Thanks, ipsec profile removed.
Jun 17 10:24:04: IKEv2:Received Packet [From site1vpnip:500/To site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
SA KE N NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) VID VID VID VID
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Verify SA init message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Insert SA
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Processing IKE_SA_INIT message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Request queued for computation of DH key
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Request queued for computation of DH secret
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Generating IKE_SA_INIT message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
AES-CBC SHA256 SHA256 DH_GROUP_2048_MODP/Group 14
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Sending Packet [To site1vpnip:500/From site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Completed SA init exchange
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Starting timer (30 sec) to wait for auth message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Received Packet [From site1vpnip:500/To site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 1
IKEv2 IKE_AUTH Exchange REQUEST
Payload contents:
IDi AUTH SA TSi TSr
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Stopping timer to wait for auth message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Checking NAT discovery
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):NAT not found
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Searching policy based on peer's identity 'site1vpnip' of type 'IPv4 address'
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Verify peer's policy
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Peer's policy verified
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Get peer's authentication method
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Peer's authentication method is 'PSK'
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Get peer's preshared key for site1vpnip
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Verify peer's authentication data
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Use preshared key for id site1vpnip, key len 21
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Verification of peer's authenctication data PASSED
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Processing IKE_AUTH message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Get my authentication method
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):My authentication method is 'PSK'
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Get peer's preshared key for site1vpnip
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Generate my authentication data
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Use preshared key for id site2vpnip, key len 21
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Get my authentication method
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):My authentication method is 'PSK'
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Generating IKE_AUTH message
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Constructing IDr payload: 'site2vpnip' of type 'IPv4 address'
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
AES-CBC SHA256 Don't use ESN
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Building packet for encryption.
Payload contents:
VID IDr AUTH SA TSi TSr NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Sending Packet [To site1vpnip:500/From site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents:
ENCR
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (36000 sec) started
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Session with IKE ID PAIR (site1vpnip, site2vpnip) is UP
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Initializing DPD, configured for 60 seconds
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Load IPSEC key material
Jun 17 10:24:04: KMI: Crypto IKEv2 sending message KEY_MGR_CREATE_IPSEC_SAS to IPSEC key engine.
Jun 17 10:24:04: KMI: IPSEC key engine received message KEY_MGR_CREATE_IPSEC_SAS from Crypto IKEv2.
Jun 17 10:24:04: IPSEC:(SESSION ID = 628638) (STATES) SADB_ROOT_SM (sadb_root_process_kmi_message) called static seqno 246 dynamic seqno 0
Jun 17 10:24:04: IPSEC:(SESSION ID = 628638) (get_old_outbound_sa_for_peer) No outbound SA found for peer 7FC0717E5748
Jun 17 10:24:04: IPSEC:(SESSION ID = 628638) (update_current_outbound_sa) updated peer site1vpnip current outbound sa to SPI 0
Jun 17 10:24:04: IPSEC(send_delete_notify_kmi): ASSERT FAILED: Decrement count mismatch for sibling :7FC066EF2638
Jun 17 10:24:04: IPSEC(send_delete_notify_kmi): not sending KEY_ENGINE_DELETE_SAS
Jun 17 10:24:04: IPSEC(ident_send_delete_notify_kmi): not in msg context Ident Delete SA msg: 0
Jun 17 10:24:04: KMI: (Session ID: 628638) IPSEC key engine sending message KEY_ENG_DELETE_SAS to Crypto IKEv2.
Jun 17 10:24:04: IPSEC(MESSAGE): SADB_ROOT_SM (print_message_to_acl_state_machine) Sent MSG_ACL_KMI_CREATE_SA message to ACL ike-v2_acl, static seqno 246 dynamic seqno 0
Jun 17 10:24:04: KMI: (Session ID: 628638) Crypto IKEv2 received message KEY_ENG_DELETE_SAS from IPSEC key engine.
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):: Creation/Installation of IPsec SA into IPsec DB failed
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Queuing IKE SA delete request reason: unknown
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Sending DELETE INFO message for IPsec SA [SPI: 0x4BA623B7]
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Building packet for encryption.
Payload contents:
DELETE
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Checking if request will fit in peer window
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Sending Packet [To site1vpnip:500/From site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 0
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
ENCR
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Check for existing IPSEC SA
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Delete all IKE SAs
Jun 17 10:24:04: KMI: Crypto IKEv2 sending message KEY_MGR_DELETE_SAS to IPSEC key engine.
Jun 17 10:24:04: KMI: Crypto IKEv2 sending message KEY_MGR_DELETE_SAS to IPSEC key engine.
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Sending DELETE INFO message for IKEv2 SA [ISPI: 0xD179FA2A903352F1 RSPI: 0x395184BD8BAD0E14]
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Building packet for encryption.
Payload contents:
DELETE
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Checking if request will fit in peer window
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Check for existing active SA
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Delete all IKE SAs
Jun 17 10:24:04: KMI: IPSEC key engine received message KEY_MGR_DELETE_SAS from Crypto IKEv2.
Jun 17 10:24:04: IPSEC: still in use sa: 0x0
Jun 17 10:24:04: IPSEC: sa null
Jun 17 10:24:04: KMI: IPSEC key engine received message KEY_MGR_DELETE_SAS from Crypto IKEv2.
Jun 17 10:24:04: IPSEC: still in use sa: 0x0
Jun 17 10:24:04: IPSEC: sa null
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Received Packet [From site1vpnip:500/To site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 0
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:
DELETE
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Processing ACK to informational exchange
Jun 17 10:24:04: KMI: Crypto IKEv2 sending message KEY_MGR_DELETE_SAS to IPSEC key engine.
Jun 17 10:24:04: KMI: Crypto IKEv2 sending message KEY_MGR_DELETE_SAS to IPSEC key engine.
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Check for existing IPSEC SA
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Delete all IKE SAs
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Sending Packet [To site1vpnip:500/From site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 1
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
ENCR
Jun 17 10:24:04: KMI: IPSEC key engine received message KEY_MGR_DELETE_SAS from Crypto IKEv2.
Jun 17 10:24:04: IPSEC: still in use sa: 0x0
Jun 17 10:24:04: IPSEC: sa null
Jun 17 10:24:04: KMI: IPSEC key engine received message KEY_MGR_DELETE_SAS from Crypto IKEv2.
Jun 17 10:24:04: IPSEC: still in use sa: 0x0
Jun 17 10:24:04: IPSEC: sa null
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Received Packet [From site1vpnip:500/To site2vpnip:500/VRF i0:f0]
Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 1
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Processing ACK to informational exchange
Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Deleting SA