
     00 00 0c 00 00 40 0d c0 a8 09 01 29 00 00 18 00
     00 40 0e fd 40 00 05 b9 51 ad 04 00 00 00 00 00
     00 00 01 29 00 00 18 00 00 40 0e 26 05 60 00 15
     1d 8a 98 02 05 b9 ff fe 51 ad 06 29 00 00 08 00
     00 40 21 00 00 00 08 00 00 40 24
IKEv2-PROTO-7: (322): All SKF Fragments received for this Msg, starting Assembly
IKEv2-PROTO-7: SKF Assembled Pkt Payloads:
IKEv2-PROTO-7: Next Payload type : 37, Current Length 32
IKEv2-PROTO-7: Next Payload type : 38, Current Length 1209
IKEv2-PROTO-7: Next Payload type : 39, Current Length 25
IKEv2-PROTO-7: Next Payload type : 33, Current Length 264
IKEv2-PROTO-7: Next Payload type : 44, Current Length 44
IKEv2-PROTO-7: Next Payload type : 45, Current Length 48
IKEv2-PROTO-7: Next Payload type : 41, Current Length 48
IKEv2-PROTO-7: Next Payload type : 41, Current Length 8
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 12
IKEv2-PROTO-7: Next Payload type : 41, Current Length 24
IKEv2-PROTO-7: Next Payload type : 41, Current Length 24
IKEv2-PROTO-7: Next Payload type : 41, Current Length 8
IKEv2-PROTO-7: Next Payload type : 0, Current Length 8
 IDi  Next payload: CERT, reserved: 0x0, length: 32
    Id type: FQDN, Reserved: 0x0 0x0

     30 30 30 35 42 39 35 31 41 44 30 34 2e 61 69 72
     76 61 6e 61 2e 63 6f 6d
 CERT  Next payload: CERTREQ, reserved: 0x0, length: 1209
    Cert encoding X.509 Certificate - signature
Cert data: 1204 bytes
 CERTREQ  Next payload: AUTH, reserved: 0x0, length: 25
    Cert encoding X.509 Certificate - signature
CertReq data: 20 bytes
 AUTH  Next payload: SA, reserved: 0x0, length: 264
    Auth method RSA, reserved: 0x0, reserved 0x0
Auth data: 256 bytes
 SA  Next payload: TSi, reserved: 0x0, length: 44
  last proposal: 0x0, reserved: 0x0, length: 40
  Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3    last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
    last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
    last transform: 0x0, reserved: 0x0: length: 8
    type: 5, reserved: 0x0, id: Don't use ESN
 TSi  Next payload: TSr, reserved: 0x0, length: 48
    Num of TSs: 1, reserved 0x0, reserved 0x0
    TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
    start port: 0, end port: 65535
    start addr: fd40:5:b951:ad04::1, end addr: fd40:5:b951:ad04::1
 TSr  Next payload: NOTIFY, reserved: 0x0, length: 48
    Num of TSs: 1, reserved 0x0, reserved 0x0
    TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
    start port: 0, end port: 65535
    start addr: ::, end addr: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
IKEv2-PROTO-7: Parse Notify Payload: MOBIKE_SUPPORTED NOTIFY(MOBIKE_SUPPORTED)  Next payload: NOTIFY, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: MOBIKE_SUPPORTED
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     c0 a8 06 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     0a 0a 89 cb
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     0a 78 89 64
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     c0 a8 08 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV4_ADDRESS NOTIFY(ADDITIONAL_IPV4_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 12
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV4_ADDRESS

     c0 a8 09 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV6_ADDRESS NOTIFY(ADDITIONAL_IPV6_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 24
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV6_ADDRESS

     fd 40 00 05 b9 51 ad 04 00 00 00 00 00 00 00 01
IKEv2-PROTO-7: Parse Notify Payload: ADDITIONAL_IPV6_ADDRESS NOTIFY(ADDITIONAL_IPV6_ADDRESS)  Next payload: NOTIFY, reserved: 0x0, length: 24
    Security protocol id: Unknown - 0, spi size: 0, type: ADDITIONAL_IPV6_ADDRESS

     26 05 60 00 15 1d 8a 98 02 05 b9 ff fe 51 ad 06
IKEv2-PROTO-7: Parse Notify Payload: Unknown - 16417 NOTIFY(Unknown - 16417)  Next payload: NOTIFY, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0
IKEv2-PROTO-7: Parse Notify Payload: Unknown - 16420 NOTIFY(Unknown - 16420)  Next payload: NONE, reserved: 0x0, length: 8
    Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0
 
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH
IKEv2-PROTO-4: (322): Stopping timer to wait for auth message
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T
IKEv2-PROTO-4: (322): Checking NAT discovery
IKEv2-PROTO-4: (322): NAT INSIDE found
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHG_NAT_T_PORT
IKEv2-PROTO-4: (322): NAT detected float to init port 4500, resp port 4500
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID
IKEv2-PROTO-7: (322): Received valid parameteres in process id
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID
IKEv2-PROTO-4: (322): Searching policy based on peer's identity '0005B951AD04.airvana.com' of type 'FQDN'
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_SET_POLICY
IKEv2-PROTO-7: (322): Setting configured policies
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID
IKEv2-PROTO-4: (322): Verify peer's policy
IKEv2-PROTO-4: (322): Peer's policy verified
IKEv2-PROTO-7: (322): Matching certificate found
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE
IKEv2-PROTO-4: (322): Get peer's authentication method
IKEv2-PROTO-4: (322): Peer's authentication method is 'RSA'
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_CERT_ENC
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_X509_CERTS
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_OK_RECD_VERIFY_CERT
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_SAVE_PUBKEY
IKEv2-PROTO-4: (322): Save pubkey
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH
IKEv2-PROTO-4: (322): Verify peer's authentication data
IKEv2-PROTO-4: (322): Verification of peer's authenctication data PASSED
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC
IKEv2-PROTO-4: (322): Processing INITIAL_CONTACT
IKEv2-PROTO-7: Successfully removed child SAs
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT
IKEv2-PROTO-4: (322): Redirect check with platform for load-balancing
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NOTIFY_AUTH_DONE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_CONFIG_MODE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_PROC_SA_TS
IKEv2-PROTO-4: (322): Processing IKE_AUTH message
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (I) MsgID = 00000001 CurState: READY Event: EV_DEL_IC_RCVD
IKEv2-PROTO-7: (158): SM Trace-> SA: I_SPI=8C8B88698D0767CD R_SPI=2DFAEB67884A233D (I) MsgID = 00000001 CurState: DELETE Event: EV_FREE_SA
IKEv2-PROTO-4: (158): Deleting SA
IKEv2-PROTO-2: session is not there in tree
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_OK_RECD_IPSEC_RESP
IKEv2-PROTO-4: (322): Processing IKE_AUTH message
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_MY_AUTH_METHOD
IKEv2-PROTO-4: (322): Get my authentication method
IKEv2-PROTO-4: (322): My authentication method is 'RSA'
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GEN_AUTH
IKEv2-PROTO-4: (322): Generate my authentication data
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK4_SIGN
IKEv2-PROTO-4: (322): Get my authentication method
IKEv2-PROTO-4: (322): My authentication method is 'RSA'
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SIGN
IKEv2-PROTO-4: (322): Sign authentication data
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_AUTH_GEN
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SEND_AUTH
IKEv2-PROTO-4: (322): Generating IKE_AUTH message
IKEv2-PROTO-7: Construct Vendor Specific Payload: CISCO-GRANITEIKEv2-PROTO-4: (322): Constructing IDr payload: 'cn=ciscoasa' of type 'DER ASN1 DN'
IKEv2-PROTO-4: (322): ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
(322):    AES-CBC(322):    SHA96(322):    Don't use ESNIKEv2-PROTO-7: Construct Notify Payload: ESP_TFC_NO_SUPPORTIKEv2-PROTO-7: Construct Notify Payload: NON_FIRST_FRAGSIKEv2-PROTO-7: Construct Notify Payload: MOBIKE_SUPPORTEDIKEv2-PROTO-4: (322): Building packet for encryption.
