Sorry for digging this out, but I am experiencing a similar issue between CRS-125-24G-1S RouterOS 6.43.4 while trying to establish an IKEv2 connection to Checkpoint Security R5. Everything is working fine when only one policy is in use. I have to, however, be able to reach two different /32 addresses and it is no possible to group them into a bigger subnet (the remote peer does not accept that). So I had to create two policies, which are identical with the exception of destination address of course.
Reading through the forums I found information that the Policy level should be set to "unique", so I have set policy level to unique for both, but this does not help. Here's a piece of the log file:
nov/27 23:51:44 ipsec,info peer authorized: E.F.G.H[4500]-A.B.C.D[4500] spi:1bc312ed89fda99a:d562bda431f21819
nov/27 23:51:44 ipsec peer selected tunnel mode
nov/27 23:51:44 ipsec processing payload: TS_I
nov/27 23:51:44 ipsec 172.30.0.0/24
nov/27 23:51:44 ipsec processing payload: TS_R
nov/27 23:51:44 ipsec 10.170.10.132
nov/27 23:51:44 ipsec my vs peer's selectors:
nov/27 23:51:44 ipsec 172.30.0.0/24 vs 172.30.0.0/24
nov/27 23:51:44 ipsec 10.170.10.132 vs 10.170.10.132
nov/27 23:51:44 ipsec processing payload: SA
nov/27 23:51:44 ipsec IKE Protocol: ESP
nov/27 23:51:44 ipsec proposal #1
nov/27 23:51:44 ipsec enc: aes256-cbc
nov/27 23:51:44 ipsec auth: sha256
nov/27 23:51:44 ipsec matched proposal:
nov/27 23:51:44 ipsec proposal #1
nov/27 23:51:44 ipsec enc: aes256-cbc
nov/27 23:51:44 ipsec auth: sha256
nov/27 23:51:44 ipsec,debug => child keymat (size 0x80)
nov/27 23:51:44 ipsec,debug f2ccbd97 0e2d870e 5ef15722 49f3fd57 ca01d7d7 0fcabb8a 59a17b84 545c57a9
nov/27 23:51:44 ipsec,debug aa2d81c8 579b8bc2 3c16445b 070c2732 24d5fb5e 4c7b4aba c1100972 bc5f7501
nov/27 23:51:44 ipsec,debug 7561740b 787054e8 a5212cdf 31cf6064 3143e3b2 7a9d37bc 60327d91 d0a94816
nov/27 23:51:44 ipsec,debug c4d3cec8 1cc623ed 7a97866d 7ab1ba40 41b9131d baa1786b 96d668ad 4a5bca34
nov/27 23:51:44 ipsec IPsec-SA established: A.B.C.D[4500]->E.F.G.H[4500] spi=0xba06cbe
nov/27 23:51:44 ipsec IPsec-SA established: E.F.G.H[4500]->A.B.C.D[4500] spi=0x63e3db6b
nov/27 23:51:44 ipsec ph2 possible after ph1 creation
nov/27 23:51:44 ipsec init child for policy: 172.30.0.0/24 <=> 10.200.10.0/24
nov/27 23:51:44 ipsec init child continue
nov/27 23:51:44 ipsec offering proto: 3
nov/27 23:51:44 ipsec proposal #1
nov/27 23:51:44 ipsec enc: aes256-cbc
nov/27 23:51:44 ipsec auth: sha256
nov/27 23:51:44 ipsec dh: modp1024
nov/27 23:51:45 ipsec adding payload: NONCE
nov/27 23:51:45 ipsec,debug => (size 0x1c)
nov/27 23:51:45 ipsec,debug 0000001c 408217c2 b204719a 33259bb9 0b036a29 b489d8bb ae091336
nov/27 23:51:45 ipsec adding payload: KE
nov/27 23:51:45 ipsec,debug => (size 0x88)
nov/27 23:51:45 ipsec,debug 00000088 00020000 d0feef98 dbbba3f1 27a16b65 385103e9 4beb7e74 df2e5e79
nov/27 23:51:45 ipsec,debug ede76133 83e81fb2 0a380b11 4aa4dcd8 624728ca c6e9d139 d7b7a2d5 2d403c4a
nov/27 23:51:45 ipsec,debug 64c53895 3b67a395 c389d422 1147cc8c 22fe0624 052ad541 465aece3 51099e7d
nov/27 23:51:45 ipsec,debug 214df2bf 69e58cfd deebc7f3 cf0f3d5a 08c94928 da7c2351 3182e00d 2b7a2f3f
nov/27 23:51:45 ipsec,debug 5ee7cd58 04701070
nov/27 23:51:45 ipsec adding payload: SA
nov/27 23:51:45 ipsec,debug => (size 0x34)
nov/27 23:51:45 ipsec,debug 00000034 00000030 01030404 054cff37 0300000c 0100000c 800e0100 03000008
nov/27 23:51:45 ipsec,debug 0300000c 03000008 04000002 00000008 05000000
nov/27 23:51:45 ipsec initiator selector: 172.30.0.0/24
nov/27 23:51:45 ipsec adding payload: TS_I
nov/27 23:51:45 ipsec,debug => (size 0x18)
nov/27 23:51:45 ipsec,debug 00000018 01000000 07000010 0000ffff ac1e0000 ac1e00ff
nov/27 23:51:45 ipsec responder selector: 10.200.10.0/24
nov/27 23:51:45 ipsec adding payload: TS_R
nov/27 23:51:45 ipsec,debug => (size 0x18)
nov/27 23:51:45 ipsec,debug 00000018 01000000 07000010 0000ffff 0ac80a00 0ac80aff
nov/27 23:51:45 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:2 A.B.C.D[4500]
nov/27 23:51:45 ipsec,debug,packet => outgoing plain packet (size 0x124)
nov/27 23:51:45 ipsec,debug,packet 1bc312ed 89fda99a d562bda4 31f21819 28202408 00000002 00000124 2200001c
nov/27 23:51:45 ipsec,debug,packet 408217c2 b204719a 33259bb9 0b036a29 b489d8bb ae091336 21000088 00020000
nov/27 23:51:45 ipsec,debug,packet d0feef98 dbbba3f1 27a16b65 385103e9 4beb7e74 df2e5e79 ede76133 83e81fb2
nov/27 23:51:45 ipsec,debug,packet 0a380b11 4aa4dcd8 624728ca c6e9d139 d7b7a2d5 2d403c4a 64c53895 3b67a395
nov/27 23:51:45 ipsec,debug,packet c389d422 1147cc8c 22fe0624 052ad541 465aece3 51099e7d 214df2bf 69e58cfd
nov/27 23:51:45 ipsec,debug,packet deebc7f3 cf0f3d5a 08c94928 da7c2351 3182e00d 2b7a2f3f 5ee7cd58 04701070
nov/27 23:51:45 ipsec,debug,packet 2c000034 00000030 01030404 054cff37 0300000c 0100000c 800e0100 03000008
nov/27 23:51:45 ipsec,debug,packet 0300000c 03000008 04000002 00000008 05000000 2d000018 01000000 07000010
nov/27 23:51:45 ipsec,debug,packet
nov/27 23:51:45 ipsec,debug,packet 0000ffff ac1e0000 ac1e00ff 00000018 01000000 07000010 0000ffff 0ac80a00
nov/27 23:51:45 ipsec,debug,packet 0ac80aff
nov/27 23:51:45 ipsec adding payload: ENC
nov/27 23:51:45 ipsec,debug => (first 0x100 of 0x1c4)
nov/27 23:51:45 ipsec,debug 280001c4 e7cbe847 d6e8d0a2 f6b17beb 17970d03 d30dd8f0 31b058ea 3ad19ec5
nov/27 23:51:45 ipsec,debug bd356961 fb10cfe2 a1725a2b 018eb0e4 adedcfa7 046fd9e9 799c442e 2401dde3
nov/27 23:51:45 ipsec,debug e7ef3f00 c69dc6db 721aaf96 28228a92 2ebed541 756e7a8a c546128b 380e9e48
nov/27 23:51:45 ipsec,debug e937f7ef dca19c6a 652ff8fc a0d76f2a 8b62cf06 b7b45513 77afa2d1 023171f5
nov/27 23:51:45 ipsec,debug b6bd795a fc9c7692 468bb1ed 05941e09 ddca66f4 2943c60d 1b9a4fcc a659147f
nov/27 23:51:45 ipsec,debug fc7f8ef4 94d7a9a3 3fbbb2c0 7b46f5b8 fa9b2b1b 514e6321 93cdaa3a 76165a34
nov/27 23:51:45 ipsec,debug 659023d5 85515a36 2d903268 23eb6987 e32c8640 4d7e13f2 07807fba 7f4d7932
nov/27 23:51:45 ipsec,debug f81e3c41 13f8df34 662fd429 7d1ee4c8 31936d3e ac4fdf42 57329609 f5433f19
nov/27 23:51:45 ipsec,debug ===== sending 480 bytes from E.F.G.H[4500] to A.B.C.D[4500]
nov/27 23:51:45 ipsec,debug 1 times of 484 bytes message will be sent to A.B.C.D[4500]
nov/27 23:51:45 ipsec,debug,packet 1bc312ed 89fda99a d562bda4 31f21819 2e202408 00000002 000001e0 280001c4
nov/27 23:51:45 ipsec,debug,packet e7cbe847 d6e8d0a2 f6b17beb 17970d03 d30dd8f0 31b058ea 3ad19ec5 bd356961
nov/27 23:51:45 ipsec,debug,packet fb10cfe2 a1725a2b 018eb0e4 adedcfa7 046fd9e9 799c442e 2401dde3 e7ef3f00
nov/27 23:51:45 ipsec,debug,packet c69dc6db 721aaf96 28228a92 2ebed541 756e7a8a c546128b 380e9e48 e937f7ef
nov/27 23:51:45 ipsec,debug,packet dca19c6a 652ff8fc a0d76f2a 8b62cf06 b7b45513 77afa2d1 023171f5 b6bd795a
nov/27 23:51:45 ipsec,debug,packet fc9c7692 468bb1ed 05941e09 ddca66f4 2943c60d 1b9a4fcc a659147f fc7f8ef4
nov/27 23:51:45 ipsec,debug,packet 94d7a9a3 3fbbb2c0 7b46f5b8 fa9b2b1b 514e6321 93cdaa3a 76165a34 659023d5
nov/27 23:51:45 ipsec,debug,packet 85515a36 2d903268 23eb6987 e32c8640 4d7e13f2 07807fba 7f4d7932 f81e3c41
nov/27 23:51:45 ipsec,debug,packet 13f8df34 662fd429 7d1ee4c8 31936d3e ac4fdf42 57329609 f5433f19 4a978db3
nov/27 23:51:45 ipsec,debug,packet fc6710fe a0fc95a4 a7405cc4 75736d7d 95b3b6c5 e84e04a3 3881f18d fa5ed97e
nov/27 23:51:45 ipsec,debug,packet 6d28b4fc 98a7afed 5c5b7566 ebfcfc3f 24455881 18d40390 b49fa38a 25a797e1
nov/27 23:51:45 ipsec,debug,packet c73abf59 47bcdd44 49c466ef 421129af c30fc824 3375b18c 907147c8 0494f2dd
nov/27 23:51:45 ipsec,debug,packet 2caae82b cc466d45 c92dbc79 a5564ee3 c5e173db d890ee76 9578222e 6160d5fd
nov/27 23:51:45 ipsec,debug,packet 4eaeedc9 2d68af92 c2c12ac0 b0d80e9c 0ba8b271 c5e4e26f f6c68b37 f1acae3d
nov/27 23:51:45 ipsec,debug,packet 1f24395f abdfe72b d65b938e 6d97cf28 43e5499b 146633d3 1cfab3fb e183a684
nov/27 23:51:47 ipsec,debug ===== received 80 bytes from A.B.C.D[4500] to E.F.G.H[4500]
nov/27 23:51:47 ipsec,debug,packet 0dcf65c8 145a7f37 8e743716 1789a208 2e202500 00000000 00000050 2a000034
nov/27 23:51:47 ipsec,debug,packet 40305720 6651f6d8 4aff3945 b0448982 d1711db1 6d1e6d89 3d028f1c 2d321ef7
nov/27 23:51:47 ipsec,debug,packet 8c553460 69b38358 84c426a4 42ca6878
nov/27 23:51:47 ipsec -> ike2 request, exchange: INFORMATIONAL:0 A.B.C.D[4500]
nov/27 23:51:47 ipsec SPI dcf65c8145a7f37 not registred for A.B.C.D[4500]
nov/27 23:51:48 ipsec,info killing ike2 SA: E.F.G.H[4500]-A.B.C.D[4500] spi:1bc312ed89fda99a:d562bda431f21819
nov/27 23:51:48 ipsec IPsec-SA killing: A.B.C.D[4500]->E.F.G.H[4500] spi=0xba06cbe
nov/27 23:51:48 ipsec IPsec-SA killing: E.F.G.H[4500]->A.B.C.D[4500] spi=0x63e3db6b
nov/27 23:51:48 ipsec adding payload: DELETE
nov/27 23:51:48 ipsec,debug => (size 0x8)
nov/27 23:51:48 ipsec,debug 00000008 01000000
nov/27 23:51:48 ipsec <- ike2 request, exchange: INFORMATIONAL:3 A.B.C.D[4500]
nov/27 23:51:48 ipsec,debug,packet => outgoing plain packet (size 0x24)
nov/27 23:51:48 ipsec,debug,packet 1bc312ed 89fda99a d562bda4 31f21819 2a202508 00000003 00000024 00000008
nov/27 23:51:48 ipsec,debug,packet 01000000
nov/27 23:51:48 ipsec adding payload: ENC
nov/27 23:51:48 ipsec,debug => (size 0xf4)
nov/27 23:51:48 ipsec,debug 2a0000f4 e7cbe847 d6e8d0a2 f6b17beb 17970d03 331e0f58 b25a2665 e11cc892
nov/27 23:51:48 ipsec,debug e8c0f2a6 bf9d7e56 0bdc4185 7794cf2f 916ab4c2 ee883c9a fd479ef3 5c9db7b7
nov/27 23:51:48 ipsec,debug 633858f7 16d8d902 87959b3a 884a74e8 4927af48 630f7cd7 592b4845 b5df20c6
nov/27 23:51:48 ipsec,debug 5d9c2f89 048afea9 0b8e8e52 2c9134f1 ca86f6f9 2e819149 5d70f931 ea3b9378
nov/27 23:51:48 ipsec,debug 02f0bfbd 5bf10c68 32ca380e fe397fb7 c8a84484 d9e60606 e87a526c 2b58289b
nov/27 23:51:48 ipsec,debug f7e7b80a dd377293 6a468a7f f4a70471 4750e547 b7071749 9ea97c24 05b73447
nov/27 23:51:48 ipsec,debug 11b61fed b08633d7 71be089f 243f9db9 7d091ec5 9aeb9bbc 0e6dd103 37116715
nov/27 23:51:48 ipsec,debug 3cafcce3 00000000 00000000 0000ffff 0aaa0a84
nov/27 23:51:48 ipsec,debug ===== sending 272 bytes from E.F.G.H[4500] to A.B.C.D[4500]
nov/27 23:51:48 ipsec,debug 1 times of 276 bytes message will be sent to A.B.C.D[4500]
nov/27 23:51:48 ipsec,debug,packet 1bc312ed 89fda99a d562bda4 31f21819 2e202508 00000003 00000110 2a0000f4
nov/27 23:51:48 ipsec,debug,packet e7cbe847 d6e8d0a2 f6b17beb 17970d03 331e0f58 b25a2665 e11cc892 e8c0f2a6
nov/27 23:51:48 ipsec,debug,packet bf9d7e56 0bdc4185 7794cf2f 916ab4c2 ee883c9a fd479ef3 5c9db7b7 633858f7
nov/27 23:51:48 ipsec,debug,packet 16d8d902 87959b3a 884a74e8 4927af48 630f7cd7 592b4845 b5df20c6 5d9c2f89
nov/27 23:51:48 ipsec,debug,packet 048afea9 0b8e8e52 2c9134f1 ca86f6f9 2e819149 5d70f931 ea3b9378 02f0bfbd
nov/27 23:51:48 ipsec,debug,packet 5bf10c68 32ca380e fe397fb7 c8a84484 d9e60606 e87a526c 2b58289b f7e7b80a
nov/27 23:51:48 ipsec,debug,packet dd377293 6a468a7f f4a70471 4750e547 b7071749 9ea97c24 05b73447 11b61fed
nov/27 23:51:48 ipsec,debug,packet b08633d7 71be089f 243f9db9 7d091ec5 9aeb9bbc 0e6dd103 37116715 3cafcce3
nov/27 23:51:48 ipsec,debug,packet c7946304 f3f0d670 6085722e 58ca3944
nov/27 23:51:48 ipsec KA remove: E.F.G.H[4500]->A.B.C.D[4500]
nov/27 23:51:48 ipsec,debug KA tree dump: E.F.G.H[4500]->A.B.C.D[4500] (in_use=1)
nov/27 23:51:48 ipsec,debug KA removing this one...
nov/27 23:51:58 ipsec,debug ===== received 80 bytes from A.B.C.D[4500] to E.F.G.H[4500]
nov/27 23:51:58 ipsec,debug,packet 0dcf65c8 145a7f37 8e743716 1789a208 2e202500 00000000 00000050 2a000034
nov/27 23:51:58 ipsec,debug,packet 40305720 6651f6d8 4aff3945 b0448982 d1711db1 6d1e6d89 3d028f1c 2d321ef7
nov/27 23:51:58 ipsec,debug,packet 8c553460 69b38358 84c426a4 42ca6878
nov/27 23:51:58 ipsec -> ike2 request, exchange: INFORMATIONAL:0 A.B.C.D[4500]
nov/27 23:51:58 ipsec SPI dcf65c8145a7f37 not registred for A.B.C.D[4500]
nov/27 23:52:14 ipsec,debug ===== received 80 bytes from A.B.C.D[4500] to E.F.G.H[4500]
nov/27 23:52:14 ipsec,debug,packet 0dcf65c8 145a7f37 8e743716 1789a208 2e202500 00000000 00000050 2a000034
nov/27 23:52:14 ipsec,debug,packet 40305720 6651f6d8 4aff3945 b0448982 d1711db1 6d1e6d89 3d028f1c 2d321ef7
nov/27 23:52:14 ipsec,debug,packet 8c553460 69b38358 84c426a4 42ca6878
nov/27 23:52:14 ipsec -> ike2 request, exchange: INFORMATIONAL:0 A.B.C.D[4500]
nov/27 23:52:14 ipsec SPI dcf65c8145a7f37 not registred for A.B.C.D[4500]
nov/27 23:52:37 ipsec,debug ===== received 80 bytes from A.B.C.D[4500] to E.F.G.H[4500]
nov/27 23:52:37 ipsec,debug,packet 0dcf65c8 145a7f37 8e743716 1789a208 2e202500 00000000 00000050 2a000034
nov/27 23:52:37 ipsec,debug,packet 40305720 6651f6d8 4aff3945 b0448982 d1711db1 6d1e6d89 3d028f1c 2d321ef7
nov/27 23:52:37 ipsec,debug,packet 8c553460 69b38358 84c426a4 42ca6878
nov/27 23:52:37 ipsec -> ike2 request, exchange: INFORMATIONAL:0 A.B.C.D[4500]
nov/27 23:52:37 ipsec SPI dcf65c8145a7f37 not registred for A.B.C.D[4500]
nov/27 23:53:09 ipsec,debug ===== received 80 bytes from A.B.C.D[4500] to E.F.G.H[4500]
nov/27 23:53:09 ipsec,debug,packet 0dcf65c8 145a7f37 8e743716 1789a208 2e202500 00000000 00000050 2a000034
nov/27 23:53:09 ipsec,debug,packet 40305720 6651f6d8 4aff3945 b0448982 d1711db1 6d1e6d89 3d028f1c 2d321ef7
nov/27 23:53:09 ipsec,debug,packet 8c553460 69b38358 84c426a4 42ca6878
nov/27 23:53:09 ipsec -> ike2 request, exchange: INFORMATIONAL:0 A.B.C.D[4500]
nov/27 23:53:09 ipsec SPI dcf65c8145a7f37 not registred for A.B.C.D[4500]
I would greatly appreciate any suggestions. It seems like ike2 request, exchange: CREATE_CHILD_SA:2 A.B.C.D[4500] does not work properly with the other end. On Checkpoint the log say: