Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- aws-core# debug crypto ikev2 protocol 100
- aws-core#
- IKEv2-PROTO-4: Received Packet [From <My public IP>:500/To 172.31.39.243:500/VRF i0:f0]
- Initiator SPI : 201FAEA82205C336 - Responder SPI : 0000000000000000 Message id: 0
- IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-5: Next payload: SA, version: 2.0 Exchange type: IKE_SA_INIT, flags: INITIATOR Message id: 0, length: 464
- Payload contents:
- SA Next payload: KE, reserved: 0x0, length: 48
- last proposal: 0x0, reserved: 0x0, length: 44
- Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4 last transform: 0x3, reserved: 0x0: length: 12
- type: 1, reserved: 0x0, id: AES-CBC
- last transform: 0x3, reserved: 0x0: length: 8
- type: 3, reserved: 0x0, id: SHA96
- last transform: 0x3, reserved: 0x0: length: 8
- type: 2, reserved: 0x0, id: SHA1
- last transform: 0x0, reserved: 0x0: length: 8
- type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
- KE Next payload: N, reserved: 0x0, length: 264
- DH group: 14, Reserved: 0x0aws-end-core# debug crypto ikev2 protocol 100
- aws-core#
- IKEv2-PROTO-4: Received Packet [From <My public IP>:500/To 172.31.39.243:500/VRF i0:f0]
- Initiator SPI : 201FAEA82205C336 - Responder SPI : 0000000000000000 Message id: 0
- IKEv2 IKE_SA_INIT Exchange REQUESTIKEv2-PROTO-5: Next payload: SA, version: 2.0 Exchange type: IKE_SA_INIT, flags: INITIATOR Message id: 0, length: 464
- Payload contents:
- SA Next payload: KE, reserved: 0x0, length: 48
- last proposal: 0x0, reserved: 0x0, length: 44
- Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4 last transform: 0x3, reserved: 0x0: length: 12
- type: 1, reserved: 0x0, id: AES-CBC
- last transform: 0x3, reserved: 0x0: length: 8
- type: 3, reserved: 0x0, id: SHA96
- last transform: 0x3, reserved: 0x0: length: 8
- type: 2, reserved: 0x0, id: SHA1
- last transform: 0x0, reserved: 0x0: length: 8
- type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
- KE Next payload: N, reserved: 0x0, length: 264
- DH group: 14, Reserved: 0x0
- f7 aa 5f fe 94 36 f1 06 30 65 42 8b e4 3b 75 12
- c8 d6 9f ca 45 df d2 17 4f 45 9e c6 ab c7 13 c9
- 43 86 59 63 bd 2c 6b 15 17 b1 4a ea 4e 71 04 a0
- b5 3f 60 42 7c e1 bb 58 0d b9 6f 24 e8 d9 e9 49
- 16 0b ee ef e5 d7 8f 5e 07 fd 7a 2d 6c 66 c9 55
- cd 48 2d a1 15 b9 90 f7 3f d7 23 88 5b 14 14 29
- 7a b6 ae 16 44 06 93 8f 93 9b 77 c7 c0 a8 e6 c3
- 8d fa 5c 33 90 c1 8d 24 d4 ab 47 85 60 16 31 5a
- dc 67 d8 3f f2 14 4b ea 70 ea 2e 06 bd a1 1d ed
- 28 78 3a c3 a9 d2 6e f7 80 30 4b fb 27 8c ba e3
- eb 7d f4 90 06 74 b7 74 a2 13 6f c6 49 4b 44 e4
- 45 27 cf 42 a7 a5 5d ff c7 95 7b 47 3a 0d a1 47
- fb 91 db 70 be 91 e8 aa 0a 0d 0e 05 94 36 44 8b
- 7e 8f c5 78 a2 22 00 01 23 4c 86 72 7e fe a5 02
- 5b 8c 6c ed 06 34 b0 c3 2c 6e 82 a6 f6 b5 56 1f
- 23 1a fc ff 2c 29 78 93 5f e7 b7 a5 18 65 60 e1
- N Next payload: NOTIFY, reserved: 0x0, length: 36
- aa 50 51 09 bb 66 93 4b 5b 80 f8 3f fa 61 46 dc
- 29 e0 49 96 d5 1a 4c 69 12 4c 75 2b 17 96 76 99
- NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
- Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_SOURCE_IP
- da 99 50 cf 9e 1e 13 4d b0 ff 26 08 5c b8 8f f0
- ec 97 4c 5b
- NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
- Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
- 9c 05 8f f5 67 9c 59 e2 77 cd a6 cd ab 11 53 11
- cf f8 af 02
- NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED) Next payload: NOTIFY, reserved: 0x0, length: 8
- Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
- NOTIFY(Unknown - 16431) Next payload: NOTIFY, reserved: 0x0, length: 16
- Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0
- 00 02 00 03 00 04 00 05
- NOTIFY(REDIRECT_SUPPORTED) Next payload: NONE, reserved: 0x0, length: 8
- Security protocol id: Unknown - 0, spi size: 0, type: REDIRECT_SUPPORTED
- Decrypted packet:Data: 464 bytes
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_RECV_INIT
- IKEv2-PROTO-4: (1202): Checking NAT discovery
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_REDIRECT
- IKEv2-PROTO-7: (1202): Redirect check is not needed, skipping it
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_CAC
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_COOKIE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK4_COOKIE_NOTIFY
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_VERIFY_MSG
- IKEv2-PROTO-4: (1202): Verify SA init message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_INSERT_SA
- IKEv2-PROTO-4: (1202): Insert SA
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_GET_IKE_POLICY
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_PROC_MSG
- IKEv2-PROTO-4: (1202): Processing IKE_SA_INIT message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_DETECT_NAT
- IKEv2-PROTO-7: (1202): Process NAT discovery notify
- IKEv2-PROTO-7: (1202): Processing nat detect src notify
- IKEv2-PROTO-7: (1202): Remote address not matched
- IKEv2-PROTO-7: (1202): Processing nat detect dst notify
- IKEv2-PROTO-7: (1202): Local address not matched
- IKEv2-PROTO-7: (1202): Host is located NAT inside
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_CHK_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_SET_POLICY
- IKEv2-PROTO-7: (1202): Setting configured policies
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN
- IKEv2-PROTO-7: (1202): Opening a PKI session
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY
- IKEv2-PROTO-4: (1202): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14
- IKEv2-PROTO-4: (1202): Request queued for computation of DH key
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET
- IKEv2-PROTO-4: (1202): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14
- IKEv2-PROTO-4: (1202): Request queued for computation of DH secret
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_SKEYID
- IKEv2-PROTO-7: (1202): Generate skeyid
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_BLD_MSG
- IKEv2-PROTO-4: (1202): Generating IKE_SA_INIT message
- IKEv2-PROTO-4: (1202): IKE Proposal: 1, SPI size: 0 (initial negotiation),
- Num. transforms: 4
- (1202): AES-CBC(1202): SHA1(1202): SHA96(1202): DH_GROUP_2048_MODP/Group 14(1202):
- IKEv2-PROTO-4: (1202): Sending Packet [To <My public IP>:500/From 172.31.39.243:500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 0
- (1202): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-5: (1202): Next payload: SA, version: 2.0 (1202): Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (1202): Message id: 0, length: 599(1202):
- Payload contents:
- (1202): SA(1202): Next payload: KE, reserved: 0x0, length: 48
- (1202): last proposal: 0x0, reserved: 0x0, length: 44
- Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(1202): last transform: 0x3, reserved: 0x0: length: 12
- type: 1, reserved: 0x0, id: AES-CBC
- (1202): last transform: 0x3, reserved: 0x0: length: 8
- type: 2, reserved: 0x0, id: SHA1
- (1202): last transform: 0x3, reserved: 0x0: length: 8
- type: 3, reserved: 0x0, id: SHA96
- (1202): last transform: 0x0, reserved: 0x0: length: 8
- type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
- (1202): KE(1202): Next payload: N, reserved: 0x0, length: 264
- (1202): DH group: 14, Reserved: 0x0
- (1202):
- (1202): e0 18 3f bd 61 40 06 9e b3 db 0c 1d 38 8c 72 96
- (1202): 31 70 b3 b7 57 02 d6 f9 dd ca 5a 28 5d cc 67 32
- (1202): 48 20 b9 5b 74 f0 f5 13 e3 46 0a 7e 62 e1 f6 94
- (1202): ed 9d c1 11 f3 82 af d7 ab bf 39 8c 0c d0 42 b5
- (1202): b9 b4 fb 8f 4d bb 7e c3 07 c9 e1 3e 7a f6 8a cc
- (1202): a7 cf 69 8b 75 3b 6e 81 fd ba 5c 5f 6a 75 9a 08
- (1202): c0 74 4e 8a 06 11 f6 0f 14 4d 5e 09 80 ef f3 f3
- (1202): 15 1c 7a 6a 6e 39 22 5e 19 91 99 9d 0f de 0f 03
- (1202): 1a 09 92 85 bd e3 77 52 91 df 32 f3 ac db 85 8b
- (1202): f6 2e ab 5a 1b ee 48 64 ac d1 bc 76 b3 02 43 91
- (1202): 11 28 4a a1 d5 9f 8c 35 31 d8 27 be a1 6d 29 32
- (1202): b9 29 45 2e 77 8b 1a b4 f6 c9 44 41 aa 60 3a 57
- (1202): 50 81 be 3a 94 d5 f6 03 9d c9 c6 5e af 8c 85 a4
- (1202): f3 d1 e6 06 1c 37 f1 8d 29 10 66 36 f8 da 68 09
- (1202): 26 c1 be ff 48 34 a8 f0 07 dd df db 3b f3 bb 01
- (1202): c7 22 56 3e 19 6f c0 76 1f 05 1f d3 e1 6f f9 7d
- (1202): N(1202): Next payload: VID, reserved: 0x0, length: 68
- (1202):
- (1202): 21 93 af f9 1a 95 c5 07 1c da 73 e5 8b 31 38 3a
- (1202): 4c 43 a9 02 35 f2 89 88 f0 aa 0f 1a 0c 29 53 cd
- (1202): 4b dc 33 d6 a8 1b 09 44 c0 c4 cb 4e 69 25 80 1b
- (1202): ee d7 a3 91 27 98 1f 19 16 ec 05 73 b5 52 b2 62
- (1202): VID(1202): Next payload: VID, reserved: 0x0, length: 23
- (1202):
- (1202): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
- (1202): 53 4f 4e
- (1202): VID(1202): Next payload: NOTIFY, reserved: 0x0, length: 59
- (1202):
- (1202): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29
- (1202): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32
- (1202): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d
- (1202): 73 2c 20 49 6e 63 2e
- (1202): NOTIFY(NAT_DETECTION_SOURCE_IP)(1202): Next payload: NOTIFY, reserved: 0x0, length: 28
- (1202): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
- (1202):
- (1202): d1 54 d0 18 f7 75 e1 7e 48 8b 6a ba 95 73 6d 06
- (1202): ba d3 f1 80
- (1202): NOTIFY(NAT_DETECTION_DESTINATION_IP)(1202): Next payload: CERTREQ, reserved: 0x0, length: 28
- (1202): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
- (1202):
- (1202): 29 4b 5f 92 54 e7 6e 62 eb 50 9a cf ef 17 bd 09
- (1202): f9 1c 3c 44
- (1202): CERTREQ(1202): Next payload: NOTIFY, reserved: 0x0, length: 25
- (1202): Cert encoding X.509 Certificate - signature
- (1202): CertReq data: 20 bytes
- (1202): NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(1202): Next payload: VID, reserved: 0x0, length: 8
- (1202): Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
- (1202): VID(1202): Next payload: NONE, reserved: 0x0, length: 20
- (1202):
- (1202): 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
- (1202):
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
- IKEv2-PROTO-4: (1202): IETF Fragmentation is enabled
- IKEv2-PROTO-4: (1202): Completed SA init exchange
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
- IKEv2-PROTO-4: (1202): Starting timer (30 sec) to wait for auth message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): Request has mess_id 1; expected 1 through 1
- (1202):
- IKEv2-PROTO-4: (1202): Received Packet [From <My public IP>:33167/To 172.31.39.243:500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 1
- (1202): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: IKE_AUTH, flags: INITIATOR (1202): Message id: 1, length: 252(1202):
- Payload contents:
- (1202):
- (1202): Decrypted packet:(1202): Data: 252 bytes
- (1202): REAL Decrypted packet:(1202): Data: 179 bytes
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH
- IKEv2-PROTO-4: (1202): Stopping timer to wait for auth message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T
- IKEv2-PROTO-4: (1202): Checking NAT discovery
- IKEv2-PROTO-4: (1202): NAT INSIDE found
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHG_NAT_T_PORT
- IKEv2-PROTO-4: (1202): NAT detected float to init port 33167, resp port 4500
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID
- IKEv2-PROTO-7: (1202): Received valid parameteres in process id
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID
- IKEv2-PROTO-4: (1202): Searching policy based on peer's identity 'pfsense-tg' of type 'key ID'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_SET_POLICY
- IKEv2-PROTO-7: (1202): Setting configured policies
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID
- IKEv2-PROTO-4: (1202): Verify peer's policy
- IKEv2-PROTO-4: (1202): Peer's policy verified
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE
- IKEv2-PROTO-4: (1202): Get peer's authentication method
- IKEv2-PROTO-4: (1202): Peer's authentication method is 'PSK'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_PRESHR_KEY
- IKEv2-PROTO-4: (1202): Get peer's preshared key for pfsense-tg
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH
- IKEv2-PROTO-4: (1202): Verify peer's authentication data
- IKEv2-PROTO-4: (1202): Use preshared key for id pfsense-tg, key len 20
- IKEv2-PROTO-4: (1202): Verification of peer's authenctication data PASSED
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC
- IKEv2-PROTO-4: (1202): Processing INITIAL_CONTACT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT
- IKEv2-PROTO-4: (1202): Redirect check with platform for load-balancing
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NOTIFY_AUTH_DONE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_PROC_SA_TS
- IKEv2-PROTO-4: (1202): Processing IKE_AUTH message
- IKEv2-PROTO-2: (1202): Failed to find a matching policy
- IKEv2-PROTO-2: (1202): Received Policies:
- IKEv2-PROTO-2: (1202): Failed to find a matching policy
- IKEv2-PROTO-2: (1202): Expected Policies:
- IKEv2-PROTO-7: (1202): Failed to verify the proposed policies
- IKEv2-PROTO-2: (1202): Failed to find a matching policy
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_PROP_CHOSEN
- IKEv2-PROTO-4: (1202): Sending no proposal chosen notify
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_MY_AUTH_METHOD
- IKEv2-PROTO-4: (1202): Get my authentication method
- IKEv2-PROTO-4: (1202): My authentication method is 'PSK'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GET_PRESHR_KEY
- IKEv2-PROTO-4: (1202): Get peer's preshared key for pfsense-tg
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GEN_AUTH
- IKEv2-PROTO-4: (1202): Generate my authentication data
- IKEv2-PROTO-4: (1202): Use preshared key for id 172.31.39.243, key len 20
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK4_SIGN
- IKEv2-PROTO-4: (1202): Get my authentication method
- IKEv2-PROTO-4: (1202): My authentication method is 'PSK'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_AUTH_GEN
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SEND_AUTH
- IKEv2-PROTO-4: (1202): Generating IKE_AUTH message
- IKEv2-PROTO-4: (1202): Constructing IDr payload: '172.31.39.243' of type 'IPv4 address'
- IKEv2-PROTO-4: (1202): Building packet for encryption.
