Hi,
Could you tell me what is wrong with my configuration as I cant get the tunnel up.
R1:
!
crypto ikev2 proposal TEST_PRO
encryption aes-cbc-128
integrity sha256
group 2
!
crypto ikev2 policy TEST
proposal TEST_PRO
!
crypto ikev2 keyring KEY
peer ASA1
address 10.10.10.10
pre-shared-key local cisco
pre-shared-key remote cisco
!
!
!
crypto ikev2 profile TEST_PROFILE
match identity remote address 10.10.10.10 255.255.255.255
identity local address 10.10.10.1
authentication remote pre-share
authentication local pre-share
keyring local KEY
!
!
!
!
!
!
crypto ipsec transform-set TEST_TRANS esp-aes esp-sha-hmac
mode tunnel
!
!
!
!
crypto map TEST_MAP 10 ipsec-isakmp
set peer 10.10.10.10
set transform-set TEST_TRANS
set ikev2-profile TEST_PROFILE
match address TEST_TRAFFIC
!
!
!
!
!
interface Loopback0
ip address 1.1.1.1 255.255.255.0
!
!
interface GigabitEthernet0/1
ip address 10.10.10.1 255.255.255.0
duplex auto
speed auto
crypto map TEST_MAP
!
!
ip route 3.3.3.0 255.255.255.0 GigabitEthernet0/1
!
ip access-list extended TEST_TRAFFIC
permit ip 1.1.1.0 0.0.0.255 3.3.3.0 0.0.0.255
!
!
------------
ASA:
interface Ethernet0/0
nameif outside
security-level 0
ip address 10.10.10.10 255.255.255.0
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 123.123.123.10 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
access-list TRAFFIC extended permit ip 3.3.3.0 255.255.255.0 1.1.1.0 255.255.255.0
crypto ipsec ikev2 ipsec-proposal TRANS
protocol esp encryption aes
protocol esp integrity sha-1
crypto map MAP 10 match address TRAFFIC
crypto map MAP 10 set peer 10.10.10.1
crypto map MAP interface outside
crypto map MAO 10 set ikev2 ipsec-proposal TRANS
crypto isakmp identity address
crypto ikev2 policy 10
encryption aes
integrity sha256
group 2
prf sha256
lifetime seconds 86400
crypto ikev2 enable outside
tunnel-group 10.10.10.1 type ipsec-l2l
tunnel-group 10.10.10.1 ipsec-attributes
ikev2 remote-authentication pre-shared-key cisco
ikev2 local-authentication pre-shared-key cisco
ASA debug:
ASA(config)# debug crypto ikev2 protocol 100
ASA(config)# %ASA-5-111008: User 'enable_15' executed the 'debug crypto ikev2 protocol 100' command.
%ASA-5-111010: User 'enable_15', running 'CLI' from IP 0.0.0.0, executed 'debug crypto ikev2 protocol 100'
ASA(config)#
ASA(config)#
ASA(config)#
ASA(config)#
ASA(config)#
ASA(config)# %ASA-5-750002: Local:10.10.10.10:500 Remote:10.10.10.1:500 Username:Unknown Received a IKE_INIT_SA request
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x0
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 0000000000000000]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 0000000000000000
IKEv2-PROTO-4: Next payload: SA, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_SA_INIT, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x0, length: 336
SA Next payload: KE, reserved: 0x0, length: 48
IKEv2-PROTO-4: last proposal: 0x0, reserved: 0x0, length: 44
Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 12
type: 1, reserved: 0x0, id: AES-CBC
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 2, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 3, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x0, reserved: 0x0: length: 8
type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2
KE Next payload: N, reserved: 0x0, length: 136
DH group: 2, Reserved: 0x0
17 f3 ab d5 b8 5b 87 35 b2 02 d2 1d f7 a8 9c f1
61 97 f6 7b 78 e6 7f 48 f9 26 84 85 27 f9 ac 82
50 95 a6 74 b8 60 a5 f3 1e ec 97 18 ad 4c 07 6c
a8 97 b1 e2 da 3d 25 16 02 11 96 ff e2 f2 3e df
cc 8b 0e 69 3b 8d 71 1a de 33 73 d6 88 8e 63 22
fc 15 47 06 ea 5d 67 59 53 92 58 53 f1 a0 20 ff
31 28 e1 db f5 c6 99 85 70 3c b1 d7 57 f5 65 00
44 ea 93 81 df a4 7e 91 9b 01 79 22 89 eb 4d 43
N Next payload: VID, reserved: 0x0, length: 24
86 62 4c 38 68 44 8a cc 2e 7b 73 97 82 e4 9a 76
59 f0 b5 ef
IKEv2-PROTO-5: Parse Vendor Specific Payload: CISCO-DELETE-REASON VID Next payload: VID, reserved: 0x0, length: 23
43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
53 4f 4e
IKEv2-PROTO-5: Parse Vendor Specific Payload: (CUSTOM) VID Next payload: NOTIFY, reserved: 0x0, length: 21
46 4c 45 58 56 50 4e 2d 53 55 50 50 4f 52 54 45
44
IKEv2-PROTO-5: Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
1e 8b ce a6 60 68 89 c9 95 56 50 20 96 92 cd 15
02 3b 74 73
IKEv2-PROTO-5: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: NONE, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
f6 5c b2 2e 5a aa 31 23 38 31 9e 8f f0 1d fe 46
95 05 24 6f
Decrypted packet:Data: 336 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: IDLE Event: EV_RECV_INIT
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_INIT Event: EV_VERIFY_MSG
IKEv2-PROTO-3: (9): Verify SA init message
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_INIT Event: EV_INSERT_SA
IKEv2-PROTO-3: (9): Insert SA
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_INIT Event: EV_GET_IKE_POLICY
IKEv2-PROTO-3: (9): Getting configured policies
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_INIT Event: EV_PROC_MSG
IKEv2-PROTO-2: (9): Processing initial message
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_INIT Event: EV_DETECT_NAT
IKEv2-PROTO-3: (9): Process NAT discovery notify
IKEv2-PROTO-5: (9): Processing nat detect src notify
IKEv2-PROTO-5: (9): Remote address matched
IKEv2-PROTO-5: (9): Processing nat detect dst notify
IKEv2-PROTO-5: (9): Local address matched
IKEv2-PROTO-5: (9): No NAT found
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_INIT Event: EV_CHK_CONFIG_MODE
%ASA-5-750006: Local:10.10.10.10:500 Remote:10.10.10.1:500 Username:10.10.10.1 SA UP. Reason: New Connection Established
%ASA-6-113009: AAA retrieved default group policy (DfltGrpPolicy) for user = 10.10.10.1
%ASA-5-750007: Local:10.10.10.10:500 Remote:10.10.10.1:500 Username:10.10.10.1 SA DOWN. Reason: peer request
%ASA-4-113019: Group = 10.10.10.1, Username = 10.10.10.1, IP = 10.10.10.1, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_SET_POLICY
IKEv2-PROTO-3: (9): Setting configured policies
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN
IKEv2-PROTO-3: (9): Opening a PKI session
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY
IKEv2-PROTO-3: (9): Computing DH public key
IKEv2-PROTO-3: (9):
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET
IKEv2-PROTO-3: (9): Computing DH secret key
IKEv2-PROTO-3: (9):
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_SKEYID
IKEv2-PROTO-3: (9): Generate skeyid
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_BLD_MSG
IKEv2-PROTO-2: (9): Sending initial message
IKEv2-PROTO-3: IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
AES-CBC SHA256 SHA256 DH_GROUP_1024_MODP/Group 2
IKEv2-PROTO-5: Construct Vendor Specific Payload: DELETE-REASONIKEv2-PROTO-5: Construct Vendor Specific Payload: (CUSTOM)IKEv2-PROTO-5: Construct Notify Payload: NAT_DETECTION_SOURCE_IPIKEv2-PROTO-5: Construct Notify Payload: NAT_DETECTION_DESTINATION_IPIKEv2-PROTO-5: Construct Vendor Specific Payload: FRAGMENTATIONIKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x0
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: SA, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x0, length: 394
SA Next payload: KE, reserved: 0x0, length: 48
IKEv2-PROTO-4: last proposal: 0x0, reserved: 0x0, length: 44
Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 12
type: 1, reserved: 0x0, id: AES-CBC
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 2, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 3, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x0, reserved: 0x0: length: 8
type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2
KE Next payload: N, reserved: 0x0, length: 136
DH group: 2, Reserved: 0x0
6b 1d 73 7e e8 b4 fa a6 1e cc f1 6c 4b 64 1b cd
5d 70 8f ca 96 20 38 13 75 c5 2f 8d 21 44 39 46
6f 94 65 be 47 4a 48 0a 3e b7 98 ed 7d dd ac 08
d6 c7 9e dd 7f 85 da 92 ed 67 7a cc 12 26 04 bb
8b 7b 3d a2 42 9a af af 64 4e 84 19 a2 4c cd d5
cb de 18 fc d7 1f e7 df 88 fe 9d 51 01 ad e1 08
28 f8 a2 7f f3 ab 6a b1 9a 44 2b c7 c1 5a 65 89
e1 d0 85 e2 cd 02 40 11 fe 97 70 52 60 be b7 80
N Next payload: VID, reserved: 0x0, length: 24
9e 31 59 1e 3e 09 6b a0 16 ad ac 83 b0 d9 02 55
8d cf 7d 91
VID Next payload: VID, reserved: 0x0, length: 23
43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
53 4f 4e
VID Next payload: NOTIFY, reserved: 0x0, length: 59
43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29
26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32
30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d
73 2c 20 49 6e 63 2e
NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
47 3c 47 58 bd 9a ec 0b 8d a2 c3 bc b5 f8 fe f0
d6 74 49 6d
NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: VID, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
a3 f8 85 c0 a1 ab 61 6a 0d 46 1f 29 e7 be c7 fa
ff e0 42 44
VID Next payload: NONE, reserved: 0x0, length: 20
40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
IKEv2-PROTO-3: (9): Cisco DeleteReason Notify is enabled
IKEv2-PROTO-3: (9): Complete SA init exchange
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
IKEv2-PROTO-3: (9): Starting timer to wait for auth message (30 sec)
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x1
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_AUTH, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x1, length: 304
IKEv2-PROTO-5: (9): Request has mess_id 1; expected 1 through 1
REAL Decrypted packet:Data: 232 bytes
IKEv2-PROTO-5: Parse Vendor Specific Payload: (CUSTOM) VID Next payload: IDi, reserved: 0x0, length: 20
ef 42 d3 8d fc 37 3c 87 57 39 80 0d f0 3d 05 ba
IDi Next payload: AUTH, reserved: 0x0, length: 12
Id type: IPv4 address, Reserved: 0x0 0x0
0a 0a 0a 01
AUTH Next payload: SA, reserved: 0x0, length: 40
Auth method PSK, reserved: 0x0, reserved 0x0
Auth data: 32 bytes
SA Next payload: TSi, reserved: 0x0, length: 44
IKEv2-PROTO-4: last proposal: 0x0, reserved: 0x0, length: 40
Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 12
type: 1, reserved: 0x0, id: AES-CBC
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 3, reserved: 0x0, id: SHA96
IKEv2-PROTO-4: last transform: 0x0, reserved: 0x0: length: 8
type: 5, reserved: 0x0, id:
TSi Next payload: TSr, reserved: 0x0, length: 40
Num of TSs: 2, reserved 0x0, reserved 0x0
TS type: TS_IPV4_ADDR_RANGE, proto id: 1, length: 16
start port: 0, end port: 65535
start addr: 1.1.1.1, end addr: 1.1.1.1
TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
start port: 0, end port: 65535
start addr: 1.1.1.0, end addr: 1.1.1.255
TSr Next payload: NOTIFY, reserved: 0x0, length: 40
Num of TSs: 2, reserved 0x0, reserved 0x0
TS type: TS_IPV4_ADDR_RANGE, proto id: 1, length: 16
start port: 0, end port: 65535
start addr: 3.3.3.3, end addr: 3.3.3.3
TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
start port: 0, end port: 65535
start addr: 3.3.3.0, end addr: 3.3.3.255
IKEv2-PROTO-5: Parse Notify Payload: INITIAL_CONTACT NOTIFY(INITIAL_CONTACT) Next payload: NOTIFY, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: INITIAL_CONTACT
IKEv2-PROTO-5: Parse Notify Payload: SET_WINDOW_SIZE NOTIFY(SET_WINDOW_SIZE) Next payload: NOTIFY, reserved: 0x0, length: 12
Security protocol id: IKE, spi size: 0, type: SET_WINDOW_SIZE
00 00 00 05
IKEv2-PROTO-5: Parse Notify Payload: ESP_TFC_NO_SUPPORT NOTIFY(ESP_TFC_NO_SUPPORT) Next payload: NOTIFY, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT
IKEv2-PROTO-5: Parse Notify Payload: NON_FIRST_FRAGS NOTIFY(NON_FIRST_FRAGS) Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS
Decrypted packet:Data: 304 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH
IKEv2-PROTO-3: (9): Stopping timer to wait for auth message
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T
IKEv2-PROTO-3: (9): Check NAT discovery
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID
IKEv2-PROTO-2: (9): Recieved valid parameteres in process id
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID
IKEv2-PROTO-3: (9): Getting configured policies
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_SET_POLICY
IKEv2-PROTO-3: (9): Setting configured policies
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID
IKEv2-PROTO-3: (9): Verify peer's policy
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_CONFIG_MODE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE
IKEv2-PROTO-3: (9): Get peer authentication method
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_PRESHR_KEY
IKEv2-PROTO-3: (9): Get peer's preshared key for 10.10.10.1
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH
IKEv2-PROTO-3: (9): Verify authentication data
IKEv2-PROTO-3: (9): Use preshared key for id 10.10.10.1, key len 5
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC
IKEv2-PROTO-3: (9): Processing initial contact
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT
IKEv2-PROTO-5: (9): Redirect check is not needed, skipping it
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_PROC_SA_TS
IKEv2-PROTO-2: (9): Processing auth message
IKEv2-PROTO-1: (9): Failed to find a matching policy
IKEv2-PROTO-1: (9): Received Policies:
ESP: Proposal 1: AES-CBC-128 SHA96
IKEv2-PROTO-1: (9): Failed to find a matching policy
IKEv2-PROTO-1: (9): Expected Policies:
IKEv2-PROTO-5: (9): Failed to verify the proposed policies
IKEv2-PROTO-1: (9): Failed to find a matching policy
IKEv2-PROTO-1: (9):
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_PROP_CHOSEN
IKEv2-PROTO-2: (9): Sending no proposal chosen notify
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_MY_AUTH_METHOD
IKEv2-PROTO-3: (9): Get my authentication method
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GET_PRESHR_KEY
IKEv2-PROTO-3: (9): Get peer's preshared key for 10.10.10.1
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GEN_AUTH
IKEv2-PROTO-3: (9): Generate my authentication data
IKEv2-PROTO-3: (9): Use preshared key for id 10.10.10.10, key len 5
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK4_SIGN
IKEv2-PROTO-3: (9): Get my authentication method
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_AUTH_GEN
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SEND_AUTH
IKEv2-PROTO-2: (9): Sending auth message
IKEv2-PROTO-5: Construct Vendor Specific Payload: CISCO-GRANITEIKEv2-PROTO-5: Construct Notify Payload: NO_PROPOSAL_CHOSENIKEv2-PROTO-3: (9): Building packet for encryption; contents are:
VID Next payload: IDr, reserved: 0x0, length: 20
16 12 88 85 83 c1 4c e0 57 39 80 0d f0 3d 05 ba
IDr Next payload: AUTH, reserved: 0x0, length: 12
Id type: IPv4 address, Reserved: 0x0 0x0
0a 0a 0a 0a
AUTH Next payload: NOTIFY, reserved: 0x0, length: 40
Auth method PSK, reserved: 0x0, reserved 0x0
Auth data: 32 bytes
NOTIFY(NO_PROPOSAL_CHOSEN) Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: NO_PROPOSAL_CHOSEN
IKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x1
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x1, length: 160
ENCR Next payload: VID, reserved: 0x0, length: 132
Encrypted data: 128 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_PKI_SESH_CLOSE
IKEv2-PROTO-3: (9): Closing the PKI session
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_INSERT_IKE
IKEv2-PROTO-2: (9): SA created; inserting SA into database
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_REGISTER_SESSION
IKEv2-PROTO-3: (9):
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
IKEv2-PROTO-3: (9): Initializing DPD, configured for 10 seconds
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_RECD_REGISTER_SESSION_RESP
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHECK_DUPE
IKEv2-PROTO-3: (9): Checking for duplicate SA
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: READY Event: EV_R_UPDATE_CAC_STATS
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: READY Event: EV_R_OK
IKEv2-PROTO-3: (9): Starting timer to delete negotiation context
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000001 CurState: READY Event: EV_NO_EVENT
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x2
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x2, length: 80
IKEv2-PROTO-5: (9): Request has mess_id 2; expected 2 through 2
REAL Decrypted packet:Data: 12 bytes
DELETE Next payload: NONE, reserved: 0x0, length: 12
Security protocol id: ESP, spi size: 4, num of spi: 1
c1 23 f5 28
Decrypted packet:Data: 80 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-3: (9): Building packet for encryption; contents are:
IKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x2
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x2, length: 80
ENCR Next payload: NONE, reserved: 0x0, length: 52
Encrypted data: 48 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_DEL
IKEv2-PROTO-2: (9): Process delete request from peer
IKEv2-PROTO-5: Trying to remove child SA with spi 28F523C1
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK4_ACTIVE_SA
IKEv2-PROTO-3: (9): Check for existing active SA
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-5: (9): Sent response with message id 2, Requests can be accepted from range 3 to 3
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x3
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x3, length: 80
IKEv2-PROTO-5: (9): Request has mess_id 3; expected 3 through 3
REAL Decrypted packet:Data: 8 bytes
DELETE Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, num of spi: 0
Decrypted packet:Data: 80 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-3: (9): Building packet for encryption; contents are:
DELETE Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, num of spi: 0
IKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x3
IKEv2-PROTO-3: HDR[i:EE42D28DEF00CFC0 - r: 1412898590F6BFA7]
IKEv2-PROTO-4: IKEV2 HDR ispi: EE42D28DEF00CFC0 - rspi: 1412898590F6BFA7
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x3, length: 80
ENCR Next payload: DELETE, reserved: 0x0, length: 52
Encrypted data: 48 bytes
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_RECV_DEL
IKEv2-PROTO-2: (9): Process delete request from peer
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_CHK4_ACTIVE_SA
IKEv2-PROTO-3: (9): Check for existing active SA
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_STOP_ACCT
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_TERM_CONN
IKEv2-PROTO-3: (9): Delete all IKE SAs
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-5: (9): Sent response with message id 3, Requests can be accepted from range 4 to 4
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000003 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (R) MsgID = 00000002 CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-5: (9): Deleting negotiation context for peer message ID: 0x2
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (I) MsgID = 00000001 CurState: READY Event: EV_RECV_DEL
IKEv2-PROTO-5: (9): Action: Action_Null
IKEv2-PROTO-5: (9): SM Trace-> SA: I_SPI=EE42D28DEF00CFC0 R_SPI=1412898590F6BFA7 (I) MsgID = 00000001 CurState: DELETE Event: EV_FREE_SA
IKEv2-PROTO-3: (9): Deleting SA
%ASA-5-750002: Local:10.10.10.10:500 Remote:10.10.10.1:500 Username:Unknown Received a IKE_INIT_SA request
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x0
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 0000000000000000]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 0000000000000000
IKEv2-PROTO-4: Next payload: SA, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_SA_INIT, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x0, length: 336
SA Next payload: KE, reserved: 0x0, length: 48
IKEv2-PROTO-4: last proposal: 0x0, reserved: 0x0, length: 44
Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 12
type: 1, reserved: 0x0, id: AES-CBC
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 2, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 3, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x0, reserved: 0x0: length: 8
type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2
KE Next payload: N, reserved: 0x0, length: 136
DH group: 2, Reserved: 0x0
17 f3 ab d5 b8 5b 87 35 b2 02 d2 1d f7 a8 9c f1
61 97 f6 7b 78 e6 7f 48 f9 26 84 85 27 f9 ac 82
50 95 a6 74 b8 60 a5 f3 1e ec 97 18 ad 4c 07 6c
a8 97 b1 e2 da 3d 25 16 02 11 96 ff e2 f2 3e df
cc 8b 0e 69 3b 8d 71 1a de 33 73 d6 88 8e 63 22
fc 15 47 06 ea 5d 67 59 53 92 58 53 f1 a0 20 ff
31 28 e1 db f5 c6 99 85 70 3c b1 d7 57 f5 65 00
44 ea 93 81 df a4 7e 91 9b 01 79 22 89 eb 4d 43
N Next payload: VID, reserved: 0x0, length: 24
60 70 b2 13 c1 16 7f 27 fa 35 eb 74 13 3b 72 16
15 02 c5 49
IKEv2-PROTO-5: Parse Vendor Specific Payload: CISCO-DELETE-REASON VID Next payload: VID, reserved: 0x0, length: 23
43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
53 4f 4e
IKEv2-PROTO-5: Parse Vendor Specific Payload: (CUSTOM) VID Next payload: NOTIFY, reserved: 0x0, length: 21
46 4c 45 58 56 50 4e 2d 53 55 50 50 4f 52 54 45
44
IKEv2-PROTO-5: Parse Notify Payload: NAT_DETECTION_SOURCE_IP NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
e0 e8 8b ad e2 e1 71 8c e9 ea e7 92 47 31 ab be
92 bf d6 42
IKEv2-PROTO-5: Parse Notify Payload: NAT_DETECTION_DESTINATION_IP NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: NONE, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
79 e6 74 1b c6 e5 1d 2c e0 dc e8 59 b1 c1 7e 11
eb 1d 40 64
Decrypted packet:Data: 336 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: IDLE Event: EV_RECV_INIT
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_INIT Event: EV_VERIFY_MSG
IKEv2-PROTO-3: (10): Verify SA init message
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_INIT Event: EV_INSERT_SA
IKEv2-PROTO-3: (10): Insert SA
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_INIT Event: EV_GET_IKE_POLICY
IKEv2-PROTO-3: (10): Getting configured policies
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_INIT Event: EV_PROC_MSG
IKEv2-PROTO-2: (10): Processing initial message
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_INIT Event: EV_DETECT_NAT
IKEv2-PROTO-3: (10): Process NAT discovery notify
IKEv2-PROTO-5: (10): Processing nat detect src notify
IKEv2-PROTO-5: (10): Remote address matched
IKEv2-PROTO-5: (10): Processing nat detect dst notify
IKEv2-PROTO-5: (10): Local address matched
IKEv2-PROTO-5: (10): No NAT found
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_INIT Event: EV_CHK_CONFIG_MODE
%ASA-5-750006: Local:10.10.10.10:500 Remote:10.10.10.1:500 Username:10.10.10.1 SA UP. Reason: New Connection Established
%ASA-6-113009: AAA retrieved default group policy (DfltGrpPolicy) for user = 10.10.10.1
%ASA-5-750007: Local:10.10.10.10:500 Remote:10.10.10.1:500 Username:10.10.10.1 SA DOWN. Reason: peer request
%ASA-4-113019: Group = 10.10.10.1, Username = 10.10.10.1, IP = 10.10.10.1, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_SET_POLICY
IKEv2-PROTO-3: (10): Setting configured policies
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_CHK_AUTH4PKI
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_PKI_SESH_OPEN
IKEv2-PROTO-3: (10): Opening a PKI session
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_KEY
IKEv2-PROTO-3: (10): Computing DH public key
IKEv2-PROTO-3: (10):
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_PUBKEY_RESP
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_DH_SECRET
IKEv2-PROTO-3: (10): Computing DH secret key
IKEv2-PROTO-3: (10):
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_NO_EVENT
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_OK_RECD_DH_SECRET_RESP
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GEN_SKEYID
IKEv2-PROTO-3: (10): Generate skeyid
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_BLD_INIT Event: EV_BLD_MSG
IKEv2-PROTO-2: (10): Sending initial message
IKEv2-PROTO-3: IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
AES-CBC SHA256 SHA256 DH_GROUP_1024_MODP/Group 2
IKEv2-PROTO-5: Construct Vendor Specific Payload: DELETE-REASONIKEv2-PROTO-5: Construct Vendor Specific Payload: (CUSTOM)IKEv2-PROTO-5: Construct Notify Payload: NAT_DETECTION_SOURCE_IPIKEv2-PROTO-5: Construct Notify Payload: NAT_DETECTION_DESTINATION_IPIKEv2-PROTO-5: Construct Vendor Specific Payload: FRAGMENTATIONIKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x0
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: SA, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_SA_INIT, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x0, length: 394
SA Next payload: KE, reserved: 0x0, length: 48
IKEv2-PROTO-4: last proposal: 0x0, reserved: 0x0, length: 44
Proposal: 1, Protocol id: IKE, SPI size: 0, #trans: 4
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 12
type: 1, reserved: 0x0, id: AES-CBC
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 2, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 3, reserved: 0x0, id: SHA256
IKEv2-PROTO-4: last transform: 0x0, reserved: 0x0: length: 8
type: 4, reserved: 0x0, id: DH_GROUP_1024_MODP/Group 2
KE Next payload: N, reserved: 0x0, length: 136
DH group: 2, Reserved: 0x0
d3 77 61 4d e1 17 ff 6c 35 81 70 e4 0c f9 c5 53
ac 4e 17 98 17 1e b7 bc 5c d9 d3 53 fc 63 7a 00
96 86 ba 04 1f 2a 6c 8d d6 cb e6 f8 6a 38 af d6
00 cb cb 32 d6 62 57 de 55 95 5d 0f b0 33 a4 26
08 45 de c7 6c 67 09 2d 60 93 ae 00 90 54 14 0e
cf 26 f1 57 1b 71 f4 32 0e f5 9f 01 6e db ab bd
f1 61 61 2f 16 96 6e c9 4f da eb 3b c9 59 73 9b
38 98 21 31 8b 92 26 ff 25 03 b9 17 f5 a1 45 c3
N Next payload: VID, reserved: 0x0, length: 24
5e 34 eb f3 b6 7b b5 43 d2 d3 46 fa 3c 02 b4 02
98 03 24 e5
VID Next payload: VID, reserved: 0x0, length: 23
43 49 53 43 4f 2d 44 45 4c 45 54 45 2d 52 45 41
53 4f 4e
VID Next payload: NOTIFY, reserved: 0x0, length: 59
43 49 53 43 4f 28 43 4f 50 59 52 49 47 48 54 29
26 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32
30 30 39 20 43 69 73 63 6f 20 53 79 73 74 65 6d
73 2c 20 49 6e 63 2e
NOTIFY(NAT_DETECTION_SOURCE_IP) Next payload: NOTIFY, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_SOURCE_IP
a5 dc a2 2f 94 5a ef eb fe 63 ad 0e 1c ea 54 2d
36 da 1f 31
NOTIFY(NAT_DETECTION_DESTINATION_IP) Next payload: VID, reserved: 0x0, length: 28
Security protocol id: IKE, spi size: 0, type: NAT_DETECTION_DESTINATION_IP
47 74 ce 05 74 24 a0 4e 86 3b 2c d7 26 fb 80 5a
fb f5 c0 13
VID Next payload: NONE, reserved: 0x0, length: 20
40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
IKEv2-PROTO-3: (10): Cisco DeleteReason Notify is enabled
IKEv2-PROTO-3: (10): Complete SA init exchange
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
IKEv2-PROTO-3: (10): Starting timer to wait for auth message (30 sec)
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x1
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_AUTH, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x1, length: 272
IKEv2-PROTO-5: (10): Request has mess_id 1; expected 1 through 1
REAL Decrypted packet:Data: 200 bytes
IKEv2-PROTO-5: Parse Vendor Specific Payload: (CUSTOM) VID Next payload: IDi, reserved: 0x0, length: 20
94 11 0b eb 3e 82 a8 59 15 7e 16 91 23 e2 6e 8d
IDi Next payload: AUTH, reserved: 0x0, length: 12
Id type: IPv4 address, Reserved: 0x0 0x0
0a 0a 0a 01
AUTH Next payload: SA, reserved: 0x0, length: 40
Auth method PSK, reserved: 0x0, reserved 0x0
Auth data: 32 bytes
SA Next payload: TSi, reserved: 0x0, length: 44
IKEv2-PROTO-4: last proposal: 0x0, reserved: 0x0, length: 40
Proposal: 1, Protocol id: ESP, SPI size: 4, #trans: 3
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 12
type: 1, reserved: 0x0, id: AES-CBC
IKEv2-PROTO-4: last transform: 0x3, reserved: 0x0: length: 8
type: 3, reserved: 0x0, id: SHA96
IKEv2-PROTO-4: last transform: 0x0, reserved: 0x0: length: 8
type: 5, reserved: 0x0, id:
TSi Next payload: TSr, reserved: 0x0, length: 24
Num of TSs: 1, reserved 0x0, reserved 0x0
TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
start port: 0, end port: 65535
start addr: 1.1.1.0, end addr: 1.1.1.255
TSr Next payload: NOTIFY, reserved: 0x0, length: 24
Num of TSs: 1, reserved 0x0, reserved 0x0
TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
start port: 0, end port: 65535
start addr: 3.3.3.0, end addr: 3.3.3.255
IKEv2-PROTO-5: Parse Notify Payload: INITIAL_CONTACT NOTIFY(INITIAL_CONTACT) Next payload: NOTIFY, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: INITIAL_CONTACT
IKEv2-PROTO-5: Parse Notify Payload: SET_WINDOW_SIZE NOTIFY(SET_WINDOW_SIZE) Next payload: NOTIFY, reserved: 0x0, length: 12
Security protocol id: IKE, spi size: 0, type: SET_WINDOW_SIZE
00 00 00 05
IKEv2-PROTO-5: Parse Notify Payload: ESP_TFC_NO_SUPPORT NOTIFY(ESP_TFC_NO_SUPPORT) Next payload: NOTIFY, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: ESP_TFC_NO_SUPPORT
IKEv2-PROTO-5: Parse Notify Payload: NON_FIRST_FRAGS NOTIFY(NON_FIRST_FRAGS) Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: NON_FIRST_FRAGS
Decrypted packet:Data: 272 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_RECV_AUTH
IKEv2-PROTO-3: (10): Stopping timer to wait for auth message
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_NAT_T
IKEv2-PROTO-3: (10): Check NAT discovery
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID
IKEv2-PROTO-2: (10): Recieved valid parameteres in process id
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID
IKEv2-PROTO-3: (10): Getting configured policies
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_SET_POLICY
IKEv2-PROTO-3: (10): Setting configured policies
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_VERIFY_POLICY_BY_PEERID
IKEv2-PROTO-3: (10): Verify peer's policy
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_CONFIG_MODE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_AUTH4EAP
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_POLREQEAP
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_AUTH_TYPE
IKEv2-PROTO-3: (10): Get peer authentication method
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_PRESHR_KEY
IKEv2-PROTO-3: (10): Get peer's preshared key for 10.10.10.1
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_VERIFY_AUTH
IKEv2-PROTO-3: (10): Verify authentication data
IKEv2-PROTO-3: (10): Use preshared key for id 10.10.10.1, key len 5
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_GET_CONFIG_MODE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK4_IC
IKEv2-PROTO-3: (10): Processing initial contact
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_CHK_REDIRECT
IKEv2-PROTO-5: (10): Redirect check is not needed, skipping it
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_PROC_SA_TS
IKEv2-PROTO-2: (10): Processing auth message
IKEv2-PROTO-1: (10): Failed to find a matching policy
IKEv2-PROTO-1: (10): Received Policies:
ESP: Proposal 1: AES-CBC-128 SHA96
IKEv2-PROTO-1: (10): Failed to find a matching policy
IKEv2-PROTO-1: (10): Expected Policies:
IKEv2-PROTO-5: (10): Failed to verify the proposed policies
IKEv2-PROTO-1: (10): Failed to find a matching policy
IKEv2-PROTO-1: (10):
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_NO_PROP_CHOSEN
IKEv2-PROTO-2: (10): Sending no proposal chosen notify
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_MY_AUTH_METHOD
IKEv2-PROTO-3: (10): Get my authentication method
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GET_PRESHR_KEY
IKEv2-PROTO-3: (10): Get peer's preshared key for 10.10.10.1
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_GEN_AUTH
IKEv2-PROTO-3: (10): Generate my authentication data
IKEv2-PROTO-3: (10): Use preshared key for id 10.10.10.10, key len 5
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_CHK4_SIGN
IKEv2-PROTO-3: (10): Get my authentication method
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_OK_AUTH_GEN
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: R_BLD_AUTH Event: EV_SEND_AUTH
IKEv2-PROTO-2: (10): Sending auth message
IKEv2-PROTO-5: Construct Vendor Specific Payload: CISCO-GRANITEIKEv2-PROTO-5: Construct Notify Payload: NO_PROPOSAL_CHOSENIKEv2-PROTO-3: (10): Building packet for encryption; contents are:
VID Next payload: IDr, reserved: 0x0, length: 20
7a 17 33 a7 1a 04 af 61 15 7e 16 91 23 e2 6e 8d
IDr Next payload: AUTH, reserved: 0x0, length: 12
Id type: IPv4 address, Reserved: 0x0 0x0
0a 0a 0a 0a
AUTH Next payload: NOTIFY, reserved: 0x0, length: 40
Auth method PSK, reserved: 0x0, reserved 0x0
Auth data: 32 bytes
NOTIFY(NO_PROPOSAL_CHOSEN) Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, type: NO_PROPOSAL_CHOSEN
IKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x1
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x1, length: 160
ENCR Next payload: VID, reserved: 0x0, length: 132
Encrypted data: 128 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_OK
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_PKI_SESH_CLOSE
IKEv2-PROTO-3: (10): Closing the PKI session
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_INSERT_IKE
IKEv2-PROTO-2: (10): SA created; inserting SA into database
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_REGISTER_SESSION
IKEv2-PROTO-3: (10):
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_NO_EVENT
IKEv2-PROTO-3: (10): Initializing DPD, configured for 10 seconds
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_RECD_REGISTER_SESSION_RESP
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHECK_DUPE
IKEv2-PROTO-3: (10): Checking for duplicate SA
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: READY Event: EV_R_UPDATE_CAC_STATS
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: READY Event: EV_R_OK
IKEv2-PROTO-3: (10): Starting timer to delete negotiation context
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000001 CurState: READY Event: EV_NO_EVENT
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x2
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x2, length: 80
IKEv2-PROTO-5: (10): Request has mess_id 2; expected 2 through 2
REAL Decrypted packet:Data: 12 bytes
DELETE Next payload: NONE, reserved: 0x0, length: 12
Security protocol id: ESP, spi size: 4, num of spi: 1
0a a3 b4 ec
Decrypted packet:Data: 80 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-3: (10): Building packet for encryption; contents are:
IKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x2
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x2, length: 80
ENCR Next payload: NONE, reserved: 0x0, length: 52
Encrypted data: 48 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: INFO_R Event: EV_RECV_DEL
IKEv2-PROTO-2: (10): Process delete request from peer
IKEv2-PROTO-5: Trying to remove child SA with spi ECB4A30A
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: INFO_R Event: EV_CHK4_ACTIVE_SA
IKEv2-PROTO-3: (10): Check for existing active SA
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-5: (10): Sent response with message id 2, Requests can be accepted from range 3 to 3
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-3: Rx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x3
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: INITIATOR
IKEv2-PROTO-4: Message id: 0x3, length: 80
IKEv2-PROTO-5: (10): Request has mess_id 3; expected 3 through 3
REAL Decrypted packet:Data: 8 bytes
DELETE Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, num of spi: 0
Decrypted packet:Data: 80 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: READY Event: EV_RECV_INFO_REQ
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_RECV_INFO_REQ
IKEv2-PROTO-3: (10): Building packet for encryption; contents are:
DELETE Next payload: NONE, reserved: 0x0, length: 8
Security protocol id: IKE, spi size: 0, num of spi: 0
IKEv2-PROTO-3: Tx [L 10.10.10.10:500/R 10.10.10.1:500/VRF i0:f0] m_id: 0x3
IKEv2-PROTO-3: HDR[i:95110AEB2DB55B1E - r: 781732A709335C26]
IKEv2-PROTO-4: IKEV2 HDR ispi: 95110AEB2DB55B1E - rspi: 781732A709335C26
IKEv2-PROTO-4: Next payload: ENCR, version: 2.0
IKEv2-PROTO-4: Exchange type: INFORMATIONAL, flags: RESPONDER MSG-RESPONSE
IKEv2-PROTO-4: Message id: 0x3, length: 80
ENCR Next payload: DELETE, reserved: 0x0, length: 52
Encrypted data: 48 bytes
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_CHK_INFO_TYPE
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_RECV_DEL
IKEv2-PROTO-2: (10): Process delete request from peer
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_CHK4_ACTIVE_SA
IKEv2-PROTO-3: (10): Check for existing active SA
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_STOP_ACCT
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_TERM_CONN
IKEv2-PROTO-3: (10): Delete all IKE SAs
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: INFO_R Event: EV_START_DEL_NEG_TMR
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: EXIT Event: EV_CHK_PENDING
IKEv2-PROTO-5: (10): Sent response with message id 3, Requests can be accepted from range 4 to 4
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000003 CurState: EXIT Event: EV_NO_EVENT
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (R) MsgID = 00000002 CurState: EXIT Event: EV_FREE_NEG
IKEv2-PROTO-5: (10): Deleting negotiation context for peer message ID: 0x2
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (I) MsgID = 00000001 CurState: READY Event: EV_RECV_DEL
IKEv2-PROTO-5: (10): Action: Action_Null
IKEv2-PROTO-5: (10): SM Trace-> SA: I_SPI=95110AEB2DB55B1E R_SPI=781732A709335C26 (I) MsgID = 00000001 CurState: DELETE Event: EV_FREE_SA
IKEv2-PROTO-3: (10): Deleting SA
R1 Debug:
R1#debug crypto ikev2
*Feb 25 23:01:45.251: %SYS-5-CONFIG_I: Configured from console by console
R1#ping 3.3.3.3 source 1.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds:
Packet sent with a source address of 1.1.1.1
.....
Success rate is 0 percent (0/5)
R1#
*Feb 25 23:01:49.227: IKEv2:% Getting preshared key from profile keyring KEY
*Feb 25 23:01:49.227: IKEv2:% Matched peer block 'ASA1'
*Feb 25 23:01:49.227: IKEv2:Searching Policy with fvrf 0, local address 10.10.10.1
*Feb 25 23:01:49.227: IKEv2:Found Policy 'TEST'
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 2
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):Request queued for computation of DH key
*Feb 25 23:01:49.227: IKEv2:IKEv2 initiator - no config data to send in IKE_SA_INIT exch
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):Generating IKE_SA_INIT message
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
AES-CBC SHA256 SHA256 DH_GROUP_1024_MODP/Group 2
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)
*Feb 25 23:01:49.227: IKEv2:(SA ID = 1):Insert SA
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) VID
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):Verify SA init message
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):Checking NAT discovery
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):NAT not found
*Feb 25 23:01:49.231: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 2
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Request queued for computation of DH secret
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Completed SA init exchange
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Check for EAP exchange
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Generate my authentication data
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Use preshared key for id 10.10.10.3, key len 5
*Feb 25 23:01:49.255: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
*Feb 25 23:01:49.255: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Get my authentication method
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):My authentication method is 'PSK'
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Check for EAP exchange
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Generating IKE_AUTH message
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Constructing IDi payload: '10.10.10.3' of type 'IPv4 address'
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
AES-CBC SHA96 Don't use ESN
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Building packet for encryption.
Payload contents:
VID IDi AUTH SA TSi TSr NOTIFY(INITIAL_CONTACT) NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)
*Feb 25 23:01:49.255: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 1
IKEv2 IKE_AUTH Exchange REQUEST
Payload contents:
ENCR
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents:
VID IDr AUTH NOTIFY(NO_PROPOSAL_CHOSEN)
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Process auth response notify
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Searching policy based on peer's identity '10.10.10.10' of type 'IPv4 address'
*Feb 25 23:01:49.259: IKEv2:Searching Policy with fvrf 0, local address 10.10.10.1
*Feb 25 23:01:49.259: IKEv2:Found Policy 'TEST'
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Verify peer's policy
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Peer's policy verified
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Get peer's authentication method
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Peer's authentication method is 'PSK'
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Get peer's preshared key for 10.10.10.10
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Verify peer's authentication data
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Use preshared key for id 10.10.10.10, key len 5
*Feb 25 23:01:49.259: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
*Feb 25 23:01:49.259: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Verification of peer's authenctication data PASSED
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Check for EAP exchange
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started
*Feb 25 23:01:49.259: IKEv2:(SA ID = 1):Session with IKE ID PAIR (10.10.10.10, 10.10.10.3) is UP
*Feb 25 23:01:49.263: IKEv2:IKEv2 MIB tunnel started, tunnel index 1
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Checking for duplicate IKEv2 SA
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):No duplicate IKEv2 SA found
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Queuing IKE SA delete request reason: unknown
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Sending DELETE INFO message for IPsec SA [SPI: 0x5608A108]
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Building packet for encryption.
Payload contents:
DELETE
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Checking if request will fit in peer window
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 2
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
ENCR
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Check for existing IPSEC SA
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Delete all IKE SAs
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Sending DELETE INFO message for IKEv2 SA [ISPI: 0x48746602F5031812 RSPI: 0x9F8132B6DDF29858]
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Building packet for encryption.
Payload contents:
DELETE
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Checking if request will fit in peer window
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Check for existing active SA
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Delete all IKE SAs
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 2
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Processing ACK to informational exchange
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Check for existing IPSEC SA
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Delete all IKE SAs
*Feb 25 23:01:49.263: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 3
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
ENCR
*Feb 25 23:01:49.267: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 48746602F5031812 - Responder SPI : 9F8132B6DDF29858 Message id: 3
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:
DELETE
*Feb 25 23:01:49.267: IKEv2:(SA ID = 1):Processing ACK to informational exchange
*Feb 25 23:01:49.267: IKEv2:(SA ID = 1):Deleting SA
R1#
*Feb 25 23:02:19.227: IKEv2:% Getting preshared key from profile keyring KEY
*Feb 25 23:02:19.227: IKEv2:% Matched peer block 'ASA1'
*Feb 25 23:02:19.227: IKEv2:Searching Policy with fvrf 0, local address 10.10.10.1
*Feb 25 23:02:19.227: IKEv2:Found Policy 'TEST'
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 2
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):Request queued for computation of DH key
*Feb 25 23:02:19.227: IKEv2:IKEv2 initiator - no config data to send in IKE_SA_INIT exch
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):Generating IKE_SA_INIT message
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
AES-CBC SHA256 SHA256 DH_GROUP_1024_MODP/Group 2
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)
*Feb 25 23:02:19.227: IKEv2:(SA ID = 1):Insert SA
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) VID
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):Verify SA init message
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):Processing IKE_SA_INIT message
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):Checking NAT discovery
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):NAT not found
*Feb 25 23:02:19.231: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 2
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Request queued for computation of DH secret
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Completed SA init exchange
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Check for EAP exchange
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Generate my authentication data
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Use preshared key for id 10.10.10.3, key len 5
*Feb 25 23:02:19.255: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
*Feb 25 23:02:19.255: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Get my authentication method
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):My authentication method is 'PSK'
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Check for EAP exchange
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Generating IKE_AUTH message
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Constructing IDi payload: '10.10.10.3' of type 'IPv4 address'
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
AES-CBC SHA96 Don't use ESN
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Building packet for encryption.
Payload contents:
VID IDi AUTH SA TSi TSr NOTIFY(INITIAL_CONTACT) NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)
*Feb 25 23:02:19.255: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 1
IKEv2 IKE_AUTH Exchange REQUEST
Payload contents:
ENCR
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents:
VID IDr AUTH NOTIFY(NO_PROPOSAL_CHOSEN)
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Process auth response notify
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Searching policy based on peer's identity '10.10.10.10' of type 'IPv4 address'
*Feb 25 23:02:19.259: IKEv2:Searching Policy with fvrf 0, local address 10.10.10.1
*Feb 25 23:02:19.259: IKEv2:Found Policy 'TEST'
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Verify peer's policy
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Peer's policy verified
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Get peer's authentication method
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Peer's authentication method is 'PSK'
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Get peer's preshared key for 10.10.10.10
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Verify peer's authentication data
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Use preshared key for id 10.10.10.10, key len 5
*Feb 25 23:02:19.259: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
*Feb 25 23:02:19.259: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Verification of peer's authenctication data PASSED
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Check for EAP exchange
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Session with IKE ID PAIR (10.10.10.10, 10.10.10.3) is UP
*Feb 25 23:02:19.259: IKEv2:IKEv2 MIB tunnel started, tunnel index 1
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Checking for duplicate IKEv2 SA
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):No duplicate IKEv2 SA found
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Queuing IKE SA delete request reason: unknown
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Sending DELETE INFO message for IPsec SA [SPI: 0xB266654B]
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Building packet for encryption.
Payload contents:
DELETE
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Checking if request will fit in peer window
*Feb 25 23:02:19.259: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 2
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
ENCR
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Check for existing IPSEC SA
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Delete all IKE SAs
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Sending DELETE INFO message for IKEv2 SA [ISPI: 0x8E39F3B81DD7B834 RSPI: 0x9440A6ADAB3F206E]
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Building packet for encryption.
Payload contents:
DELETE
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Checking if request will fit in peer window
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Check for existing active SA
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Delete all IKE SAs
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 2
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Processing ACK to informational exchange
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Check for existing IPSEC SA
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Delete all IKE SAs
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Sending Packet [To 10.10.10.10:500/From 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 3
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents:
ENCR
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Received Packet [From 10.10.10.10:500/To 10.10.10.1:500/VRF i0:f0]
Initiator SPI : 8E39F3B81DD7B834 - Responder SPI : 9440A6ADAB3F206E Message id: 3
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents:
DELETE
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Processing ACK to informational exchange
*Feb 25 23:02:19.263: IKEv2:(SA ID = 1):Deleting SA
R1#