(322): 
Payload contents:
(322):  VID(322):   Next payload: IDr, reserved: 0x0, length: 20
(322):
(322):      1e ea df eb 23 8a 59 cf d6 1b b1 c2 78 71 95 da
(322):  IDr(322):   Next payload: CERT, reserved: 0x0, length: 29
(322):     Id type: DER ASN1 DN, Reserved: 0x0 0x0
(322):
(322):      30 13 31 11 30 0f 06 03 55 04 03 13 08 63 69 73
(322):      63 6f 61 73 61
(322):  CERT(322):   Next payload: CERT, reserved: 0x0, length: 1170
(322):     Cert encoding X.509 Certificate - signature
(322): Cert data: 1165 bytes
(322):  CERT(322):   Next payload: AUTH, reserved: 0x0, length: 1137
(322):     Cert encoding X.509 Certificate - signature
(322): Cert data: 1132 bytes
(322):  AUTH(322):   Next payload: SA, reserved: 0x0, length: 264
(322):     Auth method RSA, reserved: 0x0, reserved 0x0
(322): Auth data: 256 bytes
(322):  SA(322):   Next payload: TSi, reserved: 0x0, length: 44
(322):   last proposal: 0x0, reserved: 0x0, length: 40
  Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3(322):     last transform: 0x3, reserved: 0x0: length: 12
    type: 1, reserved: 0x0, id: AES-CBC
(322):     last transform: 0x3, reserved: 0x0: length: 8
    type: 3, reserved: 0x0, id: SHA96
(322):     last transform: 0x0, reserved: 0x0: length: 8
    type: 5, reserved: 0x0, id: Don't use ESN
(322):  TSi(322):   Next payload: TSr, reserved: 0x0, length: 48
(322):     Num of TSs: 1, reserved 0x0, reserved 0x0
(322):     TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
(322):     start port: 0, end port: 65535
(322):     start addr: fd40:5:b951:ad04::1, end addr: fd40:5:b951:ad04::1
(322):  TSr(322):   Next payload: NOTIFY, reserved: 0x0, length: 48
(322):     Num of TSs: 1, reserved 0x0, reserved 0x0
(322):     TS type: TS_IPV6_ADDR_RANGE, proto id: 0, length: 40
(322):     start port: 0, end port: 65535
(322):     start addr: 2600:1f16:b92:1404:654:2724:ef17:3f34, end addr: 2600:1f16:b92:1404:654:2724:ef17:3f34
(322):  NOTIFY(ESP_TFC_NO_SUPPORT)(322):   Next payload: NOTIFY, reserved: 0x0, length: 8
(322):     Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT
(322):  NOTIFY(NON_FIRST_FRAGS)(322):   Next payload: NOTIFY, reserved: 0x0, length: 8
(322):     Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS
(322):  NOTIFY(MOBIKE_SUPPORTED)(322):   Next payload: NONE, reserved: 0x0, length: 8
(322):     Security protocol id: Unknown - 0, spi size: 0, type: MOBIKE_SUPPORTED
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_ENCRYPT_MSG
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_NO_EVENT
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 528(322): 
Payload contents:
(322):  SKF(322):   Next payload: VID, reserved: 0x0, length: 500
(322): SKF Fragment number: 1 OF Total Fragments: 7(322):
(322):      5f fc d5 2e 43 ed 8d 08 fa 78 25 31 7b 33 bf 27
(322):      a6 86 89 09 28 77 8d 3e 5f 8d b1 b4 37 38 51 a6
(322):      a1 82 0f 8c e3 c0 2f b6 41 fa dc ad fc 50 d1 da
(322):      f0 dd f7 e9 d0 95 5e e8 72 62 02 5c bb d3 69 de
(322):      7e 5c 2d 2b 55 e4 1b 11 39 4d 12 41 b3 ef c0 c6
(322):      dc e2 9e 7c e8 c6 15 35 eb 0d 14 60 95 a3 1d aa
(322):      83 5e b9 b9 99 b2 97 1b 91 71 d2 43 f9 0a bc ae
(322):      75 33 00 02 6f d1 8e 5d 86 fe f7 20 48 39 1e 93
(322):      33 a4 73 ef 25 1b e0 8f 05 66 62 32 38 52 72 11
(322):      c8 67 0c ea 5e 1f 9e 41 d3 22 b2 7f 73 d4 8e f2
(322):      cd b8 41 d8 70 a1 ca 1a cb 8d a3 a7 f8 a7 76 8a
(322):      25 b9 97 00 1d f2 af 10 61 a8 d6 94 94 6b 20 50
(322):      21 b9 a8 60 0d 63 9f 02 d6 d0 78 5e 92 86 4a 7f
(322):      70 67 b7 a2 cd 8b ec c9 07 d9 0d d5 83 b8 12 81
(322):      ce ea 2a 4c de 6d bd e6 40 27 f2 25 52 20 da a9
(322):      5b e1 15 29 79 e2 d1 96 b4 2b e9 a5 86 ca 70 34
(322):      a9 dc c4 fc 44 79 75 a6 f7 5b 41 39 a1 81 d2 e2
(322):      18 c6 56 c2 8b 84 c7 55 2d a3 d9 80 56 2f ce 8e
(322):      cf af d4 43 79 26 b8 83 0f c5 57 99 35 37 26 29
(322):      77 3c 57 f0 24 ea b3 51 2d 8a 44 4d 55 06 c2 ce
(322):      5a 8a 82 bd 71 f2 9c a3 42 d6 a9 58 b2 33 8d 85
(322):      17 8c 43 9e 6d 5a 38 8b 59 45 ed 5c e9 b1 a0 6d
(322):      bd 70 0f 20 23 93 c9 23 14 01 78 bc 46 47 9b 86
(322):      c0 14 c9 d9 b4 fa 6a bc a7 3e 4e 92 c7 e1 4b 73
(322):      cc aa be 2e 69 5a 29 66 a9 b2 3a 79 0e 1e 98 ac
(322):      ad 7f ad 28 97 96 58 94 7d 40 be 2e 0b fe 48 1e
(322):      50 c4 66 fd 8e ae d1 85 2d 0c 6e 4d 4a da a0 42
(322):      9e 09 0e f9 f6 9a 7f 0c bc 8d 3b 2a 29 84 b9 f4
(322):      15 2a 99 36 33 49 b5 19 3c 7d 6b 9e b3 6d 74 75
(322):      97 10 d5 60 58 c6 88 96 89 a4 62 f5 49 cf 89 1d
(322):      01 fb 6f 9b 72 8e bf bf 83 ff 25 ad
(322): 
IKEv2-PROTO-7: Added encrypted fragment 1 of (7) to the list
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 528(322): 
Payload contents:
(322):  SKF(322):   Next payload: NONE, reserved: 0x0, length: 500
(322): SKF Fragment number: 2 OF Total Fragments: 7(322):
(322):      97 10 d5 60 58 c6 88 96 89 a4 62 f5 49 cf 89 1d
(322):      12 c8 f5 cd 08 6f 00 19 dd ac b8 4f 9f b3 d8 10
(322):      fc 91 f4 d8 f2 86 21 3b a4 88 30 1e c5 f1 13 f8
(322):      bb 13 8e 2c 69 59 75 72 d0 da 12 44 24 ac c2 98
(322):      a6 3a ab f3 55 a0 d0 c5 d0 40 1c ac a8 4c 42 e7
(322):      2f 82 5d 75 87 af 28 75 c0 c0 8e d3 0f 5e fb 61
(322):      a6 2b 56 e1 7f b9 74 2b 26 bf 6e 3b d5 9e 38 09
(322):      a2 44 14 c3 06 74 4d 69 fc c3 b6 09 b1 16 de 7f
(322):      fa 69 e9 8f e3 cd c1 46 77 dc b2 c3 92 e0 38 48
(322):      fe b1 03 50 cb 10 35 c3 e3 7a a5 83 93 88 da f3
(322):      67 c6 b9 88 f8 83 5c fc 0e b0 80 f4 0c 8e 05 d2
(322):      ac 8d 62 87 6c b6 e8 78 4b af 04 81 50 ce 9b 94
(322):      a9 2c e2 80 64 83 2e 0d f2 3a 32 a5 72 ce 16 32
(322):      7a 21 25 0d 5c 0c e9 31 47 24 e9 8e 5d 0d 0f f7
(322):      11 9e 17 4f ed 56 24 36 33 aa 5a ff f6 ac 0b 61
(322):      1c d6 72 0e f3 4f 61 a0 25 80 51 dc 9a 6f 43 84
(322):      c8 cd 4b f7 e2 0e f8 9d d6 0b 8a 51 cf 6a dd 52
(322):      25 54 54 1a 65 08 07 cc 26 cc 53 f3 13 8a be 38
(322):      dc 73 5b b9 4a 4a 94 a4 d7 78 d3 99 40 53 a2 40
(322):      29 bc 5f 91 34 3a dc 3b 25 ea c1 36 fa 76 87 d1
(322):      e1 a2 2f fa a8 55 fb 48 4b 49 80 51 ac 95 76 30
(322):      2e 68 03 8e 97 f2 49 20 b8 5f c7 45 55 4a 04 ec
(322):      84 6a e7 b6 7d bc c0 79 75 48 af b2 19 6f c4 d6
(322):      50 05 56 7d 33 88 b2 54 9d 50 7e cd ca b8 52 9d
(322):      2a 30 2f 5a b0 ba df 2c 0f 98 b5 1d 7e b9 4a 43
(322):      b4 78 39 6f b1 22 ce 69 2e b3 a8 e2 2e f3 29 14
(322):      d5 4f c0 13 31 06 8d c4 c1 d5 bb 20 9c ad bf 2d
(322):      d1 a9 d6 0e 64 d7 23 6b 6f 02 db 75 92 f1 08 b9
(322):      6d f4 74 a9 b9 21 24 92 1d e9 0d 8f 88 1c bf a5
(322):      33 c8 8f cb 5e 29 e0 34 58 cb ca e0 c9 f1 38 a6
(322):      ce 55 06 52 8c e1 bd d2 89 eb 90 13
(322): 
IKEv2-PROTO-7: Added encrypted fragment 2 of (7) to the list
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 528(322): 
Payload contents:
(322):  SKF(322):   Next payload: NONE, reserved: 0x0, length: 500
(322): SKF Fragment number: 3 OF Total Fragments: 7(322):
(322):      33 c8 8f cb 5e 29 e0 34 58 cb ca e0 c9 f1 38 a6
(322):      b6 d5 e9 a9 1c d2 43 44 45 7e 45 fe aa d5 17 4e
(322):      94 47 14 ba 43 8c e9 bf 51 9f 2c 8f ec d1 6e 6b
(322):      01 c1 98 62 e5 9e 26 e6 df ae c0 8d c8 ef 47 5c
(322):      16 5d 22 bc 6b 0d 14 32 75 38 3b ed f4 08 a5 8a
(322):      d5 1e cf cb a6 da 68 2c 88 36 b8 48 f3 e5 eb 11
(322):      92 b1 cc f3 35 fe 14 71 7b c0 6c 4a d1 37 7a 51
(322):      ec 19 68 90 3d 9c 7b 96 be a7 6b 9b ba 20 dc ac
(322):      62 1e ca 88 fa 68 79 17 67 3b 29 4b d6 64 78 39
(322):      21 49 89 9f 8f de 60 04 36 99 38 2e da 8f 4b ff
(322):      f3 74 e3 53 0c db 78 82 46 c7 e3 59 ba e1 65 c5
(322):      d3 e2 d3 67 e6 29 4e 42 55 ee d6 ef 2c fe 55 76
(322):      4b b1 0a 8e 67 de eb 6e 1b b9 5b dd fd 82 ae 27
(322):      5f 5f 20 e5 c5 2a e4 71 6d 01 9f c3 94 dd 21 6d
(322):      c7 80 75 fa 0a 03 6c 1c ac f0 2c 50 1a 0c 74 16
(322):      40 df 16 8b 89 d9 af 57 d3 09 c5 65 1f 8d c4 4e
(322):      65 c3 c1 0c d5 b7 67 19 e6 de 08 89 7c 01 69 0d
(322):      29 f4 46 e6 cc 64 34 33 32 b6 56 39 f4 4c b1 a3
(322):      7c 6a 05 66 1c 11 34 81 dc e8 b2 a7 cc 6c 91 e1
(322):      50 89 bd 22 74 8b fa fa 6c dd 38 61 87 87 5b ca
(322):      55 89 8b ff 8b 94 da 7d 33 8d 90 16 12 fc c0 90
(322):      b1 f4 37 ac a3 37 f0 b6 48 53 3f 91 53 94 13 3f
(322):      02 0d 23 5e 07 d2 9e c8 bc 7e a1 3b 24 b6 c5 dd
(322):      c7 27 f0 38 36 57 31 6a 0c d7 69 d7 fd dd af 3f
(322):      0e ba 3f 49 44 81 8b e9 ee aa 1d ac 20 b3 c4 a5
(322):      5f be 6d 61 78 1c 8c 79 ad 99 ed fc 5d de e9 82
(322):      8f ae 19 d2 ec 46 dd b3 d3 63 23 24 88 54 9d d9
(322):      e2 aa 42 ad 40 9e 64 91 a7 fc 25 92 87 96 9d 81
(322):      f4 c4 56 49 78 dd 93 44 be 47 74 46 ee 70 ee a3
(322):      29 5b 06 bc a1 97 9b f8 20 83 1a 2b 13 ac 16 71
(322):      8c a9 1b 97 06 c0 59 06 16 8b f3 6b
(322): 
IKEv2-PROTO-7: Added encrypted fragment 3 of (7) to the list
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 528(322): 
Payload contents:
(322):  SKF(322):   Next payload: NONE, reserved: 0x0, length: 500
(322): SKF Fragment number: 4 OF Total Fragments: 7(322):
(322):      29 5b 06 bc a1 97 9b f8 20 83 1a 2b 13 ac 16 71
(322):      cd c7 de 0a c7 d4 9e 37 a2 5f d8 92 51 b5 6b 78
(322):      32 27 c4 39 b6 15 62 84 87 d6 9e e7 57 b7 3c a4
(322):      f0 a1 22 a4 22 e7 3e 58 f3 ce f8 e2 5e 99 5c 35
(322):      37 b3 ea 6d 0d bc 74 da e8 b7 c2 4c 62 9f a8 09
(322):      a5 0c 88 e2 3d dc 7b f8 2b 0b 7d 18 16 68 83 c1
(322):      6e fd c7 07 23 84 29 b3 47 93 49 11 d2 a7 d2 2e
(322):      f4 d0 52 cf 11 7f 0a e8 88 07 1c b1 b5 9d f1 7c
(322):      24 24 b4 f0 3c 4a 98 4f fd 4a 27 4f 87 0e ca e6
(322):      c1 6d ca 29 d6 50 2d 5d ff b5 bb 2d fd b1 01 9a
(322):      b2 47 03 2f 39 0d 86 e4 64 2a 68 24 03 e3 0d be
(322):      ec 53 7b 71 60 78 97 cc d5 3f fd 3b bb d6 1e 50
(322):      ef 19 b9 af e5 a3 30 94 85 e9 96 29 f5 6c 64 cd
(322):      4d 64 dd 8a a9 e2 09 2e dc 37 41 ae 4c f3 44 a2
(322):      6e ed b1 d8 bc 1b 58 d9 3f 05 72 cb 33 77 81 77
(322):      94 3a 79 a9 7b 2e a1 0f 3f c7 21 8b 56 fc 55 c0
(322):      5a 13 d5 48 d9 fd 9a 7a 05 05 0a 19 fd d7 29 ee
