*Oct 9 00:58:34.726: [] -> [ACL automatic]: message ACL for always up maps *Oct 9 00:58:34.726: [ACL automatic]: message = ACL for always up maps *Oct 9 00:58:34.726: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 10.17.1.55:500, remote= 10.17.1.52:500, local_proxy= 0.0.0.0/0.0.0.0/256/0, remote_proxy= 0.0.0.0/0.0.0.0/256/0, protocol= ESP, transform= esp-gcm 256 (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0 *Oct 9 00:58:34.726: [ACL automatic] -> [ACL automatic]: delayed (60000 msec) message ACL for always up maps *Oct 9 00:58:34.726: IKEv2:Searching Policy with fvrf 0, local address 10.17.1.55 *Oct 9 00:58:34.726: IKEv2:Found Policy 'ikev2-pol1' *Oct 9 00:58:34.726: IKEv2:Adding Proposal ikev2-prop-suiteb to toolkit policy *Oct 9 00:58:34.726: IKEv2:(1): Choosing IKE profile c2s-Profile-certs *Oct 9 00:58:34.726: IKEv2:New ikev2 sa request admitted *Oct 9 00:58:34.726: IKEv2:Incrementing outgoing negotiating sa count by one *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: IDLE Event: EV_INIT_SA *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_IKE_POLICY *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_SET_POLICY *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):Setting configured policies *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_CHK_AUTH4PKI *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_PKI_SESH_OPEN *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):Opening a PKI session *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Start PKI Session *Oct 9 00:58:34.726: CRYPTO_PKI: (A00A2) Session started - identity not specified *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):[PKI -> IKEv2] Starting of PKI Session PASSED *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GEN_DH_KEY *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 20 *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):Request queued for computation of DH key *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_NO_EVENT *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):Action: Action_Null *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_CONFIG_MODE *Oct 9 00:58:34.726: IKEv2:IKEv2 initiator - no config data to send in IKE_SA_INIT exch *Oct 9 00:58:34.726: IKEv2:No config data to send to toolkit: *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_BLD_MSG *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):Generating IKE_SA_INIT message *Oct 9 00:58:34.726: IKEv2:(SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation), Num. transforms: 4 AES-CBC SHA384 SHA384 DH_GROUP_384_ECP/Group 20 *Oct 9 00:58:34.730: IKEv2:Construct Vendor Specific Payload: DELETE-REASON *Oct 9 00:58:34.730: IKEv2:Construct Vendor Specific Payload: (CUSTOM) *Oct 9 00:58:34.730: IKEv2:Construct Notify Payload: NAT_DETECTION_SOURCE_IP *Oct 9 00:58:34.730: IKEv2:Construct Notify Payload: NAT_DETECTION_DESTINATION_IP *Oct 9 00:58:34.730: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 0000000000000000 Message id: 0 IKEv2 IKE_SA_INIT Exchange REQUEST Payload contents: SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) *Oct 9 00:58:34.730: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_INSERT_SA *Oct 9 00:58:34.730: IKEv2:(SA ID = 1):Insert SA *Oct 9 00:58:34.730: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_NO_EVENT *Oct 9 00:58:34.738: IKEv2:Got a packet from dispatcher *Oct 9 00:58:34.738: IKEv2:Processing an item off the pak queue *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):Received Packet [From 10.17.1.52:500/To 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 9F7A91B9158BD601 Message id: 0 IKEv2 IKE_SA_INIT Exchange RESPONSE Payload contents: SA KE N *Oct 9 00:58:34.738: IKEv2:Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP) *Oct 9 00:58:34.738: IKEv2:Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP) CERTREQ *Oct 9 00:58:34.738: IKEv2:Parse Notify Payload: Unknown - 16404 NOTIFY(Unknown - 16404) *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_RECV_INIT *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK4_NOTIFY *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_VERIFY_MSG *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):Verify SA init message *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_PROC_MSG *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieving trustpoint(s) from received certificate hash(es) *Oct 9 00:58:34.738: CRYPTO_PKI: Trust-Point ontp picked up *Oct 9 00:58:34.738: CRYPTO_PKI: 1 matching trustpoints found *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): 'ontp' *Oct 9 00:58:34.738: CRYPTO_PKI: Trust-Point ontp picked up *Oct 9 00:58:34.738: CRYPTO_PKI: 1 matching trustpoints found *Oct 9 00:58:34.738: CRYPTO_PKI: locked trustpoint ontp, refcount is 1 *Oct 9 00:58:34.738: CRYPTO_PKI: Identity bound (ontp) for session A00A2 *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Getting cert chain for the trustpoint ontp *Oct 9 00:58:34.738: IKEv2:(SA ID = 1):[PKI -> IKEv2] Getting of cert chain for the trustpoint PASSED *Oct 9 00:58:34.738: IKEv2:Sending certificates as X509 certificates *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Matching certificate found *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_DETECT_NAT *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Process NAT discovery notify *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Processing nat detect src notify *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Remote address matched *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Processing nat detect dst notify *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Local address matched *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):No NAT found *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_NAT_T *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):Checking NAT discovery *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):NAT not found *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_CONFIG_MODE *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_DH_SECRET *Oct 9 00:58:34.742: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 20 *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):Request queued for computation of DH secret *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_NO_EVENT *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_OK_RECD_DH_SECRET_RESP *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):Action: Action_Null *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_SKEYID *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):Generate skeyid *Oct 9 00:58:34.862: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):Completed SA init exchange *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GET_CONFIG_MODE *Oct 9 00:58:34.866: IKEv2:Sending config data to toolkit *Oct 9 00:58:34.866: IKEv2:Config data to send: *Oct 9 00:58:34.866: Config-type: Config-request *Oct 9 00:58:34.866: Attrib type: ipv4-dns, length: 0 *Oct 9 00:58:34.866: Attrib type: ipv4-dns, length: 0 *Oct 9 00:58:34.866: Attrib type: ipv4-nbns, length: 0 *Oct 9 00:58:34.866: Attrib type: ipv4-nbns, length: 0 *Oct 9 00:58:34.866: Attrib type: ipv4-subnet, length: 0 *Oct 9 00:58:34.866: Attrib type: app-version, length: 241, data: Cisco IOS Software, C800 Software (C800-UNIVERSALK9-M), Version 15.3(2)T, RELEASE SOFTWARE (fc3) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2013 by Cisco Systems, Inc. Compiled Thu 28-Mar-13 13:45 by prod_rel_team *Oct 9 00:58:34.866: Attrib type: split-dns, length: 0 *Oct 9 00:58:34.866: Attrib type: banner, length: 0 *Oct 9 00:58:34.866: Attrib type: config-url, length: 0 *Oct 9 00:58:34.866: Attrib type: backup-gateway, length: 0 *Oct 9 00:58:34.866: Attrib type: def-domain, length: 0 *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):Have config mode data to send *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_EAP *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):Check for EAP exchange *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GEN_AUTH *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):Generate my authentication data *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_AUTH_TYPE *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):Get my authentication method *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):My authentication method is 'ECDSA' *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SIGN *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):Sign authentication data *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Getting private key *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):[PKI -> IKEv2] Getting of private key PASSED *Oct 9 00:58:34.866: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Sign authentication data *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] Signing of authenticaiton data PASSED *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_NO_EVENT *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_RECD_SIG *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):Authentication material has been sucessfully signed *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_AUTH_GEN *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):Check for EAP exchange *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SEND_AUTH *Oct 9 00:58:34.910: IKEv2:(SA ID = 1):Generating IKE_AUTH message *Oct 9 00:58:34.910: IKEv2:Construct Vendor Specific Payload: CISCO-GRANITE *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):Constructing IDi payload: 'cn=10.17.1.55,o=Oceus,st=TX,c=US' of type 'DER ASN1 DN' *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieve configured trustpoint(s) *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): 'ontp' *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Get Public Key Hashes of trustpoints *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):[PKI -> IKEv2] Getting of Public Key Hashes of trustpoints PASSED *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation), Num. transforms: 2 AES-GCM Don't use ESN *Oct 9 00:58:34.914: IKEv2:Construct Notify Payload: INITIAL_CONTACT *Oct 9 00:58:34.914: IKEv2:Construct Notify Payload: SET_WINDOW_SIZE *Oct 9 00:58:34.914: IKEv2:Construct Notify Payload: ESP_TFC_NO_SUPPORT *Oct 9 00:58:34.914: IKEv2:Construct Notify Payload: NON_FIRST_FRAGS *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):Building packet for encryption. Payload contents: VID IDi CERT CERTREQ AUTH CFG SA TSi TSr NOTIFY(INITIAL_CONTACT) NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS) *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 9F7A91B9158BD601 Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:58:34.914: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:58:34.938: IKEv2:Got a packet from dispatcher *Oct 9 00:58:34.938: IKEv2:Processing an item off the pak queue *Oct 9 00:58:34.938: IKEv2:(SA ID = 1):Received Packet [From 10.17.1.52:500/To 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 9F7A91B9158BD601 Message id: 1 IKEv2 IKE_AUTH Exchange RESPONSE Payload contents: IDr CERT AUTH SA TSi TSr *Oct 9 00:58:34.938: IKEv2:Parse Notify Payload: Unknown - 16403 NOTIFY(Unknown - 16403) *Oct 9 00:58:34.938: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RECV_AUTH *Oct 9 00:58:34.938: IKEv2:(SA ID = 1):Action: Action_Null *Oct 9 00:58:34.938: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_PROC_AUTH Event: EV_CHK4_NOTIFY *Oct 9 00:58:34.938: IKEv2:(SA ID = 1):Process auth response notify *Oct 9 00:58:34.942: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_PROC_AUTH Event: EV_PROC_MSG *Oct 9 00:58:34.942: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:58:34.942: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:58:34.942: IKEv2:(SA ID = 1): oni819#Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 9F7A91B9158BD601 Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:58:34.942: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:58:34.942: IKEv2:Got a packet from dispatcher *Oct 9 00:58:34.942: IKEv2:Processing an item off the pak queue *Oct 9 00:58:34.942: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:58:34.946: IKEv2:Packet is a retransmission *Oct 9 00:58:34.946: IKEv2: *Oct 9 00:58:35.626: IKEv2: oni819#Process delete IPSec API *Oct 9 00:58:35.626: IKEv2:Failed to locate an item in the database *Oct 9 00:58:35.630: IKEv2:ipsec delete *Oct 9 00:58:36.830: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:58:36.830: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:58:36.830: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 9F7A91B9158BD601 Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:58:36.830: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:58:36.830: IKEv2: oni819#Got a packet from dispatcher *Oct 9 00:58:36.830: IKEv2:Processing an item off the pak queue *Oct 9 00:58:36.830: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:58:36.830: IKEv2:Packet is a retransmission *Oct 9 00:58:36.830: IKEv2: oni819#clear crypto ikev2 sa *Oct 9 00:58:40.630: IKEv2:Process delete IPSec API *Oct 9 00:58:40.630: IKEv2:Failed to locate an item in the database *Oct 9 00:58:40.630: IKEv2:ipsec delete *Oct 9 00:58:40.726: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:58:40.726: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:58:40.726: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 228AC895E08D00A8 - Responder SPI : 9F7A91B9158BD601 Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:58:40.726: IKEv2:(SA ID = 1): oni819#term SM Trace-> SA: I_SPI=228AC895E08D00A8 R_SPI=9F7A91B9158BD601 (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:58:40.726: IKEv2:Got a packet from dispatcher *Oct 9 00:58:40.726: IKEv2:Processing an item off the pak queue *Oct 9 00:58:40.726: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:58:40.726: IKEv2:Packet is a retransmission *Oct 9 00:58:40.726: IKEv2: