Community discussions

MikroTik App
 
dschn
newbie
Topic Author
Posts: 25
Joined: Wed Nov 16, 2016 2:22 pm

IPSec phase2 won't work - failed to get sainfo

Wed Dec 21, 2016 2:59 pm

Hi all,

I successfully built an IPSec connection from my Mikrotik router to a Cisco Meraki MX400 appliance. Unfortunately I can't get any traffic through, I get the following errors in the Meraki log file:

msg: failed to pre-process ph2 packet (side: 1, status: 1).
msg: failed to get sainfo.

I specified 192.168.88.0/24 as destination subnet on the MX appliance, and 10.24.0.0/24 as destination subnet in the ipsec policy. As I understand 'failed to get sainfo' means there is a mismatch in the subnet configurations on both peers, but there isn't as far as I can see it?
 
User avatar
mrz
MikroTik Support
MikroTik Support
Posts: 7169
Joined: Wed Feb 07, 2007 12:45 pm
Location: Latvia
Contact:

Re: IPSec phase2 won't work - failed to get sainfo

Wed Dec 21, 2016 3:02 pm

This could mean also that other phase2 (proposal) parameters may be mismatched.

More detailed logs would be more helpful.
 
dschn
newbie
Topic Author
Posts: 25
Joined: Wed Nov 16, 2016 2:22 pm

Re: IPSec phase2 won't work - failed to get sainfo

Wed Dec 21, 2016 3:16 pm

Can I do a verbose log on the mikrotik router, and if so, how?
 
User avatar
mrz
MikroTik Support
MikroTik Support
Posts: 7169
Joined: Wed Feb 07, 2007 12:45 pm
Location: Latvia
Contact:

Re: IPSec phase2 won't work - failed to get sainfo

Wed Dec 21, 2016 3:17 pm

Go to system logging menu ad add ipsec there.
 
dschn
newbie
Topic Author
Posts: 25
Joined: Wed Nov 16, 2016 2:22 pm

Re: IPSec phase2 won't work - failed to get sainfo

Thu Dec 22, 2016 8:24 am

Okay thanks, I have some ipsec debug info now. Short explanation: xx.xx.xx.xx is the public IP of the meraki appliance. 10.24.6.76 is the mikrotik public IP on ether1. 10.24.0.203 is a client within the peers subnet I want to ping from my client behind the mikrotik router with the IP 192.168.88.44. I also connected the miktrotik appliance directly to the cablemodem, so I had a 'real' public IP - with the same results. The Phase 1 connection seems okay, because meraki shows a green light in the dashboard and the meraki log shows that a connection has been established, but I can't get any packets through the tunnel. Also when I have a look unter 'Installed SAs' in winbox I can see that there are connections, but without encryption?
16:01:38 ipsec,debug,packet 67cfd2f7 59022c0e e3b4c133 9b485545 
16:01:38 ipsec,debug,packet encryption(aes) 
16:01:38 ipsec,debug,packet IV was saved for next processing: 
16:01:38 ipsec,debug,packet 19f48f2b 21343793 b8ff9e90 68f86b00 
16:01:38 ipsec,debug,packet encryption(aes) 
16:01:38 ipsec,debug,packet with key: 
16:01:38 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:38 ipsec,debug,packet decrypted payload by IV: 
16:01:38 ipsec,debug,packet 67cfd2f7 59022c0e e3b4c133 9b485545 
16:01:38 ipsec,debug,packet decrypted payload, but not trimed. 
16:01:38 ipsec,debug,packet 0b000018 769fcbdb 008bc74c e75a8a3c 6f248ef2 6e16461d 00000020 00000001 
16:01:38 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 00000325 8df3bf98 c1c9f907 
16:01:38 ipsec,debug,packet padding len=8 
16:01:38 ipsec,debug,packet skip to trim padding. 
16:01:38 ipsec,debug,packet decrypted. 
16:01:38 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 ba4964ac 0000005c 0b000018 
16:01:38 ipsec,debug,packet 769fcbdb 008bc74c e75a8a3c 6f248ef2 6e16461d 00000020 00000001 01108d28 
16:01:38 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 00000325 8df3bf98 c1c9f907 
16:01:38 ipsec,debug,packet HASH with: 
16:01:38 ipsec,debug,packet ba4964ac 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:38 ipsec,debug,packet 00000325 
16:01:38 ipsec,debug,packet hmac(hmac_sha1) 
16:01:38 ipsec,debug,packet HASH computed: 
16:01:38 ipsec,debug,packet 769fcbdb 008bc74c e75a8a3c 6f248ef2 6e16461d 
16:01:38 ipsec,debug,packet hash validated. 
16:01:38 ipsec,debug,packet begin. 
16:01:38 ipsec,debug,packet seen nptype=8(hash) len=24 
16:01:38 ipsec,debug,packet seen nptype=11(notify) len=32 
16:01:38 ipsec,debug,packet succeed. 
16:01:38 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:01:38 ipsec,debug,packet compute IV for phase2 
16:01:38 ipsec,debug,packet phase1 last IV: 
16:01:38 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 dbfd5645 
16:01:38 ipsec,debug,packet hash(sha1) 
16:01:38 ipsec,debug,packet encryption(aes) 
16:01:38 ipsec,debug,packet phase2 IV computed: 
16:01:38 ipsec,debug,packet 3bb849c5 fad468ae 8d333e02 c6435537 
16:01:38 ipsec,debug,packet HASH with: 
16:01:38 ipsec,debug,packet dbfd5645 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:38 ipsec,debug,packet 00000325 
16:01:38 ipsec,debug,packet hmac(hmac_sha1) 
16:01:38 ipsec,debug,packet HASH computed: 
16:01:38 ipsec,debug,packet ac966616 57c586f5 6367ffea dc554401 08d28a7a 
16:01:38 ipsec,debug,packet begin encryption. 
16:01:38 ipsec,debug,packet encryption(aes) 
16:01:38 ipsec,debug,packet pad length = 8 
16:01:38 ipsec,debug,packet 0b000018 ac966616 57c586f5 6367ffea dc554401 08d28a7a 00000020 00000001 
16:01:38 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 00000325 b1511faf e966e707 
16:01:38 ipsec,debug,packet encryption(aes) 
16:01:38 ipsec,debug,packet with key: 
16:01:38 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:38 ipsec,debug,packet encrypted payload by IV: 
16:01:38 ipsec,debug,packet 3bb849c5 fad468ae 8d333e02 c6435537 
16:01:38 ipsec,debug,packet save IV for next: 
16:01:38 ipsec,debug,packet 10827b09 332d9f37 2a14e9a7 bb6fe465 
16:01:38 ipsec,debug,packet encrypted. 
16:01:38 ipsec,debug,packet Adding NON-ESP marker 
16:01:38 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:01:38 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:38 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:38 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:38 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:38 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:38 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:38 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 dbfd5645 0000005c 
16:01:38 ipsec,debug,packet bf8574fd 8f08a1ba 5e9e836f aacda6c8 869b4b8f 33c9a2f8 700616c6 e0873898 
16:01:38 ipsec,debug,packet 74aee916 073e1721 e05e43b0 b618d604 10827b09 332d9f37 2a14e9a7 bb6fe465 
16:01:38 ipsec,debug,packet sendto Information notify. 
16:01:38 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:01:40 ipsec,debug,packet Adding NON-ESP marker 
16:01:40 ipsec,debug,packet 224 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:40 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:40 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:40 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet 1 times of 224 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08102001 bba412c5 000000dc 
16:01:40 ipsec,debug,packet 4996d481 5b9ba1da 7e3b07e5 79ba6032 b136984d 091e60ad 23af625c 2c2bd8db 
16:01:40 ipsec,debug,packet 77cfa93e cc945676 f6da7da6 177102ce b19f5278 4f884529 9221bba0 a8cc1ce3 
16:01:40 ipsec,debug,packet 9dabcc31 312b2cb6 e4f43118 ddf3eff5 f02e53d6 3589ea04 9c94a697 ba0ecde9 
16:01:40 ipsec,debug,packet 66cf2a94 3d8a44fd 0f2ae931 74a32ed2 e9f3850a a616c9b0 f72e0f0d 1728b024 
16:01:40 ipsec,debug,packet c65f96e8 da84256f 93ab9555 2f754341 33da2cf8 f1ba8e8d 207a069b 653924ca 
16:01:40 ipsec,debug,packet 7620745d 965d896a b6bb58fa 0ef859d4 41653311 14c08832 93963495 6de2cbaf 
16:01:40 ipsec,debug resent phase2 packet 10.24.6.76[4500]<=>xx.xx.xx.xx[4500] c668012ab987f620:8bda57eb2a17dbe1:bba412c5 
16:01:40 ipsec,debug,packet KA: 10.24.6.76[4500]->xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:40 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:40 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:40 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet 1 times of 1 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:40 ipsec,debug,packet ff 
16:01:48 ipsec,debug,packet ========== 
16:01:48 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:01:48 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 c3cde8cf 0000005c 155a42a3 
16:01:48 ipsec,debug,packet fb46e4d5 3f3c8f95 aafcfbd7 8f1e1bd3 90042e21 ee55283d 5518c643 3ee251ff 
16:01:48 ipsec,debug,packet 4f39bd8b f3a40fd1 e336b7e7 40ab96af d5583a66 7f680cf8 147041e3 
16:01:48 ipsec,debug,packet receive Information. 
16:01:48 ipsec,debug,packet compute IV for phase2 
16:01:48 ipsec,debug,packet phase1 last IV: 
16:01:48 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 c3cde8cf 
16:01:48 ipsec,debug,packet hash(sha1) 
16:01:48 ipsec,debug,packet encryption(aes) 
16:01:48 ipsec,debug,packet phase2 IV computed: 
16:01:48 ipsec,debug,packet 295821f6 c6b5744d cf9b235d 8818c80f 
16:01:48 ipsec,debug,packet encryption(aes) 
16:01:48 ipsec,debug,packet IV was saved for next processing: 
16:01:48 ipsec,debug,packet 40ab96af d5583a66 7f680cf8 147041e3 
16:01:48 ipsec,debug,packet encryption(aes) 
16:01:48 ipsec,debug,packet with key: 
16:01:48 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:48 ipsec,debug,packet decrypted payload by IV: 
16:01:48 ipsec,debug,packet 295821f6 c6b5744d cf9b235d 8818c80f 
16:01:48 ipsec,debug,packet decrypted payload, but not trimed. 
16:01:48 ipsec,debug,packet 0b000018 0ccb63f1 8c7b359a eed4ed8a 86a3b31a d98746a9 00000020 00000001 
16:01:48 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 00000326 8e879de3 e2bb9d07 
16:01:48 ipsec,debug,packet padding len=8 
16:01:48 ipsec,debug,packet skip to trim padding. 
16:01:48 ipsec,debug,packet decrypted. 
16:01:48 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 c3cde8cf 0000005c 0b000018 
16:01:48 ipsec,debug,packet 0ccb63f1 8c7b359a eed4ed8a 86a3b31a d98746a9 00000020 00000001 01108d28 
16:01:48 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 00000326 8e879de3 e2bb9d07 
16:01:48 ipsec,debug,packet HASH with: 
16:01:48 ipsec,debug,packet c3cde8cf 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:48 ipsec,debug,packet 00000326 
16:01:48 ipsec,debug,packet hmac(hmac_sha1) 
16:01:48 ipsec,debug,packet HASH computed: 
16:01:48 ipsec,debug,packet 0ccb63f1 8c7b359a eed4ed8a 86a3b31a d98746a9 
16:01:48 ipsec,debug,packet hash validated. 
16:01:48 ipsec,debug,packet begin. 
16:01:48 ipsec,debug,packet seen nptype=8(hash) len=24 
16:01:48 ipsec,debug,packet seen nptype=11(notify) len=32 
16:01:48 ipsec,debug,packet succeed. 
16:01:48 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:01:48 ipsec,debug,packet compute IV for phase2 
16:01:48 ipsec,debug,packet phase1 last IV: 
16:01:48 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 e19c6385 
16:01:48 ipsec,debug,packet hash(sha1) 
16:01:48 ipsec,debug,packet encryption(aes) 
16:01:48 ipsec,debug,packet phase2 IV computed: 
16:01:48 ipsec,debug,packet 9a607368 2a1603da c5fd164c 3e7aa583 
16:01:48 ipsec,debug,packet HASH with: 
16:01:48 ipsec,debug,packet e19c6385 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:48 ipsec,debug,packet 00000326 
16:01:48 ipsec,debug,packet hmac(hmac_sha1) 
16:01:48 ipsec,debug,packet HASH computed: 
16:01:48 ipsec,debug,packet d7f9a1a1 8a845d45 794039cb a1703a9a e1690539 
16:01:48 ipsec,debug,packet begin encryption. 
16:01:48 ipsec,debug,packet encryption(aes) 
16:01:48 ipsec,debug,packet pad length = 8 
16:01:48 ipsec,debug,packet 0b000018 d7f9a1a1 8a845d45 794039cb a1703a9a e1690539 00000020 00000001 
16:01:48 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 00000326 c9bda35f fe9eef07 
16:01:48 ipsec,debug,packet encryption(aes) 
16:01:48 ipsec,debug,packet with key: 
16:01:48 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:48 ipsec,debug,packet encrypted payload by IV: 
16:01:48 ipsec,debug,packet 9a607368 2a1603da c5fd164c 3e7aa583 
16:01:48 ipsec,debug,packet save IV for next: 
16:01:48 ipsec,debug,packet 34c94918 29959004 4edbde98 d185b580 
16:01:48 ipsec,debug,packet encrypted. 
16:01:48 ipsec,debug,packet Adding NON-ESP marker 
16:01:48 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:01:48 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:48 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:48 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:48 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:48 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:48 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:48 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 e19c6385 0000005c 
16:01:48 ipsec,debug,packet 40154f49 52df3e91 fb54c992 1a15b80c f6f9b660 72e93b00 a01ac79e 254415f3 
16:01:48 ipsec,debug,packet db099805 bb6e3a21 249daccb 2ab408ec 34c94918 29959004 4edbde98 d185b580 
16:01:48 ipsec,debug,packet sendto Information notify. 
16:01:48 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:01:50 ipsec,debug,packet Adding NON-ESP marker 
16:01:50 ipsec,debug,packet 224 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:01:50 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:50 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:50 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:50 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:50 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:50 ipsec,debug,packet 1 times of 224 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:50 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08102001 bba412c5 000000dc 
16:01:50 ipsec,debug,packet 4996d481 5b9ba1da 7e3b07e5 79ba6032 b136984d 091e60ad 23af625c 2c2bd8db 
16:01:50 ipsec,debug,packet 77cfa93e cc945676 f6da7da6 177102ce b19f5278 4f884529 9221bba0 a8cc1ce3 
16:01:50 ipsec,debug,packet 9dabcc31 312b2cb6 e4f43118 ddf3eff5 f02e53d6 3589ea04 9c94a697 ba0ecde9 
16:01:50 ipsec,debug,packet 66cf2a94 3d8a44fd 0f2ae931 74a32ed2 e9f3850a a616c9b0 f72e0f0d 1728b024 
16:01:50 ipsec,debug,packet c65f96e8 da84256f 93ab9555 2f754341 33da2cf8 f1ba8e8d 207a069b 653924ca 
16:01:50 ipsec,debug,packet 7620745d 965d896a b6bb58fa 0ef859d4 41653311 14c08832 93963495 6de2cbaf 
16:01:50 ipsec,debug resent phase2 packet 10.24.6.76[4500]<=>xx.xx.xx.xx[4500] c668012ab987f620:8bda57eb2a17dbe1:bba412c5 
16:01:57 ipsec,debug,packet xx.xx.xx.xx DPD monitoring.... 
16:01:57 ipsec,debug,packet compute IV for phase2 
16:01:57 ipsec,debug,packet phase1 last IV: 
16:01:57 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 c38ebc58 
16:01:57 ipsec,debug,packet hash(sha1) 
16:01:57 ipsec,debug,packet encryption(aes) 
16:01:57 ipsec,debug,packet phase2 IV computed: 
16:01:57 ipsec,debug,packet 91dfb004 e43f5ac1 e254473e 68070610 
16:01:57 ipsec,debug,packet HASH with: 
16:01:57 ipsec,debug,packet c38ebc58 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:57 ipsec,debug,packet 00000568 
16:01:57 ipsec,debug,packet hmac(hmac_sha1) 
16:01:57 ipsec,debug,packet HASH computed: 
16:01:57 ipsec,debug,packet 407f515b e65b2071 861dadb2 5c27a4eb e1eded0a 
16:01:57 ipsec,debug,packet begin encryption. 
16:01:57 ipsec,debug,packet encryption(aes) 
16:01:57 ipsec,debug,packet pad length = 8 
16:01:57 ipsec,debug,packet 0b000018 407f515b e65b2071 861dadb2 5c27a4eb e1eded0a 00000020 00000001 
16:01:57 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 00000568 79fb82d2 84067407 
16:01:57 ipsec,debug,packet encryption(aes) 
16:01:57 ipsec,debug,packet with key: 
16:01:57 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:57 ipsec,debug,packet encrypted payload by IV: 
16:01:57 ipsec,debug,packet 91dfb004 e43f5ac1 e254473e 68070610 
16:01:57 ipsec,debug,packet save IV for next: 
16:01:57 ipsec,debug,packet 568141bd b2096027 3e274cb6 8d4e589c 
16:01:57 ipsec,debug,packet encrypted. 
16:01:57 ipsec,debug,packet Adding NON-ESP marker 
16:01:57 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:01:57 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:57 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:57 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:57 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:57 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:57 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:57 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 c38ebc58 0000005c 
16:01:57 ipsec,debug,packet 9dd17f53 21c1784a 1e7c49f5 5a826069 ae430cad 554b2247 18c13de5 27e07e2c 
16:01:57 ipsec,debug,packet 0fa8a493 16beee93 12d99ded e3857132 568141bd b2096027 3e274cb6 8d4e589c 
16:01:57 ipsec,debug,packet sendto Information notify. 
16:01:57 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There sent (0) 
16:01:57 ipsec,debug,packet xx.xx.xx.xx rescheduling send_r_u (5). 
16:01:57 ipsec,debug,packet ========== 
16:01:57 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:01:57 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 a157397d 0000005c 9e04a31f 
16:01:57 ipsec,debug,packet 3189a123 45cb8d20 3b70a5aa 23e6ea26 ebf69108 5344677c 06a2eaa1 573e0e88 
16:01:57 ipsec,debug,packet d87a152e 475d267c feeb224f 47c112ea f848c8f1 d314a9d1 6014e4bc 
16:01:57 ipsec,debug,packet receive Information. 
16:01:57 ipsec,debug,packet compute IV for phase2 
16:01:57 ipsec,debug,packet phase1 last IV: 
16:01:57 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 a157397d 
16:01:57 ipsec,debug,packet hash(sha1) 
16:01:57 ipsec,debug,packet encryption(aes) 
16:01:57 ipsec,debug,packet phase2 IV computed: 
16:01:57 ipsec,debug,packet d7b6fa2f 6cf68509 c9c4ab69 fe029c73 
16:01:57 ipsec,debug,packet encryption(aes) 
16:01:57 ipsec,debug,packet IV was saved for next processing: 
16:01:57 ipsec,debug,packet 47c112ea f848c8f1 d314a9d1 6014e4bc 
16:01:57 ipsec,debug,packet encryption(aes) 
16:01:57 ipsec,debug,packet with key: 
16:01:57 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:57 ipsec,debug,packet decrypted payload by IV: 
16:01:57 ipsec,debug,packet d7b6fa2f 6cf68509 c9c4ab69 fe029c73 
16:01:57 ipsec,debug,packet decrypted payload, but not trimed. 
16:01:57 ipsec,debug,packet 0b000018 4ee93408 c017bd05 a247efb1 c3591f14 6e1ffe75 00000020 00000001 
16:01:57 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 00000568 dbb7f7aa 99b3ad07 
16:01:57 ipsec,debug,packet padding len=8 
16:01:57 ipsec,debug,packet skip to trim padding. 
16:01:57 ipsec,debug,packet decrypted. 
16:01:57 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 a157397d 0000005c 0b000018 
16:01:57 ipsec,debug,packet 4ee93408 c017bd05 a247efb1 c3591f14 6e1ffe75 00000020 00000001 01108d29 
16:01:57 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 00000568 dbb7f7aa 99b3ad07 
16:01:57 ipsec,debug,packet HASH with: 
16:01:57 ipsec,debug,packet a157397d 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:57 ipsec,debug,packet 00000568 
16:01:57 ipsec,debug,packet hmac(hmac_sha1) 
16:01:57 ipsec,debug,packet HASH computed: 
16:01:57 ipsec,debug,packet 4ee93408 c017bd05 a247efb1 c3591f14 6e1ffe75 
16:01:57 ipsec,debug,packet hash validated. 
16:01:57 ipsec,debug,packet begin. 
16:01:57 ipsec,debug,packet seen nptype=8(hash) len=24 
16:01:57 ipsec,debug,packet seen nptype=11(notify) len=32 
16:01:57 ipsec,debug,packet succeed. 
16:01:57 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There-Ack received 
16:01:57 ipsec,debug,packet received an R-U-THERE-ACK 
16:01:58 ipsec,debug,packet ========== 
16:01:58 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:01:58 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 c94a7dbd 0000005c 3eb7c2a8 
16:01:58 ipsec,debug,packet 3032dc48 76fa1330 8d88bb2f 23d81706 9f0cfe83 1d58a8a7 60c3fbe1 bc731baf 
16:01:58 ipsec,debug,packet 50156dbf b9095d53 7afa6c50 bca57277 afa5a3ca de30d8af 48a6bde9 
16:01:58 ipsec,debug,packet receive Information. 
16:01:58 ipsec,debug,packet compute IV for phase2 
16:01:58 ipsec,debug,packet phase1 last IV: 
16:01:58 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 c94a7dbd 
16:01:58 ipsec,debug,packet hash(sha1) 
16:01:58 ipsec,debug,packet encryption(aes) 
16:01:58 ipsec,debug,packet phase2 IV computed: 
16:01:58 ipsec,debug,packet c33be169 692ac1a8 9180b0dd 150192e8 
16:01:58 ipsec,debug,packet encryption(aes) 
16:01:58 ipsec,debug,packet IV was saved for next processing: 
16:01:58 ipsec,debug,packet bca57277 afa5a3ca de30d8af 48a6bde9 
16:01:58 ipsec,debug,packet encryption(aes) 
16:01:58 ipsec,debug,packet with key: 
16:01:58 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:58 ipsec,debug,packet decrypted payload by IV: 
16:01:58 ipsec,debug,packet c33be169 692ac1a8 9180b0dd 150192e8 
16:01:58 ipsec,debug,packet decrypted payload, but not trimed. 
16:01:58 ipsec,debug,packet 0b000018 f0ab91f9 d368ee55 ed12c154 6da10dbb 49d75aa1 00000020 00000001 
16:01:58 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 00000327 cafca4bb 94f79807 
16:01:58 ipsec,debug,packet padding len=8 
16:01:58 ipsec,debug,packet skip to trim padding. 
16:01:58 ipsec,debug,packet decrypted. 
16:01:58 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 c94a7dbd 0000005c 0b000018 
16:01:58 ipsec,debug,packet f0ab91f9 d368ee55 ed12c154 6da10dbb 49d75aa1 00000020 00000001 01108d28 
16:01:58 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 00000327 cafca4bb 94f79807 
16:01:58 ipsec,debug,packet HASH with: 
16:01:58 ipsec,debug,packet c94a7dbd 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:58 ipsec,debug,packet 00000327 
16:01:58 ipsec,debug,packet hmac(hmac_sha1) 
16:01:58 ipsec,debug,packet HASH computed: 
16:01:58 ipsec,debug,packet f0ab91f9 d368ee55 ed12c154 6da10dbb 49d75aa1 
16:01:58 ipsec,debug,packet hash validated. 
16:01:58 ipsec,debug,packet begin. 
16:01:58 ipsec,debug,packet seen nptype=8(hash) len=24 
16:01:58 ipsec,debug,packet seen nptype=11(notify) len=32 
16:01:58 ipsec,debug,packet succeed. 
16:01:58 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:01:58 ipsec,debug,packet compute IV for phase2 
16:01:58 ipsec,debug,packet phase1 last IV: 
16:01:58 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 9f984454 
16:01:58 ipsec,debug,packet hash(sha1) 
16:01:58 ipsec,debug,packet encryption(aes) 
16:01:58 ipsec,debug,packet phase2 IV computed: 
16:01:58 ipsec,debug,packet b15a9c85 c4dd86cf 10d39aec 9f925986 
16:01:58 ipsec,debug,packet HASH with: 
16:01:58 ipsec,debug,packet 9f984454 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:01:58 ipsec,debug,packet 00000327 
16:01:58 ipsec,debug,packet hmac(hmac_sha1) 
16:01:58 ipsec,debug,packet HASH computed: 
16:01:58 ipsec,debug,packet 66b04669 72cc2210 d4e5cfb7 58fd26ee bebe4e53 
16:01:58 ipsec,debug,packet begin encryption. 
16:01:58 ipsec,debug,packet encryption(aes) 
16:01:58 ipsec,debug,packet pad length = 8 
16:01:58 ipsec,debug,packet 0b000018 66b04669 72cc2210 d4e5cfb7 58fd26ee bebe4e53 00000020 00000001 
16:01:58 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 00000327 e16d32dc 29720b07 
16:01:58 ipsec,debug,packet encryption(aes) 
16:01:58 ipsec,debug,packet with key: 
16:01:58 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:01:58 ipsec,debug,packet encrypted payload by IV: 
16:01:58 ipsec,debug,packet b15a9c85 c4dd86cf 10d39aec 9f925986 
16:01:58 ipsec,debug,packet save IV for next: 
16:01:58 ipsec,debug,packet 8234e9e2 acbf2cdf 1eed4b72 308f0100 
16:01:58 ipsec,debug,packet encrypted. 
16:01:58 ipsec,debug,packet Adding NON-ESP marker 
16:01:58 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:01:58 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:01:58 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:01:58 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:01:58 ipsec,debug,packet src4 10.24.6.76[4500] 
16:01:58 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:01:58 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:01:58 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 9f984454 0000005c 
16:01:58 ipsec,debug,packet 7d3b339e fc32f79d 6b9d9e79 d0f28a63 f161a657 507e1b4e c3cf4d12 a173d7dc 
16:01:58 ipsec,debug,packet 96af0cc7 b3218a76 fec7b6d4 75999d91 8234e9e2 acbf2cdf 1eed4b72 308f0100 
16:01:58 ipsec,debug,packet sendto Information notify. 
16:01:58 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:02:00 ipsec,debug xx.xx.xx.xx give up to get IPsec-SA due to time up to wait. 
16:02:00 ipsec,debug,packet an undead schedule has been deleted. 
16:02:00 ipsec IPsec-SA expired: ESP/Tunnel xx.xx.xx.xx[500]->10.24.6.76[500] spi=32913792(0x1f63980) 
16:02:00 ipsec,debug,packet KA: 10.24.6.76[4500]->xx.xx.xx.xx[4500] 
16:02:00 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:00 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:00 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:00 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:00 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:00 ipsec,debug,packet 1 times of 1 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:00 ipsec,debug,packet ff 
16:02:05 ipsec,debug new acquire 10.24.6.76[0]<=>xx.xx.xx.xx[0] 
16:02:05 ipsec,debug suitable outbound SP found: 192.168.88.0/24[0] 10.24.0.203/32[0] proto=any dir=out 
16:02:05 ipsec,debug suitable inbound SP found: 10.24.0.203/32[0] 192.168.88.0/24[0] proto=any dir=in 
16:02:05 ipsec,debug,packet  (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Tunnel reqid=0:0) 
16:02:05 ipsec,debug,packet   (trns_id=AES-CBC encklen=256 authtype=hmac-sha1) 
16:02:05 ipsec,debug,packet   (trns_id=AES-CBC encklen=192 authtype=hmac-sha1) 
16:02:05 ipsec,debug,packet   (trns_id=AES-CBC encklen=128 authtype=hmac-sha1) 
16:02:05 ipsec,debug,packet begin QUICK mode. 
16:02:05 ipsec,debug,packet === 
16:02:05 ipsec,debug,packet begin QUICK mode. 
16:02:05 ipsec,debug initiate new phase 2 negotiation: 10.24.6.76[4500]<=>xx.xx.xx.xx[4500] 
16:02:05 ipsec,debug,packet compute IV for phase2 
16:02:05 ipsec,debug,packet phase1 last IV: 
16:02:05 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 deef4569 
16:02:05 ipsec,debug,packet hash(sha1) 
16:02:05 ipsec,debug,packet encryption(aes) 
16:02:05 ipsec,debug,packet phase2 IV computed: 
16:02:05 ipsec,debug,packet 3e97b266 0e387e42 0fd30ad8 b38b7af5 
16:02:05 ipsec,debug,packet call pfkey_send_getspi 845359cb 
16:02:05 ipsec,debug,packet pfkey GETSPI sent: ESP/Tunnel xx.xx.xx.xx[4500]->10.24.6.76[4500]  
16:02:05 ipsec,debug,packet pfkey getspi sent. 
16:02:05 ipsec,debug pfkey GETSPI succeeded: ESP/Tunnel xx.xx.xx.xx[4500]->10.24.6.76[4500] spi=99993136(0x5f5c630) 
16:02:05 ipsec,debug NAT detected -> UDP encapsulation (ENC_MODE 1->3). 
16:02:05 ipsec,debug,packet use local ID type IPv4_subnet 
16:02:05 ipsec,debug,packet use remote ID type IPv4_address 
16:02:05 ipsec,debug,packet IDci: 
16:02:05 ipsec,debug,packet 04000000 c0a85800 ffffff00 
16:02:05 ipsec,debug,packet IDcr: 
16:02:05 ipsec,debug,packet 01000000 0a1800cb 
16:02:05 ipsec,debug,packet add payload of len 104, next type 10 
16:02:05 ipsec,debug,packet add payload of len 24, next type 5 
16:02:05 ipsec,debug,packet add payload of len 12, next type 5 
16:02:05 ipsec,debug,packet add payload of len 8, next type 0 
16:02:05 ipsec,debug,packet HASH with: 
16:02:05 ipsec,debug,packet deef4569 0a00006c 00000001 00000001 00000060 01030403 05f5c630 0300001c 
16:02:05 ipsec,debug,packet 010c0000 80010001 80020708 80040003 80060100 80050002 0300001c 020c0000 
16:02:05 ipsec,debug,packet 80010001 80020708 80040003 800600c0 80050002 0000001c 030c0000 80010001 
16:02:05 ipsec,debug,packet 80020708 80040003 80060080 80050002 0500001c d4d68776 b2e30dab f0fc412d 
16:02:05 ipsec,debug,packet f7f75bb0 b830203b 1e099365 05000010 04000000 c0a85800 ffffff00 0000000c 
16:02:05 ipsec,debug,packet 01000000 0a1800cb 
16:02:05 ipsec,debug,packet hmac(hmac_sha1) 
16:02:05 ipsec,debug,packet HASH computed: 
16:02:05 ipsec,debug,packet 127b09e7 8216fcc3 040997a7 d899feeb 9220a682 
16:02:05 ipsec,debug,packet add payload of len 20, next type 1 
16:02:05 ipsec,debug,packet begin encryption. 
16:02:05 ipsec,debug,packet encryption(aes) 
16:02:05 ipsec,debug,packet pad length = 4 
16:02:05 ipsec,debug,packet 01000018 127b09e7 8216fcc3 040997a7 d899feeb 9220a682 0a00006c 00000001 
16:02:05 ipsec,debug,packet 00000001 00000060 01030403 05f5c630 0300001c 010c0000 80010001 80020708 
16:02:05 ipsec,debug,packet 80040003 80060100 80050002 0300001c 020c0000 80010001 80020708 80040003 
16:02:05 ipsec,debug,packet 800600c0 80050002 0000001c 030c0000 80010001 80020708 80040003 80060080 
16:02:05 ipsec,debug,packet 80050002 0500001c d4d68776 b2e30dab f0fc412d f7f75bb0 b830203b 1e099365 
16:02:05 ipsec,debug,packet 05000010 04000000 c0a85800 ffffff00 0000000c 01000000 0a1800cb 02d17a03 
16:02:05 ipsec,debug,packet encryption(aes) 
16:02:05 ipsec,debug,packet with key: 
16:02:05 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:05 ipsec,debug,packet encrypted payload by IV: 
16:02:05 ipsec,debug,packet 3e97b266 0e387e42 0fd30ad8 b38b7af5 
16:02:05 ipsec,debug,packet save IV for next: 
16:02:05 ipsec,debug,packet 9f1115b3 8b3a7ba9 6810bfdc bcbfbda3 
16:02:05 ipsec,debug,packet encrypted. 
16:02:05 ipsec,debug,packet Adding NON-ESP marker 
16:02:05 ipsec,debug,packet 224 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:05 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:05 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:05 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:05 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:05 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:05 ipsec,debug,packet 1 times of 224 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:05 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08102001 deef4569 000000dc 
16:02:05 ipsec,debug,packet cd225af9 25680412 3b1bc4b4 2adbf7a0 8e644b68 2f1dde57 8495775e 26bb63e1 
16:02:05 ipsec,debug,packet 3c1f56c5 fc5c319a 2420e903 c257cf85 cbf94036 c49297d3 77155c37 23445a95 
16:02:05 ipsec,debug,packet b270dd39 90aa7101 358d4791 2951ca04 5aeccf81 a068a90e 3f20be99 68347ec9 
16:02:05 ipsec,debug,packet e2c7e9b3 04094a51 5bf2d2ea ac817f60 3f9fb810 854e53ca cd0df426 24ce0a91 
16:02:05 ipsec,debug,packet e9f92ffd 330460ff e34538b4 b9579bda 6103b066 a9bf91cf 14784643 19c2dad2 
16:02:05 ipsec,debug,packet 6f5460f8 d688d532 2e661cd7 7511863f 9f1115b3 8b3a7ba9 6810bfdc bcbfbda3 
16:02:05 ipsec,debug sent phase2 packet 10.24.6.76[4500]<=>xx.xx.xx.xx[4500] c668012ab987f620:8bda57eb2a17dbe1:deef4569 
16:02:08 ipsec,debug,packet ========== 
16:02:08 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:02:08 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 beb8f2fa 0000005c cb1d29d6 
16:02:08 ipsec,debug,packet 074a00cf 17da3eeb 8e9a4535 8334d83e e76474c0 87a55016 d82a7f9a 38699845 
16:02:08 ipsec,debug,packet 70bacb6d a463d7d9 10eb1669 7dac9e25 c877eddd 6cea1ff2 2f0cd510 
16:02:08 ipsec,debug,packet receive Information. 
16:02:08 ipsec,debug,packet compute IV for phase2 
16:02:08 ipsec,debug,packet phase1 last IV: 
16:02:08 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 beb8f2fa 
16:02:08 ipsec,debug,packet hash(sha1) 
16:02:08 ipsec,debug,packet encryption(aes) 
16:02:08 ipsec,debug,packet phase2 IV computed: 
16:02:08 ipsec,debug,packet a193830e 4f1fc438 3f7d3942 f0313b55 
16:02:08 ipsec,debug,packet encryption(aes) 
16:02:08 ipsec,debug,packet IV was saved for next processing: 
16:02:08 ipsec,debug,packet 7dac9e25 c877eddd 6cea1ff2 2f0cd510 
16:02:08 ipsec,debug,packet encryption(aes) 
16:02:08 ipsec,debug,packet with key: 
16:02:08 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:08 ipsec,debug,packet decrypted payload by IV: 
16:02:08 ipsec,debug,packet a193830e 4f1fc438 3f7d3942 f0313b55 
16:02:08 ipsec,debug,packet decrypted payload, but not trimed. 
16:02:08 ipsec,debug,packet 0b000018 29fe52b5 9594518b 7e00d717 2d5d3eb5 37cfb636 00000020 00000001 
16:02:08 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 00000328 f5f3eabc c4e7c107 
16:02:08 ipsec,debug,packet padding len=8 
16:02:08 ipsec,debug,packet skip to trim padding. 
16:02:08 ipsec,debug,packet decrypted. 
16:02:08 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 beb8f2fa 0000005c 0b000018 
16:02:08 ipsec,debug,packet 29fe52b5 9594518b 7e00d717 2d5d3eb5 37cfb636 00000020 00000001 01108d28 
16:02:08 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 00000328 f5f3eabc c4e7c107 
16:02:08 ipsec,debug,packet HASH with: 
16:02:08 ipsec,debug,packet beb8f2fa 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:08 ipsec,debug,packet 00000328 
16:02:08 ipsec,debug,packet hmac(hmac_sha1) 
16:02:08 ipsec,debug,packet HASH computed: 
16:02:08 ipsec,debug,packet 29fe52b5 9594518b 7e00d717 2d5d3eb5 37cfb636 
16:02:08 ipsec,debug,packet hash validated. 
16:02:08 ipsec,debug,packet begin. 
16:02:08 ipsec,debug,packet seen nptype=8(hash) len=24 
16:02:08 ipsec,debug,packet seen nptype=11(notify) len=32 
16:02:08 ipsec,debug,packet succeed. 
16:02:08 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:02:08 ipsec,debug,packet compute IV for phase2 
16:02:08 ipsec,debug,packet phase1 last IV: 
16:02:08 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 f8ba858f 
16:02:08 ipsec,debug,packet hash(sha1) 
16:02:08 ipsec,debug,packet encryption(aes) 
16:02:08 ipsec,debug,packet phase2 IV computed: 
16:02:08 ipsec,debug,packet 385169bf 6114aa15 9225ce29 f0906a90 
16:02:08 ipsec,debug,packet HASH with: 
16:02:08 ipsec,debug,packet f8ba858f 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:08 ipsec,debug,packet 00000328 
16:02:08 ipsec,debug,packet hmac(hmac_sha1) 
16:02:08 ipsec,debug,packet HASH computed: 
16:02:08 ipsec,debug,packet 4c30122b 9fa99d7e ebc3331e b049fb11 aa04111a 
16:02:08 ipsec,debug,packet begin encryption. 
16:02:08 ipsec,debug,packet encryption(aes) 
16:02:08 ipsec,debug,packet pad length = 8 
16:02:08 ipsec,debug,packet 0b000018 4c30122b 9fa99d7e ebc3331e b049fb11 aa04111a 00000020 00000001 
16:02:08 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 00000328 210ab376 86cca807 
16:02:08 ipsec,debug,packet encryption(aes) 
16:02:08 ipsec,debug,packet with key: 
16:02:08 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:08 ipsec,debug,packet encrypted payload by IV: 
16:02:08 ipsec,debug,packet 385169bf 6114aa15 9225ce29 f0906a90 
16:02:08 ipsec,debug,packet save IV for next: 
16:02:08 ipsec,debug,packet 0ac84f05 73273d49 ad676f53 b4ddf74d 
16:02:08 ipsec,debug,packet encrypted. 
16:02:08 ipsec,debug,packet Adding NON-ESP marker 
16:02:08 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:08 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:08 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:08 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:08 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:08 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:08 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:08 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 f8ba858f 0000005c 
16:02:08 ipsec,debug,packet f6ea5a99 a91ca758 e313b79c 70b30848 79fa347a 1a8510e0 96298fde 86491733 
16:02:08 ipsec,debug,packet e3ccf857 106c7a05 ee4be263 ea04943b 0ac84f05 73273d49 ad676f53 b4ddf74d 
16:02:08 ipsec,debug,packet sendto Information notify. 
16:02:08 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:02:15 ipsec,debug,packet Adding NON-ESP marker 
16:02:15 ipsec,debug,packet 224 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:15 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:15 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:15 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:15 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:15 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:15 ipsec,debug,packet 1 times of 224 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:15 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08102001 deef4569 000000dc 
16:02:15 ipsec,debug,packet cd225af9 25680412 3b1bc4b4 2adbf7a0 8e644b68 2f1dde57 8495775e 26bb63e1 
16:02:15 ipsec,debug,packet 3c1f56c5 fc5c319a 2420e903 c257cf85 cbf94036 c49297d3 77155c37 23445a95 
16:02:15 ipsec,debug,packet b270dd39 90aa7101 358d4791 2951ca04 5aeccf81 a068a90e 3f20be99 68347ec9 
16:02:15 ipsec,debug,packet e2c7e9b3 04094a51 5bf2d2ea ac817f60 3f9fb810 854e53ca cd0df426 24ce0a91 
16:02:15 ipsec,debug,packet e9f92ffd 330460ff e34538b4 b9579bda 6103b066 a9bf91cf 14784643 19c2dad2 
16:02:15 ipsec,debug,packet 6f5460f8 d688d532 2e661cd7 7511863f 9f1115b3 8b3a7ba9 6810bfdc bcbfbda3 
16:02:15 ipsec,debug resent phase2 packet 10.24.6.76[4500]<=>xx.xx.xx.xx[4500] c668012ab987f620:8bda57eb2a17dbe1:deef4569 
16:02:18 ipsec,debug,packet ========== 
16:02:18 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:02:18 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 f46f257e 0000005c 061fb741 
16:02:18 ipsec,debug,packet dc6acbda 28557fbb d4bc480e 2d8b570a 039dc8ae 412c8676 d7bf986e 7fb0dcb0 
16:02:18 ipsec,debug,packet 3329cc01 16a3577e 8108f3de c57ee5c1 7e0eb4fc 9b9fd2f4 33bfab0e 
16:02:18 ipsec,debug,packet receive Information. 
16:02:18 ipsec,debug,packet compute IV for phase2 
16:02:18 ipsec,debug,packet phase1 last IV: 
16:02:18 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 f46f257e 
16:02:18 ipsec,debug,packet hash(sha1) 
16:02:18 ipsec,debug,packet encryption(aes) 
16:02:18 ipsec,debug,packet phase2 IV computed: 
16:02:18 ipsec,debug,packet b8327327 e262d217 cc197c7d 6b879d8b 
16:02:18 ipsec,debug,packet encryption(aes) 
16:02:18 ipsec,debug,packet IV was saved for next processing: 
16:02:18 ipsec,debug,packet c57ee5c1 7e0eb4fc 9b9fd2f4 33bfab0e 
16:02:18 ipsec,debug,packet encryption(aes) 
16:02:18 ipsec,debug,packet with key: 
16:02:18 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:18 ipsec,debug,packet decrypted payload by IV: 
16:02:18 ipsec,debug,packet b8327327 e262d217 cc197c7d 6b879d8b 
16:02:18 ipsec,debug,packet decrypted payload, but not trimed. 
16:02:18 ipsec,debug,packet 0b000018 8c07e22a b0117b15 30ea35d6 9cf2f54b d153691c 00000020 00000001 
16:02:18 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 00000329 dee8d58c 9af28b07 
16:02:18 ipsec,debug,packet padding len=8 
16:02:18 ipsec,debug,packet skip to trim padding. 
16:02:18 ipsec,debug,packet decrypted. 
16:02:18 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 f46f257e 0000005c 0b000018 
16:02:18 ipsec,debug,packet 8c07e22a b0117b15 30ea35d6 9cf2f54b d153691c 00000020 00000001 01108d28 
16:02:18 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 00000329 dee8d58c 9af28b07 
16:02:18 ipsec,debug,packet HASH with: 
16:02:18 ipsec,debug,packet f46f257e 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:18 ipsec,debug,packet 00000329 
16:02:18 ipsec,debug,packet hmac(hmac_sha1) 
16:02:18 ipsec,debug,packet HASH computed: 
16:02:18 ipsec,debug,packet 8c07e22a b0117b15 30ea35d6 9cf2f54b d153691c 
16:02:18 ipsec,debug,packet hash validated. 
16:02:18 ipsec,debug,packet begin. 
16:02:18 ipsec,debug,packet seen nptype=8(hash) len=24 
16:02:18 ipsec,debug,packet seen nptype=11(notify) len=32 
16:02:18 ipsec,debug,packet succeed. 
16:02:18 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:02:18 ipsec,debug,packet compute IV for phase2 
16:02:18 ipsec,debug,packet phase1 last IV: 
16:02:18 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 da0bf67e 
16:02:18 ipsec,debug,packet hash(sha1) 
16:02:18 ipsec,debug,packet encryption(aes) 
16:02:18 ipsec,debug,packet phase2 IV computed: 
16:02:18 ipsec,debug,packet 939159c3 ad32b774 f8f1da65 d6144e08 
16:02:18 ipsec,debug,packet HASH with: 
16:02:18 ipsec,debug,packet da0bf67e 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:18 ipsec,debug,packet 00000329 
16:02:18 ipsec,debug,packet hmac(hmac_sha1) 
16:02:18 ipsec,debug,packet HASH computed: 
16:02:18 ipsec,debug,packet b428f752 6368d4ef 8be1cbf9 ca178c58 a2842df2 
16:02:18 ipsec,debug,packet begin encryption. 
16:02:18 ipsec,debug,packet encryption(aes) 
16:02:18 ipsec,debug,packet pad length = 8 
16:02:18 ipsec,debug,packet 0b000018 b428f752 6368d4ef 8be1cbf9 ca178c58 a2842df2 00000020 00000001 
16:02:18 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 00000329 4cb3b252 5abfbe07 
16:02:18 ipsec,debug,packet encryption(aes) 
16:02:18 ipsec,debug,packet with key: 
16:02:18 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:18 ipsec,debug,packet encrypted payload by IV: 
16:02:18 ipsec,debug,packet 939159c3 ad32b774 f8f1da65 d6144e08 
16:02:18 ipsec,debug,packet save IV for next: 
16:02:18 ipsec,debug,packet f6def97c b2586f6a 210b2e14 33f6dfcd 
16:02:18 ipsec,debug,packet encrypted. 
16:02:18 ipsec,debug,packet Adding NON-ESP marker 
16:02:18 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:18 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:18 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:18 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:18 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:18 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:18 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:18 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 da0bf67e 0000005c 
16:02:18 ipsec,debug,packet f5b325c1 3e908fd7 13952848 89f3d8b3 e126d071 0af180d9 4327700c 708f5db7 
16:02:18 ipsec,debug,packet 06aac36e ed9660c3 54f40705 6d43d1bd f6def97c b2586f6a 210b2e14 33f6dfcd 
16:02:18 ipsec,debug,packet sendto Information notify. 
16:02:18 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:02:20 ipsec,debug,packet KA: 10.24.6.76[4500]->xx.xx.xx.xx[4500] 
16:02:20 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:20 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:20 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:20 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:20 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:20 ipsec,debug,packet 1 times of 1 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:20 ipsec,debug,packet ff 
16:02:25 ipsec,debug,packet Adding NON-ESP marker 
16:02:25 ipsec,debug,packet 224 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:25 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:25 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:25 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:25 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:25 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:25 ipsec,debug,packet 1 times of 224 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:25 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08102001 deef4569 000000dc 
16:02:25 ipsec,debug,packet cd225af9 25680412 3b1bc4b4 2adbf7a0 8e644b68 2f1dde57 8495775e 26bb63e1 
16:02:25 ipsec,debug,packet 3c1f56c5 fc5c319a 2420e903 c257cf85 cbf94036 c49297d3 77155c37 23445a95 
16:02:25 ipsec,debug,packet b270dd39 90aa7101 358d4791 2951ca04 5aeccf81 a068a90e 3f20be99 68347ec9 
16:02:25 ipsec,debug,packet e2c7e9b3 04094a51 5bf2d2ea ac817f60 3f9fb810 854e53ca cd0df426 24ce0a91 
16:02:25 ipsec,debug,packet e9f92ffd 330460ff e34538b4 b9579bda 6103b066 a9bf91cf 14784643 19c2dad2 
16:02:25 ipsec,debug,packet 6f5460f8 d688d532 2e661cd7 7511863f 9f1115b3 8b3a7ba9 6810bfdc bcbfbda3 
16:02:25 ipsec,debug resent phase2 packet 10.24.6.76[4500]<=>xx.xx.xx.xx[4500] c668012ab987f620:8bda57eb2a17dbe1:deef4569 
16:02:28 ipsec,debug,packet ========== 
16:02:28 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:02:28 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 dec41c13 0000005c 0928b86c 
16:02:28 ipsec,debug,packet 883d0ffd 74aca7e9 5c2ab29a 7c994573 6b8ae493 943a31f7 2d99a7e9 4f3373fa 
16:02:28 ipsec,debug,packet 3381c0c5 7c3814d4 b27237b3 f262828f de12cab6 82998c7a 23e56991 
16:02:28 ipsec,debug,packet receive Information. 
16:02:28 ipsec,debug,packet compute IV for phase2 
16:02:28 ipsec,debug,packet phase1 last IV: 
16:02:28 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 dec41c13 
16:02:28 ipsec,debug,packet hash(sha1) 
16:02:28 ipsec,debug,packet encryption(aes) 
16:02:28 ipsec,debug,packet phase2 IV computed: 
16:02:28 ipsec,debug,packet f6ef7543 3e2d9cc6 aedafa28 91cec7fd 
16:02:28 ipsec,debug,packet encryption(aes) 
16:02:28 ipsec,debug,packet IV was saved for next processing: 
16:02:28 ipsec,debug,packet f262828f de12cab6 82998c7a 23e56991 
16:02:28 ipsec,debug,packet encryption(aes) 
16:02:28 ipsec,debug,packet with key: 
16:02:28 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:28 ipsec,debug,packet decrypted payload by IV: 
16:02:28 ipsec,debug,packet f6ef7543 3e2d9cc6 aedafa28 91cec7fd 
16:02:28 ipsec,debug,packet decrypted payload, but not trimed. 
16:02:28 ipsec,debug,packet 0b000018 88e0858d d829c32b 14dea007 eaea8a81 35b1462e 00000020 00000001 
16:02:28 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 0000032a d9ea8b92 fe929807 
16:02:28 ipsec,debug,packet padding len=8 
16:02:28 ipsec,debug,packet skip to trim padding. 
16:02:28 ipsec,debug,packet decrypted. 
16:02:28 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 dec41c13 0000005c 0b000018 
16:02:28 ipsec,debug,packet 88e0858d d829c32b 14dea007 eaea8a81 35b1462e 00000020 00000001 01108d28 
16:02:28 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 0000032a d9ea8b92 fe929807 
16:02:28 ipsec,debug,packet HASH with: 
16:02:28 ipsec,debug,packet dec41c13 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:28 ipsec,debug,packet 0000032a 
16:02:28 ipsec,debug,packet hmac(hmac_sha1) 
16:02:28 ipsec,debug,packet HASH computed: 
16:02:28 ipsec,debug,packet 88e0858d d829c32b 14dea007 eaea8a81 35b1462e 
16:02:28 ipsec,debug,packet hash validated. 
16:02:28 ipsec,debug,packet begin. 
16:02:28 ipsec,debug,packet seen nptype=8(hash) len=24 
16:02:28 ipsec,debug,packet seen nptype=11(notify) len=32 
16:02:28 ipsec,debug,packet succeed. 
16:02:28 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:02:28 ipsec,debug,packet compute IV for phase2 
16:02:28 ipsec,debug,packet phase1 last IV: 
16:02:28 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 d3997a84 
16:02:28 ipsec,debug,packet hash(sha1) 
16:02:28 ipsec,debug,packet encryption(aes) 
16:02:28 ipsec,debug,packet phase2 IV computed: 
16:02:28 ipsec,debug,packet 576b3f09 16fc1cad 4833c9bf 1c7e4bb5 
16:02:28 ipsec,debug,packet HASH with: 
16:02:28 ipsec,debug,packet d3997a84 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:28 ipsec,debug,packet 0000032a 
16:02:28 ipsec,debug,packet hmac(hmac_sha1) 
16:02:28 ipsec,debug,packet HASH computed: 
16:02:28 ipsec,debug,packet 6c24be61 a320137a 1e75f647 ebca94dd 40abe15d 
16:02:28 ipsec,debug,packet begin encryption. 
16:02:28 ipsec,debug,packet encryption(aes) 
16:02:28 ipsec,debug,packet pad length = 8 
16:02:28 ipsec,debug,packet 0b000018 6c24be61 a320137a 1e75f647 ebca94dd 40abe15d 00000020 00000001 
16:02:28 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 0000032a d6325f94 0d840207 
16:02:28 ipsec,debug,packet encryption(aes) 
16:02:28 ipsec,debug,packet with key: 
16:02:28 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:28 ipsec,debug,packet encrypted payload by IV: 
16:02:28 ipsec,debug,packet 576b3f09 16fc1cad 4833c9bf 1c7e4bb5 
16:02:28 ipsec,debug,packet save IV for next: 
16:02:28 ipsec,debug,packet 1c37e00c 7a04c380 d8110f63 20fa7be1 
16:02:28 ipsec,debug,packet encrypted. 
16:02:28 ipsec,debug,packet Adding NON-ESP marker 
16:02:28 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:28 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:28 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:28 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:28 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:28 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:28 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:28 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 d3997a84 0000005c 
16:02:28 ipsec,debug,packet 8454b2d7 e4d4089c 885c8d8f f17846c7 94696486 809299eb 31c446c4 d6bf9994 
16:02:28 ipsec,debug,packet edde9f0c f03261cd 37277856 1fb3ea5c 1c37e00c 7a04c380 d8110f63 20fa7be1 
16:02:28 ipsec,debug,packet sendto Information notify. 
16:02:28 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:02:35 ipsec,debug xx.xx.xx.xx give up to get IPsec-SA due to time up to wait. 
16:02:35 ipsec,debug,packet an undead schedule has been deleted. 
16:02:35 ipsec IPsec-SA expired: ESP/Tunnel xx.xx.xx.xx[500]->10.24.6.76[500] spi=99993136(0x5f5c630) 
16:02:38 ipsec,debug,packet ========== 
16:02:38 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:02:38 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 de7f755c 0000005c 1f62d546 
16:02:38 ipsec,debug,packet bc7ba966 41ade127 4701e11c 94207543 5deb3bc6 c02ad4cd d7a593e0 d0c05322 
16:02:38 ipsec,debug,packet 65ad8137 ed5143a1 9e043c55 0f056220 8e3253bd 3c5f2c75 9d0a774d 
16:02:38 ipsec,debug,packet receive Information. 
16:02:38 ipsec,debug,packet compute IV for phase2 
16:02:38 ipsec,debug,packet phase1 last IV: 
16:02:38 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 de7f755c 
16:02:38 ipsec,debug,packet hash(sha1) 
16:02:38 ipsec,debug,packet encryption(aes) 
16:02:38 ipsec,debug,packet phase2 IV computed: 
16:02:38 ipsec,debug,packet cccd73cd d4a562bd c8a88f41 c48c7a97 
16:02:38 ipsec,debug,packet encryption(aes) 
16:02:38 ipsec,debug,packet IV was saved for next processing: 
16:02:38 ipsec,debug,packet 0f056220 8e3253bd 3c5f2c75 9d0a774d 
16:02:38 ipsec,debug,packet encryption(aes) 
16:02:38 ipsec,debug,packet with key: 
16:02:38 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:38 ipsec,debug,packet decrypted payload by IV: 
16:02:38 ipsec,debug,packet cccd73cd d4a562bd c8a88f41 c48c7a97 
16:02:38 ipsec,debug,packet decrypted payload, but not trimed. 
16:02:38 ipsec,debug,packet 0b000018 8abbc9b8 9cdeb78e c50393ec 1bb7ae2a a15e838e 00000020 00000001 
16:02:38 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 0000032b f2f4c2c7 8ade9c07 
16:02:38 ipsec,debug,packet padding len=8 
16:02:38 ipsec,debug,packet skip to trim padding. 
16:02:38 ipsec,debug,packet decrypted. 
16:02:38 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 de7f755c 0000005c 0b000018 
16:02:38 ipsec,debug,packet 8abbc9b8 9cdeb78e c50393ec 1bb7ae2a a15e838e 00000020 00000001 01108d28 
16:02:38 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 0000032b f2f4c2c7 8ade9c07 
16:02:38 ipsec,debug,packet HASH with: 
16:02:38 ipsec,debug,packet de7f755c 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:38 ipsec,debug,packet 0000032b 
16:02:38 ipsec,debug,packet hmac(hmac_sha1) 
16:02:38 ipsec,debug,packet HASH computed: 
16:02:38 ipsec,debug,packet 8abbc9b8 9cdeb78e c50393ec 1bb7ae2a a15e838e 
16:02:38 ipsec,debug,packet hash validated. 
16:02:38 ipsec,debug,packet begin. 
16:02:38 ipsec,debug,packet seen nptype=8(hash) len=24 
16:02:38 ipsec,debug,packet seen nptype=11(notify) len=32 
16:02:38 ipsec,debug,packet succeed. 
16:02:38 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:02:38 ipsec,debug,packet compute IV for phase2 
16:02:38 ipsec,debug,packet phase1 last IV: 
16:02:38 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 b83a62c2 
16:02:38 ipsec,debug,packet hash(sha1) 
16:02:38 ipsec,debug,packet encryption(aes) 
16:02:38 ipsec,debug,packet phase2 IV computed: 
16:02:38 ipsec,debug,packet 27af2dca dfbe8653 32d46cde 36cab615 
16:02:38 ipsec,debug,packet HASH with: 
16:02:38 ipsec,debug,packet b83a62c2 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:38 ipsec,debug,packet 0000032b 
16:02:38 ipsec,debug,packet hmac(hmac_sha1) 
16:02:38 ipsec,debug,packet HASH computed: 
16:02:38 ipsec,debug,packet f785b3f3 b5b05afd 2a5ec89d a3b4d635 01725433 
16:02:38 ipsec,debug,packet begin encryption. 
16:02:38 ipsec,debug,packet encryption(aes) 
16:02:38 ipsec,debug,packet pad length = 8 
16:02:38 ipsec,debug,packet 0b000018 f785b3f3 b5b05afd 2a5ec89d a3b4d635 01725433 00000020 00000001 
16:02:38 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 0000032b 3d0d358d 24334b07 
16:02:38 ipsec,debug,packet encryption(aes) 
16:02:38 ipsec,debug,packet with key: 
16:02:38 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:38 ipsec,debug,packet encrypted payload by IV: 
16:02:38 ipsec,debug,packet 27af2dca dfbe8653 32d46cde 36cab615 
16:02:38 ipsec,debug,packet save IV for next: 
16:02:38 ipsec,debug,packet 6bdeddd5 d23660db d141d0a3 12c39e96 
16:02:38 ipsec,debug,packet encrypted. 
16:02:38 ipsec,debug,packet Adding NON-ESP marker 
16:02:38 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:38 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:38 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:38 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:38 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:38 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:38 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:38 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 b83a62c2 0000005c 
16:02:38 ipsec,debug,packet 361a26b5 d8c3062e dd4e748d 934c3639 55e7fdc1 174366ca bd6eb6bb 801c18d0 
16:02:38 ipsec,debug,packet 48d7e684 3096158a a0955d49 04c5e471 6bdeddd5 d23660db d141d0a3 12c39e96 
16:02:38 ipsec,debug,packet sendto Information notify. 
16:02:38 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:02:40 ipsec,debug,packet KA: 10.24.6.76[4500]->xx.xx.xx.xx[4500] 
16:02:40 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:40 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:40 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:40 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:40 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:40 ipsec,debug,packet 1 times of 1 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:40 ipsec,debug,packet ff 
16:02:48 ipsec,debug,packet ========== 
16:02:48 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:02:48 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 c3b77e5c 0000005c 6e155596 
16:02:48 ipsec,debug,packet 87997f28 293e866e 155767ff faba7e3c 44410ab4 38961e7b 6238d5b0 3b36bb3c 
16:02:48 ipsec,debug,packet 5f4aec68 4faeec03 1db966e9 bc6c58e1 22476b5e 4f1eaa75 206da617 
16:02:48 ipsec,debug,packet receive Information. 
16:02:48 ipsec,debug,packet compute IV for phase2 
16:02:48 ipsec,debug,packet phase1 last IV: 
16:02:48 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 c3b77e5c 
16:02:48 ipsec,debug,packet hash(sha1) 
16:02:48 ipsec,debug,packet encryption(aes) 
16:02:48 ipsec,debug,packet phase2 IV computed: 
16:02:48 ipsec,debug,packet 366459b4 f9d5d793 af9c269d d8d4619a 
16:02:48 ipsec,debug,packet encryption(aes) 
16:02:48 ipsec,debug,packet IV was saved for next processing: 
16:02:48 ipsec,debug,packet bc6c58e1 22476b5e 4f1eaa75 206da617 
16:02:48 ipsec,debug,packet encryption(aes) 
16:02:48 ipsec,debug,packet with key: 
16:02:48 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:48 ipsec,debug,packet decrypted payload by IV: 
16:02:48 ipsec,debug,packet 366459b4 f9d5d793 af9c269d d8d4619a 
16:02:48 ipsec,debug,packet decrypted payload, but not trimed. 
16:02:48 ipsec,debug,packet 0b000018 d302110a d7e82c37 96a745b7 edd1e32d 366c7322 00000020 00000001 
16:02:48 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 0000032c 8296969f eeb79307 
16:02:48 ipsec,debug,packet padding len=8 
16:02:48 ipsec,debug,packet skip to trim padding. 
16:02:48 ipsec,debug,packet decrypted. 
16:02:48 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 c3b77e5c 0000005c 0b000018 
16:02:48 ipsec,debug,packet d302110a d7e82c37 96a745b7 edd1e32d 366c7322 00000020 00000001 01108d28 
16:02:48 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 0000032c 8296969f eeb79307 
16:02:48 ipsec,debug,packet HASH with: 
16:02:48 ipsec,debug,packet c3b77e5c 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:48 ipsec,debug,packet 0000032c 
16:02:48 ipsec,debug,packet hmac(hmac_sha1) 
16:02:48 ipsec,debug,packet HASH computed: 
16:02:48 ipsec,debug,packet d302110a d7e82c37 96a745b7 edd1e32d 366c7322 
16:02:48 ipsec,debug,packet hash validated. 
16:02:48 ipsec,debug,packet begin. 
16:02:48 ipsec,debug,packet seen nptype=8(hash) len=24 
16:02:48 ipsec,debug,packet seen nptype=11(notify) len=32 
16:02:48 ipsec,debug,packet succeed. 
16:02:48 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:02:48 ipsec,debug,packet compute IV for phase2 
16:02:48 ipsec,debug,packet phase1 last IV: 
16:02:48 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 89297ee3 
16:02:48 ipsec,debug,packet hash(sha1) 
16:02:48 ipsec,debug,packet encryption(aes) 
16:02:48 ipsec,debug,packet phase2 IV computed: 
16:02:48 ipsec,debug,packet 921228f6 b8e9003e f675a506 42d0a286 
16:02:48 ipsec,debug,packet HASH with: 
16:02:48 ipsec,debug,packet 89297ee3 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:48 ipsec,debug,packet 0000032c 
16:02:48 ipsec,debug,packet hmac(hmac_sha1) 
16:02:48 ipsec,debug,packet HASH computed: 
16:02:48 ipsec,debug,packet 7546587f bd4b54d1 cbfa7195 bfed59ab 27159493 
16:02:48 ipsec,debug,packet begin encryption. 
16:02:48 ipsec,debug,packet encryption(aes) 
16:02:48 ipsec,debug,packet pad length = 8 
16:02:48 ipsec,debug,packet 0b000018 7546587f bd4b54d1 cbfa7195 bfed59ab 27159493 00000020 00000001 
16:02:48 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 0000032c aba203e3 9f193d07 
16:02:48 ipsec,debug,packet encryption(aes) 
16:02:48 ipsec,debug,packet with key: 
16:02:48 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:48 ipsec,debug,packet encrypted payload by IV: 
16:02:48 ipsec,debug,packet 921228f6 b8e9003e f675a506 42d0a286 
16:02:48 ipsec,debug,packet save IV for next: 
16:02:48 ipsec,debug,packet 59987c3d 16c567d3 6b144cd5 62f82202 
16:02:48 ipsec,debug,packet encrypted. 
16:02:48 ipsec,debug,packet Adding NON-ESP marker 
16:02:48 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:48 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:48 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:48 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:48 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:48 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:48 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.xx.xx[4500] 
16:02:48 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 89297ee3 0000005c 
16:02:48 ipsec,debug,packet 26984ad4 04d47669 ca5ddee1 74b0bc79 d1dc6e60 e734f519 03f8b199 1dad16a3 
16:02:48 ipsec,debug,packet 9d7d4692 de88f3d3 5bf8b341 35d51329 59987c3d 16c567d3 6b144cd5 62f82202 
16:02:48 ipsec,debug,packet sendto Information notify. 
16:02:48 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:02:58 ipsec,debug,packet ========== 
16:02:58 ipsec,debug,packet 92 bytes message received from xx.xx.xx.xx[4500] to 10.24.6.76[4500] 
16:02:58 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 905b0f8e 0000005c d13e224d 
16:02:58 ipsec,debug,packet d11a9e5c 2d08503c 21f96f00 753fc4ff a2cbcc3a 2ac1ad2c b20fe6f7 57d16a71 
16:02:58 ipsec,debug,packet b4fe2fc0 952bc379 a2df88ec c34c831b 243bbf84 ec9aed8f 52eb0857 
16:02:58 ipsec,debug,packet receive Information. 
16:02:58 ipsec,debug,packet compute IV for phase2 
16:02:58 ipsec,debug,packet phase1 last IV: 
16:02:58 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 905b0f8e 
16:02:58 ipsec,debug,packet hash(sha1) 
16:02:58 ipsec,debug,packet encryption(aes) 
16:02:58 ipsec,debug,packet phase2 IV computed: 
16:02:58 ipsec,debug,packet a6d66dbf 27d4478d 659afc15 0c1a13f3 
16:02:58 ipsec,debug,packet encryption(aes) 
16:02:58 ipsec,debug,packet IV was saved for next processing: 
16:02:58 ipsec,debug,packet c34c831b 243bbf84 ec9aed8f 52eb0857 
16:02:58 ipsec,debug,packet encryption(aes) 
16:02:58 ipsec,debug,packet with key: 
16:02:58 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:58 ipsec,debug,packet decrypted payload by IV: 
16:02:58 ipsec,debug,packet a6d66dbf 27d4478d 659afc15 0c1a13f3 
16:02:58 ipsec,debug,packet decrypted payload, but not trimed. 
16:02:58 ipsec,debug,packet 0b000018 0cd6ffae 098f8533 f28779ba 9ed1eca7 035f10b9 00000020 00000001 
16:02:58 ipsec,debug,packet 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 0000032d 9fd6bf84 c9bae007 
16:02:58 ipsec,debug,packet padding len=8 
16:02:58 ipsec,debug,packet skip to trim padding. 
16:02:58 ipsec,debug,packet decrypted. 
16:02:58 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 08100501 905b0f8e 0000005c 0b000018 
16:02:58 ipsec,debug,packet 0cd6ffae 098f8533 f28779ba 9ed1eca7 035f10b9 00000020 00000001 01108d28 
16:02:58 ipsec,debug,packet c668012a b987f620 8bda57eb 2a17dbe1 0000032d 9fd6bf84 c9bae007 
16:02:58 ipsec,debug,packet HASH with: 
16:02:58 ipsec,debug,packet 905b0f8e 00000020 00000001 01108d28 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:58 ipsec,debug,packet 0000032d 
16:02:58 ipsec,debug,packet hmac(hmac_sha1) 
16:02:58 ipsec,debug,packet HASH computed: 
16:02:58 ipsec,debug,packet 0cd6ffae 098f8533 f28779ba 9ed1eca7 035f10b9 
16:02:58 ipsec,debug,packet hash validated. 
16:02:58 ipsec,debug,packet begin. 
16:02:58 ipsec,debug,packet seen nptype=8(hash) len=24 
16:02:58 ipsec,debug,packet seen nptype=11(notify) len=32 
16:02:58 ipsec,debug,packet succeed. 
16:02:58 ipsec,debug,packet xx.xx.xx.xx DPD R-U-There received 
16:02:58 ipsec,debug,packet compute IV for phase2 
16:02:58 ipsec,debug,packet phase1 last IV: 
16:02:58 ipsec,debug,packet 044c5746 d0175355 6f8a7cb5 8a5a9e84 ab7eba66 
16:02:58 ipsec,debug,packet hash(sha1) 
16:02:58 ipsec,debug,packet encryption(aes) 
16:02:58 ipsec,debug,packet phase2 IV computed: 
16:02:58 ipsec,debug,packet 9e7570a1 d8c74199 e21603d2 746588b8 
16:02:58 ipsec,debug,packet HASH with: 
16:02:58 ipsec,debug,packet ab7eba66 00000020 00000001 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 
16:02:58 ipsec,debug,packet 0000032d 
16:02:58 ipsec,debug,packet hmac(hmac_sha1) 
16:02:58 ipsec,debug,packet HASH computed: 
16:02:58 ipsec,debug,packet c629d1e5 249b7be2 c6b2e4e7 70cc86b6 a9f13834 
16:02:58 ipsec,debug,packet begin encryption. 
16:02:58 ipsec,debug,packet encryption(aes) 
16:02:58 ipsec,debug,packet pad length = 8 
16:02:58 ipsec,debug,packet 0b000018 c629d1e5 249b7be2 c6b2e4e7 70cc86b6 a9f13834 00000020 00000001 
16:02:58 ipsec,debug,packet 01108d29 c668012a b987f620 8bda57eb 2a17dbe1 0000032d ffe28b53 cca00907 
16:02:58 ipsec,debug,packet encryption(aes) 
16:02:58 ipsec,debug,packet with key: 
16:02:58 ipsec,debug,packet f3f8b4e7 1cf3bd24 c47d95b3 ba4f1576 fce81d6e c95fcd4e d1c0b141 406249d5 
16:02:58 ipsec,debug,packet encrypted payload by IV: 
16:02:58 ipsec,debug,packet 9e7570a1 d8c74199 e21603d2 746588b8 
16:02:58 ipsec,debug,packet save IV for next: 
16:02:58 ipsec,debug,packet bd785961 85a3fb2a b3fbbb81 06062259 
16:02:58 ipsec,debug,packet encrypted. 
16:02:58 ipsec,debug,packet Adding NON-ESP marker 
16:02:58 ipsec,debug,packet 96 bytes from 10.24.6.76[4500] to xx.xx.xx.xx[4500] 
16:02:58 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:02:58 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:02:58 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:02:58 ipsec,debug,packet src4 10.24.6.76[4500] 
16:02:58 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:02:58 ipsec,debug,packet 1 times of 96 bytes message will be sent to xx.xx.57.
16:02:58 ipsec,debug,packet 00000000 c668012a b987f620 8bda57eb 2a17dbe1 08100501 
16:02:58 ipsec,debug,packet e3a83285 e271c17e 3ef28e23 2fde308a c4211357 b10fbd89 
16:02:58 ipsec,debug,packet 372fa52b e425b514 0d97f86d 2e0f970b bd785961 85a3fb2a 
16:02:58 ipsec,debug,packet sendto Information notify. 
16:02:58 ipsec,debug,packet received a valid R-U-THERE, ACK sent 
16:03:00 ipsec,debug,packet KA: 10.24.6.76[4500]->xx.xx.xx.xx[4500] 
16:03:00 ipsec,debug,packet sockname 10.24.6.76[4500] 
16:03:00 ipsec,debug,packet send packet from 10.24.6.76[4500] 
16:03:00 ipsec,debug,packet send packet to xx.xx.xx.xx[4500] 
16:03:00 ipsec,debug,packet src4 10.24.6.76[4500] 
16:03:00 ipsec,debug,packet dst4 xx.xx.xx.xx[4500] 
16:03:00 ipsec,debug,packet 1 times of 1 bytes message will be sent to xx.xx.xx.xx
16:03:00 ipsec,debug,packet ff 
 
dschn
newbie
Topic Author
Posts: 25
Joined: Wed Nov 16, 2016 2:22 pm

Re: IPSec phase2 won't work - failed to get sainfo

Fri Dec 23, 2016 9:07 am

Okay it seems I really had a problem with defining the subnets. I defined 10.0.0.0/8 as destination address in the ipsec policy, now a tunnel is created when having a look a the installed SAs. Also meraki reports an established tunnel:

msg: IPsec-SA established: ESP/Tunnel xx.xx.xx.xx[500]->213.225.xx.xx[500] spi=215403219(0xcd6cad3)

Unfortunately there is still no traffic going through. Did I forget about something? When I do a traceroute from my client PC with IP 192.168.88.44 to an address at the 10.0.0.0/8 subnet there is only one hop - my local gateway 192.168.88.100.
 
User avatar
mrz
MikroTik Support
MikroTik Support
Posts: 7169
Joined: Wed Feb 07, 2007 12:45 pm
Location: Latvia
Contact:

Re: IPSec phase2 won't work - failed to get sainfo

Fri Dec 23, 2016 1:35 pm

If you have NAT or fasttrack, then it need to be bypassed.
http://wiki.mikrotik.com/wiki/Manual:IP ... ack_Bypass

Also maybe you have strict forwarding rules in firewall, then traffic should be accepted there too.
 
dschn
newbie
Topic Author
Posts: 25
Joined: Wed Nov 16, 2016 2:22 pm

Re: IPSec phase2 won't work - failed to get sainfo

Tue Dec 27, 2016 11:49 am

Thanks, I had the NAT rule added already. Also tried the firewall filter as described, but to no avail. I can see on the firewall, that the outgoing packets hit the accept filter, but still I don't get any reply from the destination subnet. Any chances that this might be some issue with the Meraki side? Did anyone ever succeed making a site-to-site with a Meraki MX appliance? In the Meraki dashboard I only can specify the target subnet, the firewall is set to accept all packets coming from VPN networks.

UPDATE 28th Dec. 16: I never tried pinging the MX appliances IP 10.24.202.254 - which works. That means the tunnel itself is working. It seems that there is some routing behind the MX missing, as we are using MPLS und the LAN 10.0.0.0/8 is distributed all over the country, having several hops in between. Thanks for your time and help!

Who is online

Users browsing this forum: germarsh, jkroon, sas2k, sindy and 25 guests