(322):      0f d4 19 48 a5 3b 15 62 54 7b b4 ce 8e 1b 05 6f
(322):      19 d8 69 28 e9 f1 a2 a7 c0 a6 15 44 60 2b 4e d8
(322):      1e 92 91 e1 52 0e 2d 09 18 3f bb 21 75 13 9e b4
(322):      ec ed cb 49 6d d1 db 90 c4 08 8c aa a7 da b0 7b
(322):      12 d8 63 3a 12 ee 7a bf 9d 0d a3 63 50 d9 42 a5
(322):      7b 03 78 05 4d b4 a7 0c 3d 24 02 df 51 7b a6 f5
(322):      c8 f6 ae f1 75 bb ab 69 70 0b 13 4f 81 b6 b5 fa
(322):      53 80 5a ae 22 63 86 36 28 2b 4d 8c 9e 20 76 bb
(322):      4b 34 de e1 e4 50 73 25 b6 81 2f b9 7a ee 74 e9
(322):      41 ce aa 9e 4e 1e 17 da c6 89 d2 92 e4 21 18 16
(322):      78 71 2d ca a6 ea 64 6f 86 a0 a8 ef 80 23 9f 46
(322):      86 87 60 e8 8f 7a a7 e3 e2 9f a4 01 8c a7 fe e4
(322):      41 15 a7 4a f7 95 f2 53 5a 4d 64 f8 ca 47 66 3f
(322):      e3 29 a4 a4 0d 07 bb b7 70 40 3e ad
(322): 
IKEv2-PROTO-7: Added encrypted fragment 4 of (7) to the list
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 528(322): 
Payload contents:
(322):  SKF(322):   Next payload: NONE, reserved: 0x0, length: 500
(322): SKF Fragment number: 5 OF Total Fragments: 7(322):
(322):      41 15 a7 4a f7 95 f2 53 5a 4d 64 f8 ca 47 66 3f
(322):      5e 59 4c 78 df e3 fa 87 19 70 6a ba 1a 1f 83 f6
(322):      3a 09 fc 4d 49 b9 30 71 95 76 98 68 00 4b 54 99
(322):      42 24 36 be ef fc 3b 4b 97 87 de 18 21 93 c3 db
(322):      84 8c 4d 7a a3 f4 dc ca e7 db 4d 47 c4 c4 11 16
(322):      16 ea 9f 87 aa a8 08 ff 1b 9b e2 be 2d 0c 42 76
(322):      6f 5c 48 89 bc cc 3b 46 5e 8d 1e 8b 6d f8 a3 93
(322):      be 73 4a 26 a8 03 c5 0c 29 1a 03 05 2f 71 ea 29
(322):      51 df af 2a e3 c3 9b 2e cf 15 53 05 53 f5 4d da
(322):      c7 ba 14 df 7c 7f 89 ca 27 9c ca f9 12 88 f3 37
(322):      03 60 ac f4 fb da e3 48 91 61 21 58 b0 3c ec 72
(322):      3c 5f 1d 3e 53 8c 4e 3d e5 6e c7 a0 0a 15 8a 10
(322):      ab 68 3d a0 ad fa 99 a6 86 17 1a f5 c4 41 ed c9
(322):      3c 78 57 e3 39 d3 9b a3 61 26 96 54 73 68 4f c3
(322):      ce 5b 24 35 c7 a5 9e d0 6c d5 cd 72 76 63 db f2
(322):      12 2c 37 62 fa 09 9b a5 50 3a 8b aa f8 6c c6 37
(322):      83 76 31 fe 79 41 b3 c0 20 31 76 22 9d ad 57 e2
(322):      8c fc c0 06 ad c2 46 a0 9b c5 63 5d 6d 07 4d f4
(322):      6b 65 24 1e e0 45 8c e5 9f 6d 49 11 de 7e a9 0f
(322):      db 2f e0 51 f8 ea 5b 83 3b a0 f7 1a cd f5 a0 d2
(322):      06 d8 22 0a a5 ef 2d dd 44 f8 25 0b 34 a2 75 fd
(322):      0f 23 72 1e 02 f8 db b0 0e 2f 57 d3 bc fc c5 02
(322):      97 af 1a f7 9a 1f 45 17 b5 bf 52 e0 8a 97 7b 66
(322):      31 d9 e0 48 9c 44 23 2b a2 43 be cd c8 50 c8 86
(322):      35 37 f2 b8 a4 95 b4 0d 76 46 84 02 00 fa 1d a1
(322):      00 fb f6 50 11 03 78 6c 47 94 f7 16 8d 7d 05 c7
(322):      43 7e f9 35 e7 b3 33 c5 d1 58 7f 01 ed 4a 20 09
(322):      87 6c bb e7 ce 8c a2 33 d1 ba 21 8e ff 98 bc 98
(322):      c5 47 3e 5a db 37 c0 29 4d c3 ec c4 b0 28 00 79
(322):      7a 20 08 85 67 59 64 e8 2c ff d7 83 5d 08 c2 9a
(322):      d8 46 2a c9 fe 00 e5 3e 55 3d 24 e8
(322): 
IKEv2-PROTO-7: Added encrypted fragment 5 of (7) to the list
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 528(322): 
Payload contents:
(322):  SKF(322):   Next payload: NONE, reserved: 0x0, length: 500
(322): SKF Fragment number: 6 OF Total Fragments: 7(322):
(322):      7a 20 08 85 67 59 64 e8 2c ff d7 83 5d 08 c2 9a
(322):      0f 96 73 e5 d8 35 34 19 74 6c 39 6d 56 55 bf 84
(322):      d2 5d 5d eb 81 c2 de 73 c2 b7 51 a3 8c 83 9d 64
(322):      31 92 3d 66 24 28 6c 8c 7c e5 7c 2f d6 18 12 a5
(322):      c1 11 3e 14 b1 0a 74 09 54 ed c6 76 43 2c 0e 71
(322):      91 fb 8a a9 77 ea 91 d4 10 d3 b4 50 94 65 4b 02
(322):      85 22 8f c6 5e 75 fd 34 65 20 74 b3 cc 66 7e 83
(322):      1f 6c e5 38 16 b8 78 de 76 48 d9 53 d1 51 0a cf
(322):      d0 f0 10 0f 6e f4 8f e0 9c cc 63 2a 63 38 5e 67
(322):      ab 10 23 16 f8 71 f0 a4 5e b7 b5 95 37 5c 39 57
(322):      d9 e6 e0 54 82 7e df 78 d0 64 7c 24 87 7a f9 7a
(322):      1a 7d e1 22 c0 4f 8e 7a 75 57 eb 7b 55 95 a3 8e
(322):      6b 07 b4 9c b0 61 24 2f b4 87 c6 8b 42 33 06 d5
(322):      8f dc d1 85 af 33 2c 0c 28 d4 2b 6e 32 50 51 4b
(322):      e3 4f 2f 4a b2 8b b9 6e 27 2f 2f 93 27 af e3 f0
(322):      08 bc 5a 3b fa 76 3f 80 4c f8 a5 00 e7 30 ab 1d
(322):      89 8c fd c3 22 41 73 8e cc 94 d9 46 f0 a8 4d e4
(322):      e8 b2 ab 03 5c f7 00 00 d3 9e fc 71 d7 fa 07 f2
(322):      64 b7 b4 d4 36 46 f3 51 b8 4d cb 0b 9f 8d 6f 74
(322):      77 65 50 c2 2d da be 8d 3e c0 29 cf 9f 15 6c 8d
(322):      48 22 a5 94 c2 24 2c 85 73 54 c4 ea 59 af ff f5
(322):      6e 0a 0b 96 c5 6b 1f ed 54 6e ea f4 fa be 53 ec
(322):      7c a4 6d 9f 39 97 d6 78 42 8a 88 0e 99 15 fc 81
(322):      88 18 08 6f 6e cc 1f dd 4a bc 0f 19 e3 bf 8f 3e
(322):      3a b8 30 bf 08 25 93 df 1c ad 4a 87 6d d1 f4 b3
(322):      23 51 c9 08 dd de 05 88 ad d0 3d 2c 3a 66 cb d7
(322):      e0 f5 10 81 01 31 8b 57 b2 d9 a7 5c 0c a5 4f 76
(322):      cf c0 90 5d f6 11 0b 65 62 97 d7 e5 7e 8e cd dc
(322):      dd e9 d3 1e 99 85 68 9a af 7d 35 6f d8 f0 87 17
(322):      95 8c 43 61 36 cb 8c 20 b1 42 ea 80 78 0c 67 fb
(322):      7b 00 ec 30 6b 33 b0 ed 15 10 0c b3
(322): 
IKEv2-PROTO-7: Added encrypted fragment 6 of (7) to the list
(322): 
IKEv2-PROTO-4: (322): Sending Packet [To 10.10.10.100:4500/From 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 1
(322): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (322): Next payload: SKF, version: 2.0 (322): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (322): Message id: 1, length: 144(322): 
Payload contents:
(322):  SKF(322):   Next payload: NONE, reserved: 0x0, length: 116
(322): SKF Fragment number: 7 OF Total Fragments: 7(322):
(322):      95 8c 43 61 36 cb 8c 20 b1 42 ea 80 78 0c 67 fb
(322):      0c 5f 2d 39 00 ef 75 98 04 b4 c5 37 2c 0e f8 45
(322):      e5 51 a0 06 72 79 bf e6 c3 d9 e8 66 c4 69 2e 98
(322):      65 dd 7d 3e 59 e0 58 e1 60 46 70 fb 60 dc 42 ef
(322):      69 7e 4c 8d e4 eb 9c d5 9b 4c ae f3 99 88 d2 8c
(322):      45 cb c1 dc f4 e9 ef ff 90 5f c1 2f e1 78 4e 6a
(322):      e0 3f 7e 80 cb 8f d8 7f ca e5 12 2e
(322): 
IKEv2-PROTO-7: Added encrypted fragment 7 of (7) to the list
IKEv2-PROTO-7: (322): All fragments encrypted ready to be sent

IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_ENCRYPT_RESP
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_TRYSEND
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK_AUTH_FAIL
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_UPDATE_CAC_STATS
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_INSERT_IKE
IKEv2-PROTO-4: (322): IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started
IKEv2-PROTO-4: (322): Set NAT keepalive timer 10
IKEv2-PROTO-4: (322): Session with IKE ID PAIR (0005B951AD04.airvana.com, cn=ciscoasa) is UP
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_REGISTER_SESSION
