*Oct 9 00:20:49.094: IPSEC(key_engine): request timer fired: count = 1, (identity) local= 10.17.1.55:0, remote= 10.17.1.52:0, local_proxy= 0.0.0.0/0.0.0.0/256/0, remote_proxy= 0.0.0.0/0.0.0.0/256/0 *Oct 9 00:20:49.094: IPSEC(sa_request): , (key eng. msg.) OUTBOUND local= 10.17.1.55:500, remote= 10.17.1.52:500, local_proxy= 0.0.0.0/0.0.0.0/256/0, remote_proxy= 0.0.0.0/0.0.0.0/256/0, protocol= ESP, transform= esp-gcm 256 (Tunnel), lifedur= 3600s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 256, flags= 0x0 *Oct 9 00:20:49.094: IKEv2:Searching Policy with fvrf 0, local address 10.17.1.55 *Oct 9 00:20:49.094: IKEv2:Found Policy 'ikev2-pol1' *Oct 9 00:20:49.094: IKEv2:Adding Proposal ikev2-prop-suiteb to toolkit policy *Oct 9 00:20:49.094: IKEv2:(1): Choosing IKE profile c2s-Profile-certs *Oct 9 00:20:49.094: IKEv2:New ikev2 sa request admitted *Oct 9 00:20:49.094: IKEv2:Incrementing outgoing negotiating sa count by one *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: IDLE Event: EV_INIT_SA *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_IKE_POLICY *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_SET_POLICY *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):Setting configured policies *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_CHK_AUTH4PKI *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_PKI_SESH_OPEN *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):Opening a PKI session *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Start PKI Session *Oct 9 00:20:49.094: CRYPTO_PKI: (A008E) Session started - identity not specified *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):[PKI -> IKEv2] Starting of PKI Session PASSED *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GEN_DH_KEY *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 20 *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):Request queued for computation of DH key *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_NO_EVENT *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):Action: Action_Null *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_GET_CONFIG_MODE *Oct 9 00:20:49.094: IKEv2:IKEv2 initiator - no config data to send in IKE_SA_INIT exch *Oct 9 00:20:49.094: IKEv2:No config data to send to toolkit: *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_BLD_MSG *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):Generating IKE_SA_INIT message *Oct 9 00:20:49.094: IKEv2:(SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation), Num. transforms: 4 AES-CBC SHA384 SHA384 DH_GROUP_384_ECP/Group 20 *Oct 9 00:20:49.094: IKEv2:Construct Vendor Specific Payload: DELETE-REASON *Oct 9 00:20:49.098: IKEv2:Construct Vendor Specific Payload: (CUSTOM) *Oct 9 00:20:49.098: IKEv2:Construct Notify Payload: NAT_DETECTION_SOURCE_IP *Oct 9 00:20:49.098: IKEv2:Construct Notify Payload: NAT_DETECTION_DESTINATION_IP *Oct 9 00:20:49.098: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 0000000000000000 Message id: 0 IKEv2 IKE_SA_INIT Exchange REQUEST Payload contents: SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) *Oct 9 00:20:49.098: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_BLD_INIT Event: EV_INSERT_SA *Oct 9 00:20:49.098: IKEv2:(SA ID = 1):Insert SA *Oct 9 00:20:49.098: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=0000000000000000 (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_NO_EVENT *Oct 9 00:20:49.106: IKEv2:Got a packet from dispatcher *Oct 9 00:20:49.106: IKEv2:Processing an item off the pak queue *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):Received Packet [From 10.17.1.52:500/To 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 0 IKEv2 IKE_SA_INIT Exchange RESPONSE Payload contents: SA KE N *Oct 9 00:20:49.106: IKEv2:Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP) *Oct 9 00:20:49.106: IKEv2:Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP) CERTREQ *Oct 9 00:20:49.106: IKEv2:Parse Notify Payload: Unknown - 16404 NOTIFY(Unknown - 16404) *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_WAIT_INIT Event: EV_RECV_INIT *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK4_NOTIFY *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_VERIFY_MSG *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):Verify SA init message *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_PROC_MSG *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieving trustpoint(s) from received certificate hash(es) *Oct 9 00:20:49.106: CRYPTO_PKI: Trust-Point ontp picked up *Oct 9 00:20:49.106: CRYPTO_PKI: 1 matching trustpoints found *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): 'ontp' *Oct 9 00:20:49.106: CRYPTO_PKI: Trust-Point ontp picked up *Oct 9 00:20:49.106: CRYPTO_PKI: 1 matching trustpoints found *Oct 9 00:20:49.106: CRYPTO_PKI: locked trustpoint ontp, refcount is 1 *Oct 9 00:20:49.106: CRYPTO_PKI: Identity bound (ontp) for session A008E *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Getting cert chain for the trustpoint ontp *Oct 9 00:20:49.106: IKEv2:(SA ID = 1):[PKI -> IKEv2] Getting of cert chain for the trustpoint PASSED *Oct 9 00:20:49.106: IKEv2:Sending certificates as X509 certificates *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Matching certificate found *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_DETECT_NAT *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Process NAT discovery notify *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Processing nat detect src notify *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Remote address matched *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Processing nat detect dst notify *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Local address matched *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):No NAT found *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_NAT_T *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):Checking NAT discovery *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):NAT not found *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_PROC_INIT Event: EV_CHK_CONFIG_MODE *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_DH_SECRET *Oct 9 00:20:49.110: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 20 *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):Request queued for computation of DH secret *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_NO_EVENT *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_OK_RECD_DH_SECRET_RESP *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):Action: Action_Null *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_GEN_SKEYID *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):Generate skeyid *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED *Oct 9 00:20:49.230: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):Completed SA init exchange *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GET_CONFIG_MODE *Oct 9 00:20:49.234: IKEv2:Sending config data to toolkit *Oct 9 00:20:49.234: IKEv2:Config data to send: *Oct 9 00:20:49.234: Config-type: Config-request *Oct 9 00:20:49.234: Attrib type: ipv4-dns, length: 0 *Oct 9 00:20:49.234: Attrib type: ipv4-dns, length: 0 *Oct 9 00:20:49.234: Attrib type: ipv4-nbns, length: 0 *Oct 9 00:20:49.234: Attrib type: ipv4-nbns, length: 0 *Oct 9 00:20:49.234: Attrib type: ipv4-subnet, length: 0 *Oct 9 00:20:49.234: Attrib type: app-version, length: 241, data: Cisco IOS Software, C800 Software (C800-UNIVERSALK9-M), Version 15.3(2)T, RELEASE SOFTWARE (fc3) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2013 by Cisco Systems, Inc. Compiled Thu 28-Mar-13 13:45 by prod_rel_team *Oct 9 00:20:49.234: Attrib type: split-dns, length: 0 *Oct 9 00:20:49.234: Attrib type: banner, length: 0 *Oct 9 00:20:49.234: Attrib type: config-url, length: 0 *Oct 9 00:20:49.234: Attrib type: backup-gateway, length: 0 *Oct 9 00:20:49.234: Attrib type: def-domain, length: 0 *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):Have config mode data to send *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_EAP *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):Check for EAP exchange *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_GEN_AUTH *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):Generate my authentication data *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_CHK_AUTH_TYPE *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):Get my authentication method *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):My authentication method is 'ECDSA' *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SIGN *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):Sign authentication data *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Getting private key *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):[PKI -> IKEv2] Getting of private key PASSED *Oct 9 00:20:49.234: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Sign authentication data *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] Signing of authenticaiton data PASSED *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_NO_EVENT *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_RECD_SIG *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):Authentication material has been sucessfully signed *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_OK_AUTH_GEN *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):Check for EAP exchange *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000000 CurState: I_BLD_AUTH Event: EV_SEND_AUTH *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):Generating IKE_AUTH message *Oct 9 00:20:49.278: IKEv2:Construct Vendor Specific Payload: CISCO-GRANITE *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):Constructing IDi payload: 'cn=10.17.1.55,o=Oceus,st=TX,c=US' of type 'DER ASN1 DN' *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieve configured trustpoint(s) *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): 'ontp' *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Get Public Key Hashes of trustpoints *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):[PKI -> IKEv2] Getting of Public Key Hashes of trustpoints PASSED *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation), Num. transforms: 2 AES-GCM Don't use ESN *Oct 9 00:20:49.278: IKEv2:Construct Notify Payload: INITIAL_CONTACT *Oct 9 00:20:49.278: IKEv2:Construct Notify Payload: SET_WINDOW_SIZE *Oct 9 00:20:49.278: IKEv2:Construct Notify Payload: ESP_TFC_NO_SUPPORT *Oct 9 00:20:49.278: IKEv2:Construct Notify Payload: NON_FIRST_FRAGS *Oct 9 00:20:49.278: IKEv2:(SA ID = 1):Building packet for encryption. Payload contents: VID IDi CERT CERTREQ AUTH CFG SA TSi TSr NOTIFY(INITIAL_CONTACT) NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS) *Oct 9 00:20:49.282: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:20:49.282: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:20:49.302: IKEv2:Got a packet from dispatcher *Oct 9 00:20:49.302: IKEv2:Processing an item off the pak queue *Oct 9 00:20:49.302: IKEv2:(SA ID = 1):Received Packet [From 10.17.1.52:500/To 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 1 IKEv2 IKE_AUTH Exchange RESPONSE Payload contents: IDr CERT AUTH SA TSi TSr *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RECV_AUTH *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):Action: Action_Null *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_PROC_AUTH Event: EV_CHK4_NOTIFY *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):Process auth response notify *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_PROC_AUTH Event: EV_PROC_MSG *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:20:49.306: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:20:49.310: IKEv2:Got a packet from dispatcher *Oct 9 00:20:49.310: IKEv2:Processing an item off the pak queue *Oct 9 00:20:49.310: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:20:49.310: IKEv2:Packet is a retransmission oni819# *Oct 9 00:20:49.310: IKEv2: *Oct 9 00:20:49.598: IKEv2:Process delete IPSec API *Oct 9 00:20:49.598: IKEv2:Failed to locate an item in the database *Oct 9 00:20:49.598: IKEv2:ipsec delete oni819# *Oct 9 00:20:51.270: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:20:51.270: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:20:51.270: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:20:51.270: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:20:51.274: IKEv2: oni819#Got a packet from dispatcher *Oct 9 00:20:51.274: IKEv2:Processing an item off the pak queue *Oct 9 00:20:51.274: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:20:51.274: IKEv2:Packet is a retransmission *Oct 9 00:20:51.274: IKEv2: oni819# *Oct 9 00:20:54.598: IKEv2:Process delete IPSec API *Oct 9 00:20:54.598: IKEv2:Failed to locate an item in the database *Oct 9 00:20:54.598: IKEv2:ipsec delete *Oct 9 00:20:55.010: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:20:55.010: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:20:55.010: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:20:55.010: IKEv2:(SA ID = 1): oni819#SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:20:55.010: IKEv2:Got a packet from dispatcher *Oct 9 00:20:55.010: IKEv2:Processing an item off the pak queue *Oct 9 00:20:55.010: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:20:55.010: IKEv2:Packet is a retransmission *Oct 9 00:20:55.010: IKEv2: oni819#term no mon *Oct 9 00:20:59.598: IKEv2:Process delete IPSec API *Oct 9 00:20:59.598: IKEv2:Failed to locate an item in the database *Oct 9 00:20:59.598: IKEv2:ipsec delete oni819#term no mon *Oct 9 00:21:02.822: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_RE_XMT *Oct 9 00:21:02.822: IKEv2:(SA ID = 1):Retransmitting packet *Oct 9 00:21:02.822: IKEv2:(SA ID = 1):Sending Packet [To 10.17.1.52:500/From 10.17.1.55:500/VRF i0:f0] Initiator SPI : 4A3CA8CD546C5D3C - Responder SPI : 35841FE76DF3DB1F Message id: 1 IKEv2 IKE_AUTH Exchange REQUEST Payload contents: ENCR *Oct 9 00:21:02.822: IKEv2:(SA ID = 1):SM Trace-> SA: I_SPI=4A3CA8CD546C5D3C R_SPI=35841FE76DF3DB1F (I) MsgID = 00000001 CurState: I_WAIT_AUTH Event: EV_NO_EVENT *Oct 9 00:21:02.822: IKEv2: oni819#term no monGot a packet from dispatcher *Oct 9 00:21:02.822: IKEv2:Processing an item off the pak queue *Oct 9 00:21:02.822: IKEv2:(SA ID = 1):Packet is a retransmission *Oct 9 00:21:02.822: IKEv2:Packet is a retransmission *Oct 9 00:21:02.822: IKEv2: oni819#term no mon *Oct 9 00:21:04.602: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has invalid spi for destaddr=10.17.1.55, prot=50, spi=0x6262E698(1650648728), srcaddr=10.17.1.52, input interface=Vlan2 oni819#term no mon *Oct 9 00:21:04.602: IKEv2:Process delete IPSec API *Oct 9 00:21:04.602: IKEv2:Failed to locate an item in the database *Oct 9 00:21:04.602: IKEv2:ipsec delete