- (1202):
- Payload contents:
- (1202): VID(1202): Next payload: IDr, reserved: 0x0, length: 20
- (1202):
- (1202): b5 a9 9b 69 50 30 29 14 78 7b 19 43 c3 45 9b ae
- (1202): IDr(1202): Next payload: AUTH, reserved: 0x0, length: 12
- (1202): Id type: IPv4 address, Reserved: 0x0 0x0
- (1202):
- (1202): ac 1f 27 f3
- (1202): AUTH(1202): Next payload: NOTIFY, reserved: 0x0, length: 28
- (1202): Auth method PSK, reserved: 0x0, reserved 0x0
- (1202): Auth data: 20 bytes
- (1202): NOTIFY(NO_PROPOSAL_CHOSEN)(1202): Next payload: NONE, reserved: 0x0, length: 8
- (1202): Security protocol id: IKE, spi size: 0, type: NO_PROPOSAL_CHOSEN
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_ENCRYPT_MSG
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_ENCRYPT_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_TRYSEND
- (1202):
- IKEv2-PROTO-4: (1202): Sending Packet [To <My public IP>:33167/From 172.31.39.243:4500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 1
- (1202): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (1202): Message id: 1, length: 140(1202):
- Payload contents:
- (1202): ENCR(1202): Next payload: VID, reserved: 0x0, length: 112
- (1202): Encrypted data: 108 bytes
- (1202):
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK_AUTH_FAIL
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_UPDATE_CAC_STATS
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_INSERT_IKE
- IKEv2-PROTO-4: (1202): IKEV2 SA created; inserting SA into database. SA lifetime timer (43200 sec) started
- IKEv2-PROTO-4: (1202): Set NAT keepalive timer 1800
- IKEv2-PROTO-4: (1202): Session with IKE ID PAIR (pfsense-tg, 172.31.39.243) is UP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_REGISTER_SESSION
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
- IKEv2-PROTO-4: (1202): Initializing DPD, configured for 10 seconds
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_RECD_REGISTER_SESSION_RESP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHECK_DUPE
- IKEv2-PROTO-4: (1202): Checking for duplicate IKEv2 SA
- IKEv2-PROTO-4: (1202): No duplicate IKEv2 SA found
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHK4_ROLE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: READY Event: EV_R_OK
- IKEv2-PROTO-4: (1202): Starting timer (8 sec) to delete negotiation context
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: READY Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): Request has mess_id 2; expected 2 through 2
- (1202):
- IKEv2-PROTO-4: (1202): Received Packet [From <My public IP>:33167/To 172.31.39.243:4500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 2
- (1202): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: INFORMATIONAL, flags: INITIATOR (1202): Message id: 2, length: 76(1202):
- Payload contents:
- (1202):
- (1202): Decrypted packet:(1202): Data: 76 bytes
- (1202): REAL Decrypted packet:(1202): Data: 8 bytes
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: READY Event: EV_RECV_INFO_REQ
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_INFO_REQ
- IKEv2-PROTO-4: (1202): Building packet for encryption.
- (1202):
- Payload contents:
- (1202): DELETE(1202): Next payload: NONE, reserved: 0x0, length: 8
- (1202): Security protocol id: IKE, spi size: 0, num of spi: 0
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_ENCRYPT_MSG
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_TRYSEND
- (1202):
- IKEv2-PROTO-4: (1202): Sending Packet [To <My public IP>:33167/From 172.31.39.243:4500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 2
- (1202): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE (1202): Message id: 2, length: 76(1202):
- Payload contents:
- (1202): ENCR(1202): Next payload: DELETE, reserved: 0x0, length: 48
- (1202): Encrypted data: 44 bytes
- (1202):
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK_INFO_TYPE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_DEL
- IKEv2-PROTO-4: (1202): Process delete request from peer
- IKEv2-PROTO-4: (1202): Processing DELETE INFO message for IKEv2 SA [ISPI: 0x201FAEA82205C336 RSPI: 0xB7A99A694307DA53]
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK4_ACTIVE_SA
- IKEv2-PROTO-4: (1202): Check for existing active SA
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_STOP_ACCT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_IPSEC_DEL
- IKEv2-PROTO-4: (1202): Delete all IKE SAs
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: EXIT Event: EV_CHK_PENDING
- IKEv2-PROTO-7: (1202): Sent response with message id 2, Requests can be accepted from range 3 to 3
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (I) MsgID = 00000001 CurState: READY Event: EV_RECV_DEL
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (I) MsgID = 00000001 CurState: DELETE Event: EV_FREE_SA
- IKEv2-PROTO-4: (1202): Deleting SA
- f7 aa 5f fe 94 36 f1 06 30 65 42 8b e4 3b 75 12
- c8 d6 9f ca 45 df d2 17 4f 45 9e c6 ab c7 13 c9
- 43 86 59 63 bd 2c 6b 15 17 b1 4a ea 4e 71 04 a0
- b5 3f 60 42 7c e1 bb 58 0d b9 6f 24 e8 d9 e9 49
- 16 0b ee ef e5 d7 8f 5e 07 fd 7a 2d 6c 66 c9 55
- cd 48 2d a1 15 b9 90 f7 3f d7 23 88 5b 14 14 29
- 7a b6 ae 16 44 06 93 8f 93 9b 77 c7 c0 a8 e6 c3
- 8d fa 5c 33 90 c1 8d 24 d4 ab 47 85 60 16 31 5a
- dc 67 d8 3f f2 14 4b ea 70 ea 2e 06 bd a1 1d ed
- 28 78 3a c3 a9 d2 6e f7 80 30 4b fb 27 8c ba e3
- eb 7d f4 90 06 74 b7 74 a2 13 6f c6 49 4b 44 e4
- 45 27 cf 42 a7 a5 5d ff c7 95 7b 47 3a 0d a1 47
- fb 91 db 70 be 91 e8 aa 0a 0d 0e 05 94 36 44 8b
- 7e 8f c5 78 a2 22 00 01 23 4c 86 72 7e fe a5 02
- 5b 8c 6c ed 06 34 b0 c3 2c 6e 82 a6 f6 b5 56 1f
- 23 1a fc ff 2c 29 78 93 5f e7 b7 a5 18 65 60 e1
- N Next payload: NOTIFY, reserved: 0x0, length: 36
- aa 50 51 09 bb 66 93 4b 5b 80 f8 3f fa 61 46 dc
- 29 e0 49 96 d5 1a 4c 69 12 4c 75 2b 17 96 76 99
- NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
- Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_SOURCE_IP
- da 99 50 cf 9e 1e 13 4d b0 ff 26 08 5c b8 8f f0
- ec 97 4c 5b
- NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
- Security protocol id: Unknown - 0, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
- 9c 05 8f f5 67 9c 59 e2 77 cd a6 cd ab 11 53 11
- cf f8 af 02
- NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED) Next payload: NOTIFY, reserved: 0x0, length: 8
- Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
- NOTIFY(Unknown - 16431) Next payload: NOTIFY, reserved: 0x0, length: 16
- Security protocol id: Unknown - 0, spi size: 0, type: Unknown - 0
- 00 02 00 03 00 04 00 05
- NOTIFY(REDIRECT_SUPPORTED) Next payload: NONE, reserved: 0x0, length: 8
- Security protocol id: Unknown - 0, spi size: 0, type: REDIRECT_SUPPORTED
- Decrypted packet:Data: 464 bytes
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_RECV_INIT
- IKEv2-PROTO-4: (1202): Checking NAT discovery
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_REDIRECT
- IKEv2-PROTO-7: (1202): Redirect check is not needed, skipping it
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_CAC
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK_COOKIE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: IDLE Event: EV_CHK4_COOKIE_NOTIFY
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_VERIFY_MSG
- IKEv2-PROTO-4: (1202): Verify SA init message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_INSERT_SA
- IKEv2-PROTO-4: (1202): Insert SA
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_GET_IKE_POLICY
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_PROC_MSG
- IKEv2-PROTO-4: (1202): Processing IKE_SA_INIT message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_DETECT_NAT
- IKEv2-PROTO-7: (1202): Process NAT discovery notify
- IKEv2-PROTO-7: (1202): Processing nat detect src notify
- IKEv2-PROTO-7: (1202): Remote address not matched
- IKEv2-PROTO-7: (1202): Processing nat detect dst notify
- IKEv2-PROTO-7: (1202): Local address not matched
- IKEv2-PROTO-7: (1202): Host is located NAT inside
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_INIT Event: EV_CHK_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_SET_POLICY
- IKEv2-PROTO-7: (1202): Setting configured policies
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN
- IKEv2-PROTO-7: (1202): Opening a PKI session
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY
- IKEv2-PROTO-4: (1202): [IKEv2 -> Crypto Engine] Computing DH public key, DH Group 14
- IKEv2-PROTO-4: (1202): Request queued for computation of DH key
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET
- IKEv2-PROTO-4: (1202): [IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 14
- IKEv2-PROTO-4: (1202): Request queued for computation of DH secret
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_SKEYID
- IKEv2-PROTO-7: (1202): Generate skeyid
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_BLD_MSG
- IKEv2-PROTO-4: (1202): Generating IKE_SA_INIT message
- IKEv2-PROTO-4: (1202): IKE Proposal: 1, SPI size: 0 (initial negotiation),
- Num. transforms: 4
- (1202): AES-CBC(1202): SHA1(1202): SHA96(1202): DH_GROUP_2048_MODP/Group 14(1202):
- IKEv2-PROTO-4: (1202): Sending Packet [To <My public IP>:500/From 172.31.39.243:500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 0
- (1202): IKEv2 IKE_SA_INIT Exchange RESPONSEIKEv2-PROTO-5: (1202): Next payload: SA, version: 2.0 (1202): Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE (1202): Message id: 0, length: 599(1202):
- Payload contents:
- (1202): SA(1202): Next payload: KE, reserved: 0x0, length: 48
- (1202): last proposal: 0x0, reserved: 0x0, length: 44
- Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4(1202): last transform: 0x3, reserved: 0x0: length: 12
- type: 1, reserved: 0x0, id: AES-CBC
- (1202): last transform: 0x3, reserved: 0x0: length: 8
- type: 2, reserved: 0x0, id: SHA1
- (1202): last transform: 0x3, reserved: 0x0: length: 8
- type: 3, reserved: 0x0, id: SHA96
- (1202): last transform: 0x0, reserved: 0x0: length: 8
- type: 4, reserved: 0x0, id: DH_GROUP_2048_MODP/Group 14
- (1202): KE(1202): Next payload: N, reserved: 0x0, length: 264
- (1202): DH group: 14, Reserved: 0x0
- (1202):
- (1202): e0 18 3f bd 61 40 06 9e b3 db 0c 1d 38 8c 72 96
- (1202): 31 70 b3 b7 57 02 d6 f9 dd ca 5a 28 5d cc 67 32
- (1202): 48 20 b9 5b 74 f0 f5 13 e3 46 0a 7e 62 e1 f6 94
- (1202): ed 9d c1 11 f3 82 af d7 ab bf 39 8c 0c d0 42 b5
- (1202): b9 b4 fb 8f 4d bb 7e c3 07 c9 e1 3e 7a f6 8a cc
- (1202): a7 cf 69 8b 75 3b 6e 81 fd ba 5c 5f 6a 75 9a 08
- (1202): c0 74 4e 8a 06 11 f6 0f 14 4d 5e 09 80 ef f3 f3
- (1202): 15 1c 7a 6a 6e 39 22 5e 19 91 99 9d 0f de 0f 03
- (1202): 1a 09 92 85 bd e3 77 52 91 df 32 f3 ac db 85 8b
- (1202): f6 2e ab 5a 1b ee 48 64 ac d1 bc 76 b3 02 43 91
- (1202): 11 28 4a a1 d5 9f 8c 35 31 d8 27 be a1 6d 29 32
- (1202): b9 29 45 2e 77 8b 1a b4 f6 c9 44 41 aa 60 3a 57
- (1202): 50 81 be 3a 94 d5 f6 03 9d c9 c6 5e af 8c 85 a4
- (1202): f3 d1 e6 06 1c 37 f1 8d 29 10 66 36 f8 da 68 09
- (1202): 26 c1 be ff 48 34 a8 f0 07 dd df db 3b f3 bb 01
- (1202): c7 22 56 3e 19 6f c0 76 1f 05 1f d3 e1 6f f9 7d
- (1202): N(1202): Next payload: VID, reserved: 0x0, length: 68
- (1202):
- (1202): 21 93 af f9 1a 95 c5 07 1c da 73 e5 8b 31 38 3a
- (1202): 4c 43 a9 02 35 f2 89 88 f0 aa 0f 1a 0c 29 53 cd
- (1202): 4b dc 33 d6 a8 1b 09 44 c0 c4 cb 4e 69 25 80 1b
- (1202): ee d7 a3 91 27 98 1f 19 16 ec 05 73 b5 52 b2 62
- (1202): VID(1202): Next payload: VID, reserved: 0x0, length: 23
- (1202):
- (1202): 43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
- (1202): 53 4f 4e
- (1202): VID(1202): Next payload: NOTIFY, reserved: 0x0, length: 59
- (1202):
- (1202): 43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29
- (1202): 26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32
- (1202): 30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d
- (1202): 73 2c 20 49 6e 63 2e
- (1202): NOTIFY(NAT_DETECTION_SOURCE_IP)(1202): Next payload: NOTIFY, reserved: 0x0, length: 28
- (1202): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
- (1202):
- (1202): d1 54 d0 18 f7 75 e1 7e 48 8b 6a ba 95 73 6d 06
- (1202): ba d3 f1 80
- (1202): NOTIFY(NAT_DETECTION_DESTINATION_IP)(1202): Next payload: CERTREQ, reserved: 0x0, length: 28
- (1202): Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
- (1202):
- (1202): 29 4b 5f 92 54 e7 6e 62 eb 50 9a cf ef 17 bd 09
- (1202): f9 1c 3c 44
- (1202): CERTREQ(1202): Next payload: NOTIFY, reserved: 0x0, length: 25
- (1202): Cert encoding X.509 Certificate - signature
- (1202): CertReq data: 20 bytes