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
IKEv2-PROTO-7: Process delete IPSec API
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_RECD_REGISTER_SESSION_RESP
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_GEN_LOAD_IPSEC
IKEv2-PROTO-4: (322): Load IPSEC key material
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK_RECD_LOAD_IPSEC
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_START_ACCT
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_PARENT_NEG_COMPLETE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_PKI_SESH_CLOSE
IKEv2-PROTO-7: (322): Closing the PKI session
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHECK_DUPE
IKEv2-PROTO-4: (322): Checking for duplicate IKEv2 SA
IKEv2-PROTO-4: (322): No duplicate IKEv2 SA found
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: READY Event: EV_R_OK
IKEv2-PROTO-4: (322): Starting timer (8 sec) to delete negotiation context
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: READY Event: EV_NO_EVENT
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000001 CurState: READY Event: EV_DEL_NEG_TMO
IKEv2-PROTO-7: (322): Deleting negotiation context for peer message ID: 0x1
IKEv2-PROTO-7: Freeing all fragments in OUTBOUND fragment list
IKEv2-PROTO-7: Freeing all fragments in INBOUND fragment list
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-4: Send NAT keepalive packet local 172.31.128.100:4500 remote 10.10.10.100:4500
IKEv2-PROTO-7: (322): Request has mess_id 2; expected 2 through 2

(322): 
IKEv2-PROTO-4: (322): Received Packet [From 10.10.10.100:4500/To 172.31.128.100:4500/VRF i0:f0]
(322): Initiator SPI : 4581F4BEA30CAE64 - Responder SPI : 1CEADEEB30BDAA88 Message id: 2
(322): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (322): Next payload: ENCR, version: 2.0 (322): Exchange type: INFORMATIONAL, flags: INITIATOR (322): Message id: 2, length: 124(322): 
Payload contents:
IKEv2-PROTO-4: decrypt queued(322): 
(322): Decrypted packet:(322): Data: 124 bytes
(322): REAL Decrypted packet:(322): Data: 56 bytes
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP)  Next payload: NOTIFY, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_SOURCE_IP

     9f 46 70 da 6d e2 af fc 39 e2 3f 7a 3a 4a 18 cb
     73 8e 8f 7a
IKEv2-PROTO-7: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP)  Next payload: NONE, reserved: 0x0, length: 28
    Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_DESTINATION_IP

     9c e1 d4 fc 7d df 43 03 60 aa 3a 3f e5 ea 4e e6
     49 cc 36 83
 
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000002 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (322): Action: Action_Null
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000002 CurState: INFO_R Event: EV_ENCRYPT_MSG
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000002 CurState: INFO_R Event: EV_TRYSEND
IKEv2-PROTO-2: (322): A supplied parameter is incorrect
IKEv2-PROTO-2: (322): A supplied parameter is incorrect
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000002 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-7: (322): Sent response with message id 2, Requests can be accepted from range 3 to 3
IKEv2-PROTO-7: (322): SM Trace-> SA: I_SPI=4581F4BEA30CAE64 R_SPI=1CEADEEB30BDAA88 (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT

Review Cisco Networking for a $25 gift card