- (1202): NOTIFY(IKEV2_FRAGMENTATION_SUPPORTED)(1202): Next payload: VID, reserved: 0x0, length: 8
- (1202): Security protocol id: Unknown - 0, spi size: 0, type: IKEV2_FRAGMENTATION_SUPPORTED
- (1202): VID(1202): Next payload: NONE, reserved: 0x0, length: 20
- (1202):
- (1202): 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
- (1202):
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
- IKEv2-PROTO-4: (1202): IETF Fragmentation is enabled
- IKEv2-PROTO-4: (1202): Completed SA init exchange
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
- IKEv2-PROTO-4: (1202): Starting timer (30 sec) to wait for auth message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): Request has mess_id 1; expected 1 through 1
- (1202):
- IKEv2-PROTO-4: (1202): Received Packet [From <My public IP>:33167/To 172.31.39.243:500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 1
- (1202): IKEv2 IKE_AUTH Exchange REQUESTIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: IKE_AUTH, flags: INITIATOR (1202): Message id: 1, length: 252(1202):
- Payload contents:
- (1202):
- (1202): Decrypted packet:(1202): Data: 252 bytes
- (1202): REAL Decrypted packet:(1202): Data: 179 bytes
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH
- IKEv2-PROTO-4: (1202): Stopping timer to wait for auth message
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T
- IKEv2-PROTO-4: (1202): Checking NAT discovery
- IKEv2-PROTO-4: (1202): NAT INSIDE found
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHG_NAT_T_PORT
- IKEv2-PROTO-4: (1202): NAT detected float to init port 33167, resp port 4500
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID
- IKEv2-PROTO-7: (1202): Received valid parameteres in process id
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID
- IKEv2-PROTO-4: (1202): Searching policy based on peer's identity 'pfsense-tg' of type 'key ID'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_SET_POLICY
- IKEv2-PROTO-7: (1202): Setting configured policies
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID
- IKEv2-PROTO-4: (1202): Verify peer's policy
- IKEv2-PROTO-4: (1202): Peer's policy verified
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE
- IKEv2-PROTO-4: (1202): Get peer's authentication method
- IKEv2-PROTO-4: (1202): Peer's authentication method is 'PSK'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_PRESHR_KEY
- IKEv2-PROTO-4: (1202): Get peer's preshared key for pfsense-tg
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH
- IKEv2-PROTO-4: (1202): Verify peer's authentication data
- IKEv2-PROTO-4: (1202): Use preshared key for id pfsense-tg, key len 20
- IKEv2-PROTO-4: (1202): Verification of peer's authenctication data PASSED
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC
- IKEv2-PROTO-4: (1202): Processing INITIAL_CONTACT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT
- IKEv2-PROTO-4: (1202): Redirect check with platform for load-balancing
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NOTIFY_AUTH_DONE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_CONFIG_MODE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_PROC_SA_TS
- IKEv2-PROTO-4: (1202): Processing IKE_AUTH message
- IKEv2-PROTO-2: (1202): Failed to find a matching policy
- IKEv2-PROTO-2: (1202): Received Policies:
- IKEv2-PROTO-2: (1202): Failed to find a matching policy
- IKEv2-PROTO-2: (1202): Expected Policies:
- IKEv2-PROTO-7: (1202): Failed to verify the proposed policies
- IKEv2-PROTO-2: (1202): Failed to find a matching policy
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_PROP_CHOSEN
- IKEv2-PROTO-4: (1202): Sending no proposal chosen notify
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_MY_AUTH_METHOD
- IKEv2-PROTO-4: (1202): Get my authentication method
- IKEv2-PROTO-4: (1202): My authentication method is 'PSK'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GET_PRESHR_KEY
- IKEv2-PROTO-4: (1202): Get peer's preshared key for pfsense-tg
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GEN_AUTH
- IKEv2-PROTO-4: (1202): Generate my authentication data
- IKEv2-PROTO-4: (1202): Use preshared key for id 172.31.39.243, key len 20
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK4_SIGN
- IKEv2-PROTO-4: (1202): Get my authentication method
- IKEv2-PROTO-4: (1202): My authentication method is 'PSK'
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_AUTH_GEN
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SEND_AUTH
- IKEv2-PROTO-4: (1202): Generating IKE_AUTH message
- IKEv2-PROTO-4: (1202): Constructing IDr payload: '172.31.39.243' of type 'IPv4 address'
- IKEv2-PROTO-4: (1202): Building packet for encryption.
- (1202):
- Payload contents:
- (1202): VID(1202): Next payload: IDr, reserved: 0x0, length: 20
- (1202):
- (1202): b5 a9 9b 69 50 30 29 14 78 7b 19 43 c3 45 9b ae
- (1202): IDr(1202): Next payload: AUTH, reserved: 0x0, length: 12
- (1202): Id type: IPv4 address, Reserved: 0x0 0x0
- (1202):
- (1202): ac 1f 27 f3
- (1202): AUTH(1202): Next payload: NOTIFY, reserved: 0x0, length: 28
- (1202): Auth method PSK, reserved: 0x0, reserved 0x0
- (1202): Auth data: 20 bytes
- (1202): NOTIFY(NO_PROPOSAL_CHOSEN)(1202): Next payload: NONE, reserved: 0x0, length: 8
- (1202): Security protocol id: IKE, spi size: 0, type: NO_PROPOSAL_CHOSEN
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_ENCRYPT_MSG
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_ENCRYPT_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_TRYSEND
- (1202):
- IKEv2-PROTO-4: (1202): Sending Packet [To <My public IP>:33167/From 172.31.39.243:4500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 1
- (1202): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (1202): Message id: 1, length: 140(1202):
- Payload contents:
- (1202): ENCR(1202): Next payload: VID, reserved: 0x0, length: 112
- (1202): Encrypted data: 108 bytes
- (1202):
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK_AUTH_FAIL
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_UPDATE_CAC_STATS
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_INSERT_IKE
- IKEv2-PROTO-4: (1202): IKEV2 SA created; inserting SA into database. SA lifetime timer (43200 sec) started
- IKEv2-PROTO-4: (1202): Set NAT keepalive timer 1800
- IKEv2-PROTO-4: (1202): Session with IKE ID PAIR (pfsense-tg, 172.31.39.243) is UP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_REGISTER_SESSION
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
- IKEv2-PROTO-4: (1202): Initializing DPD, configured for 10 seconds
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_RECD_REGISTER_SESSION_RESP
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHECK_DUPE
- IKEv2-PROTO-4: (1202): Checking for duplicate IKEv2 SA
- IKEv2-PROTO-4: (1202): No duplicate IKEv2 SA found
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHK4_ROLE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: READY Event: EV_R_OK
- IKEv2-PROTO-4: (1202): Starting timer (8 sec) to delete negotiation context
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000001 CurState: READY Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): Request has mess_id 2; expected 2 through 2
- (1202):
- IKEv2-PROTO-4: (1202): Received Packet [From <My public IP>:33167/To 172.31.39.243:4500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 2
- (1202): IKEv2 INFORMATIONAL Exchange REQUESTIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: INFORMATIONAL, flags: INITIATOR (1202): Message id: 2, length: 76(1202):
- Payload contents:
- (1202):
- (1202): Decrypted packet:(1202): Data: 76 bytes
- (1202): REAL Decrypted packet:(1202): Data: 8 bytes
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: READY Event: EV_RECV_INFO_REQ
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_INFO_REQ
- IKEv2-PROTO-4: (1202): Building packet for encryption.
- (1202):
- Payload contents:
- (1202): DELETE(1202): Next payload: NONE, reserved: 0x0, length: 8
- (1202): Security protocol id: IKE, spi size: 0, num of spi: 0
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_ENCRYPT_MSG
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_OK_ENCRYPT_RESP
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_TRYSEND
- (1202):
- IKEv2-PROTO-4: (1202): Sending Packet [To <My public IP>:33167/From 172.31.39.243:4500/VRF i0:f0]
- (1202): Initiator SPI : 201FAEA82205C336 - Responder SPI : B7A99A694307DA53 Message id: 2
- (1202): IKEv2 INFORMATIONAL Exchange RESPONSEIKEv2-PROTO-5: (1202): Next payload: ENCR, version: 2.0 (1202): Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE (1202): Message id: 2, length: 76(1202):
- Payload contents:
- (1202): ENCR(1202): Next payload: DELETE, reserved: 0x0, length: 48
- (1202): Encrypted data: 44 bytes
- (1202):
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK_INFO_TYPE
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_DEL
- IKEv2-PROTO-4: (1202): Process delete request from peer
- IKEv2-PROTO-4: (1202): Processing DELETE INFO message for IKEv2 SA [ISPI: 0x201FAEA82205C336 RSPI: 0xB7A99A694307DA53]
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK4_ACTIVE_SA
- IKEv2-PROTO-4: (1202): Check for existing active SA
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_STOP_ACCT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_IPSEC_DEL
- IKEv2-PROTO-4: (1202): Delete all IKE SAs
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
- IKEv2-PROTO-7: (1202): Action: Action_Null
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: EXIT Event: EV_CHK_PENDING
- IKEv2-PROTO-7: (1202): Sent response with message id 2, Requests can be accepted from range 3 to 3
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (I) MsgID = 00000001 CurState: READY Event: EV_RECV_DEL
- IKEv2-PROTO-7: (1202): SM Trace-> SA: I_SPI=201FAEA82205C336 R_SPI=B7A99A694307DA53 (I) MsgID = 00000001 CurState: DELETE Event: EV_FREE_SA
- IKEv2-PROTO-4: (1202): Deleting SA
Add Comment
Please, Sign In to add comment