Thank you Sindy for your continuous efforts to assist (and teach) !
A) The way you describe it, you’ve opted to use a dst-nat rule rather than to restrict the IPsec policy to carry only the L2TP transport packets. Nothing wrong about that. However, it then cannot be a matter of a bypassed dst-nat any more, but there may still be an MTU issue. I’d suggest to run /tool sniffer port=7777,8291 at both the client and the server and see what’s going on.
I don’t see any connections nor packets involving the above mentioned ports …hmmmm
B) First you wrote that you have to disable and re-enable the peer at client, and now you wrote you had to disable and re-enable the peer at the server. Does either approach make it work?
Yes, that is correct…and then on purpose I decided to disable and re-enable on the server side to see whether the link be established or not. It did. So the result is the same on either.
Another point, I was expecting to see a connection towards port 1701 at the server IP at least in the case where it works, but you’ve only shown connections to/from port 4500.
I understand, This is the only connection showing regarding the link when : /ip firewall connection print detail where protocol=udp dst-address~“public.ip.of.server”
If you only disable and re-enable the peer but don’t touch the /interface l2tp-client, what does the /ip ipsec active-peers print show while it doesn’t work?
The connection from Active peers disappears. I checked this one through WinBox, so I assume that nothing would show when: /ip ipsec active-peers print
If there is nothing in the active-peers list, or you keep getting some other STATE than established, you’ll have to create a large enough log buffer at the client, something like
/system logging action add name=ipsec-files target=disk disk-file-name=ipsec-start disk-lines-per-file=5000 disk-file-count=10
then, direct IPsec logging into that buffer:
system logging add topics=ipsec,!packet action=ipsec-files
and then switch the client off, switch it on again after 15 minutes, let it run for, say, another 2 minutes, then disable the /system logging item for IPsec and download the log files ipsec-start-xx.txt for analysis what is wrong about them
This is what the file shows:
Apr/07/2021 08:51:44 ipsec,debug 0.0.0.0[500] used as isakmp port (fd=25)
Apr/07/2021 08:51:44 ipsec,debug 0.0.0.0[4500] used as isakmp port with NAT-T (fd=27)
Apr/07/2021 08:51:47 ipsec,debug failed to bind to ::[500] Bad file descriptor
Apr/07/2021 08:51:53 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:53 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] cf2388996ec53c8a:0000000000000000
Apr/07/2021 08:51:53 ipsec ike2 respond
Apr/07/2021 08:51:53 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: KE (264 bytes)
Apr/07/2021 08:51:53 ipsec payload seen: SA (48 bytes)
Apr/07/2021 08:51:53 ipsec processing payload: NONCE
Apr/07/2021 08:51:53 ipsec processing payload: SA
Apr/07/2021 08:51:53 ipsec IKE Protocol: IKE
Apr/07/2021 08:51:53 ipsec proposal #1
Apr/07/2021 08:51:53 ipsec enc: aes128-cbc
Apr/07/2021 08:51:53 ipsec prf: hmac-sha1
Apr/07/2021 08:51:53 ipsec auth: sha1
Apr/07/2021 08:51:53 ipsec dh: modp2048
Apr/07/2021 08:51:53 ipsec matched proposal:
Apr/07/2021 08:51:53 ipsec proposal #1
Apr/07/2021 08:51:53 ipsec enc: aes128-cbc
Apr/07/2021 08:51:53 ipsec prf: hmac-sha1
Apr/07/2021 08:51:53 ipsec auth: sha1
Apr/07/2021 08:51:53 ipsec dh: modp2048
Apr/07/2021 08:51:53 ipsec processing payload: KE
Apr/07/2021 08:51:54 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 08:51:54 ipsec,debug fbbea5c3 690598f7 7b22bc7f db80fd84 40b6008b 42c1a953 63dcb7de de3dd2d3
Apr/07/2021 08:51:54 ipsec,debug 7475407a b232454a b6e45604 f680ba4a e4ad8bbe adb595fc 80edb70d 5773c98c
Apr/07/2021 08:51:54 ipsec,debug 46c9c706 f5419f22 c6605a84 7be44e89 6f239cd5 d5043c28 1e664eef a163c165
Apr/07/2021 08:51:54 ipsec,debug 9c756800 8912e03c ebe32d5b e371f3be caed00fe c2491e63 898f10d9 39252e24
Apr/07/2021 08:51:54 ipsec,debug e8e9eabf 3bf567b6 09b78a1d 70d62cdb ea22a14f 50efdce7 2af23131 4d336963
Apr/07/2021 08:51:54 ipsec,debug 35453ef9 b6619ce3 89713f0b 79ddf274 8ab3414c 6d1d8ca8 731dc68b 53253057
Apr/07/2021 08:51:54 ipsec,debug 22b9ebcc a607703f 81d05fb5 5cedf087 887f317b 7382ac0b 5579b029 dadd4fb6
Apr/07/2021 08:51:54 ipsec,debug f7dabf25 8b865ed4 183094d3 ba561cec 52f103fc 89ae2db4 83a18074 557a2bd0
Apr/07/2021 08:51:54 ipsec adding payload: SA
Apr/07/2021 08:51:54 ipsec,debug => (size 0x30)
Apr/07/2021 08:51:54 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 08:51:54 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 08:51:54 ipsec adding payload: KE
Apr/07/2021 08:51:54 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 08:51:54 ipsec,debug 00000108 000e0000 99ab7b83 028ba162 58adde7a d63bec0a 59ac5ea5 b4a2b2c4
Apr/07/2021 08:51:54 ipsec,debug e6c56d97 e4df19fc 35c8d338 46d34d7e d25ee21b aa01e252 048524f0 e84c456c
Apr/07/2021 08:51:54 ipsec,debug 3bf055d4 bdd425dc b31348a0 fdade619 fe6c409a 910bd0c5 303148df 4b0143e4
Apr/07/2021 08:51:54 ipsec,debug 7beae54f 1b0f48af 6b748ee2 17d1370e 134424d9 11866520 22b07c99 e32f7eb3
Apr/07/2021 08:51:54 ipsec,debug a260ca57 55e49888 de92b6fa 1bcb2f0e 71b7c26e 2275400e 3fc999e5 9cdfed1b
Apr/07/2021 08:51:54 ipsec,debug 21cde07c 4e893cb3 cf4f5359 50539d34 d17749d9 02b12cd2 e471572a ecf13d4f
Apr/07/2021 08:51:54 ipsec,debug da6f13f3 13aca002 fedf46cb 242b614e ac102de3 b80dc179 48a08a10 5de9f5c1
Apr/07/2021 08:51:54 ipsec,debug 9b3ea54c d8a09b99 1f2e2c57 9fbedd1d a1f23d65 a4fa9ad7 d3849873 991f24b6
Apr/07/2021 08:51:54 ipsec adding payload: NONCE
Apr/07/2021 08:51:54 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:54 ipsec,debug 0000001c c108e3c9 7fa42d45 684f6214 4acd454d cb06d295 1dfa74e5
Apr/07/2021 08:51:54 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:51:54 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:54 ipsec,debug 0000001c 00004004 f0fb450b 3aa989bc 742164df 7ed913f1 c1f4da36
Apr/07/2021 08:51:54 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:51:54 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:54 ipsec,debug 0000001c 00004005 3a1fa3a4 ca13bd17 62af7251 d4d674df 6bbc7a09
Apr/07/2021 08:51:54 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:51:54 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:54 ipsec,debug 00000008 0000402e
Apr/07/2021 08:51:54 ipsec adding payload: CERTREQ
Apr/07/2021 08:51:54 ipsec,debug => (size 0x5)
Apr/07/2021 08:51:54 ipsec,debug 00000005 04
Apr/07/2021 08:51:54 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:54 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:54 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:54 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug d5caaea5 e5123d5f 6d0aa187 a90ef54b 64bc1243
Apr/07/2021 08:51:54 ipsec,debug => keymat (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug 3527ab70 7f4aac35 15cfd421 c9494925 d4ee14c2
Apr/07/2021 08:51:54 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug e3a956ef c3cbd1f3 e9ac07a1 3d68fdf4 60c616d5
Apr/07/2021 08:51:54 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug 90e8a49f 19c5fa3e dad22b1b 529e9890 33890c3f
Apr/07/2021 08:51:54 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 08:51:54 ipsec,debug 334f3e83 9e65ce19 bbeaf8b9 ef2d11f3
Apr/07/2021 08:51:54 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 08:51:54 ipsec,debug 5b33286d 97c0c74b f55f8171 7eb11c39
Apr/07/2021 08:51:54 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug c490e27a d8a73b03 2f2dac58 e48aa689 2cac87a8
Apr/07/2021 08:51:54 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 08:51:54 ipsec,debug d72e128e 7aee6ec2 88f83ee8 503d01e6 886443c6
Apr/07/2021 08:51:54 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:4f23346ef367ea12:cf2388996ec53c8a
Apr/07/2021 08:51:54 ipsec processing payloads: VID (none found)
Apr/07/2021 08:51:54 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:54 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:51:54 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:51:54 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:51:54 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 08:51:54 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:51:54 ipsec fragmentation negotiated
Apr/07/2021 08:51:55 ipsec,debug ===== received 428 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:55 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:55 ipsec payload seen: ENC (400 bytes)
Apr/07/2021 08:51:55 ipsec processing payload: ENC
Apr/07/2021 08:51:55 ipsec,debug => iv (size 0x10)
Apr/07/2021 08:51:55 ipsec,debug eefb701a 8f2434cb 46c5e449 c8a702ab
Apr/07/2021 08:51:55 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 08:51:55 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 59dca605 554d9a83 f3e8d4dd
Apr/07/2021 08:51:55 ipsec,debug 2f449459 8c72e73f 21000008 00004000 2c00002c 00000028 01030403 03d0d156
Apr/07/2021 08:51:55 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 08:51:55 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 08:51:55 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 08:51:55 ipsec,debug decrypted packet
Apr/07/2021 08:51:55 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: SA (44 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 08:51:55 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:55 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:55 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:51:55 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:55 ipsec ike auth: respond
Apr/07/2021 08:51:55 ipsec processing payload: ID_I
Apr/07/2021 08:51:55 ipsec ID_I (ADDR4): ISP CLIENT IP ADDRESS
Apr/07/2021 08:51:55 ipsec processing payload: ID_R (not found)
Apr/07/2021 08:51:55 ipsec processing payload: AUTH
Apr/07/2021 08:51:55 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:55 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:51:55 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:55 ipsec processing payload: AUTH
Apr/07/2021 08:51:55 ipsec requested auth method: SKEY
Apr/07/2021 08:51:55 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug 59dca605 554d9a83 f3e8d4dd 2f449459 8c72e73f
Apr/07/2021 08:51:55 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:51:55 ipsec,debug c108e3c9 7fa42d45 684f6214 4acd454d cb06d295 1dfa74e5
Apr/07/2021 08:51:55 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug c490e27a d8a73b03 2f2dac58 e48aa689 2cac87a8
Apr/07/2021 08:51:55 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug b4924738 9ce41d89 262ffa90 28219cfc eb0832cd
Apr/07/2021 08:51:55 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug 59dca605 554d9a83 f3e8d4dd 2f449459 8c72e73f
Apr/07/2021 08:51:55 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:4f23346ef367ea12:cf2388996ec53c8a
Apr/07/2021 08:51:55 ipsec initial contact
Apr/07/2021 08:51:55 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:55 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:51:55 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:55 ipsec peer wants transport mode
Apr/07/2021 08:51:55 ipsec processing payload: CONFIG (not found)
Apr/07/2021 08:51:55 ipsec processing payload: SA
Apr/07/2021 08:51:55 ipsec IKE Protocol: ESP
Apr/07/2021 08:51:55 ipsec proposal #1
Apr/07/2021 08:51:55 ipsec enc: aes128-cbc
Apr/07/2021 08:51:55 ipsec auth: sha1
Apr/07/2021 08:51:55 ipsec processing payload: TS_I
Apr/07/2021 08:51:55 ipsec 0.0.0.0/0
Apr/07/2021 08:51:55 ipsec processing payload: TS_R
Apr/07/2021 08:51:55 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 08:51:55 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 08:51:55 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 08:51:55 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:51:55 ipsec,debug 6199a078 3b4739e6 992655c7 8fb2fd13 f3838df5 f5d4d1c9
Apr/07/2021 08:51:55 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug d72e128e 7aee6ec2 88f83ee8 503d01e6 886443c6
Apr/07/2021 08:51:55 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug b883b197 28e81329 ed2725b2 6aa80e56 aba9accd
Apr/07/2021 08:51:55 ipsec,debug => my auth (size 0x14)
Apr/07/2021 08:51:55 ipsec,debug ac966e06 1f8a5992 53358c55 187e1399 e476e693
Apr/07/2021 08:51:55 ipsec adding payload: ID_R
Apr/07/2021 08:51:55 ipsec,debug => (size 0xc)
Apr/07/2021 08:51:55 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 08:51:55 ipsec adding payload: AUTH
Apr/07/2021 08:51:55 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:55 ipsec,debug 0000001c 02000000 ac966e06 1f8a5992 53358c55 187e1399 e476e693
Apr/07/2021 08:51:55 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 08:51:55 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:55 ipsec,debug 00000008 00000026
Apr/07/2021 08:51:55 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:55 ipsec,debug ===== sending 140 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:55 ipsec,debug 1 times of 144 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:56 ipsec acquire for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 08:51:56 ipsec connection found for peer: ISP ADDRESS[4500]
Apr/07/2021 08:51:56 ipsec init child for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 08:51:56 ipsec init child continue
Apr/07/2021 08:51:56 ipsec offering proto: 3
Apr/07/2021 08:51:56 ipsec proposal #1
Apr/07/2021 08:51:56 ipsec enc: aes128-cbc
Apr/07/2021 08:51:56 ipsec auth: sha1
Apr/07/2021 08:51:56 ipsec dh: modp2048
Apr/07/2021 08:51:57 ipsec adding payload: NONCE
Apr/07/2021 08:51:57 ipsec,debug => (size 0x1c)
Apr/07/2021 08:51:57 ipsec,debug 0000001c 17ce54f7 365e65fc b91e4144 8770920a 427c05ee 72c9cc99
Apr/07/2021 08:51:57 ipsec adding payload: KE
Apr/07/2021 08:51:57 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 08:51:57 ipsec,debug 00000108 000e0000 20c61f2f e08f497c 54aa87ae 1ec6f462 3fc4e4b3 3cbb3a83
Apr/07/2021 08:51:57 ipsec,debug 98fca45a 764b8b67 04d3ff25 219f5b12 0a1b2e96 9f1b9ba4 28223354 823a5376
Apr/07/2021 08:51:57 ipsec,debug 027d7e59 6b4b2383 d1aaa817 5c110836 a2653084 fd591b9e efdd81b3 125f3509
Apr/07/2021 08:51:57 ipsec,debug ce4a13f9 07ccf2df b7c83028 ea683ee0 a157de3a 144d8f82 2f1c8e71 b02345c0
Apr/07/2021 08:51:57 ipsec,debug 9e6406f0 9365441c c67b3852 5e6c666c d4a38099 9c60b75b c170eb46 aa0d362c
Apr/07/2021 08:51:57 ipsec,debug 99ec6f9f fdc325f3 43ae9fb5 790ba927 c27225bb e145d9f6 5b68f6eb c24abded
Apr/07/2021 08:51:57 ipsec,debug cd4004c7 d7515c4a 8a1875ee 77d71888 01556e81 d20b2453 7f94d9af a0248588
Apr/07/2021 08:51:57 ipsec,debug 9eefa418 f19eabc8 eb06a972 51471800 e02f8f27 2715cb70 fce18333 0bb08f04
Apr/07/2021 08:51:57 ipsec adding payload: SA
Apr/07/2021 08:51:57 ipsec,debug => (size 0x34)
Apr/07/2021 08:51:57 ipsec,debug 00000034 00000030 01030404 04a9f5d4 0300000c 0100000c 800e0080 03000008
Apr/07/2021 08:51:57 ipsec,debug 03000002 03000008 0400000e 00000008 05000000
Apr/07/2021 08:51:57 ipsec initiator selector: 192.168.20.3
Apr/07/2021 08:51:57 ipsec adding payload: TS_I
Apr/07/2021 08:51:57 ipsec,debug => (size 0x18)
Apr/07/2021 08:51:57 ipsec,debug 00000018 01000000 07000010 0000ffff c0a81403 c0a81403
Apr/07/2021 08:51:57 ipsec responder selector: ISP ADDRESS
Apr/07/2021 08:51:57 ipsec adding payload: TS_R
Apr/07/2021 08:51:57 ipsec,debug => (size 0x18)
Apr/07/2021 08:51:57 ipsec,debug 00000018 01000000 07000010 0000ffff 4845becf 4845becf
Apr/07/2021 08:51:57 ipsec adding notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:57 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:57 ipsec,debug 00000008 00004007
Apr/07/2021 08:51:57 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:57 ipsec,debug ===== sending 620 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:57 ipsec,debug 1 times of 624 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug ===== received 620 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:58 ipsec -> ike2 reply, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec payload seen: ENC (592 bytes)
Apr/07/2021 08:51:58 ipsec processing payload: ENC
Apr/07/2021 08:51:58 ipsec,debug => iv (size 0x10)
Apr/07/2021 08:51:58 ipsec,debug 08e95fe6 e45aef3d ed1b976f 6c7b117c
Apr/07/2021 08:51:58 ipsec,debug => decrypted and trimmed payload (size 0x190)
Apr/07/2021 08:51:58 ipsec,debug 2200001c 991a33c1 ab6d10da 37ad2ada 7f8adad8 8da883bd 40a930d1 2c000108
Apr/07/2021 08:51:58 ipsec,debug 000e0000 2887e944 802653e7 4fb05d02 f8f7e30f 2296cf4a 99bde1be d0812ed9
Apr/07/2021 08:51:58 ipsec,debug fb4ca7ec 9d1a3b2c 4b00a22f 399e86f3 2922b5fb c3869ed1 afa44c48 8afcdc48
Apr/07/2021 08:51:58 ipsec,debug b16cb129 e68e17f5 29f0f77b 790618b3 944fec09 f56a6b3d 609b74fc 9ca1422f
Apr/07/2021 08:51:58 ipsec,debug 2725b189 52e5389b a8f4d303 d56dec4a 5e91b45a 67a88b58 29f01c81 86659d89
Apr/07/2021 08:51:58 ipsec,debug 698e5022 9c7104d8 34331e00 dc7ff1ca 3b2ccc3e b74b90b9 88bb3b85 c8cc69fa
Apr/07/2021 08:51:58 ipsec,debug 2fbeb007 2a1c1d0b b4e7403b 3a630b2a 5b28f93b 47b975f6 d67d3917 956d14cf
Apr/07/2021 08:51:58 ipsec,debug 86b3b10a f3601aaf 63196eeb a0729b39 5f6e9582 797e1464 d6cdaa94 fcc2cf02
Apr/07/2021 08:51:58 ipsec,debug
Apr/07/2021 08:51:58 ipsec,debug fa8b9bbb 2d7c5c9b 9bb99d55 2e2fde30 e680b2d8 bafa6739 abae2b45 29159905
Apr/07/2021 08:51:58 ipsec,debug 3bdb073c 2d000018 01000000 07000010 0000ffff b05ca33b b05ca33b 21000018
Apr/07/2021 08:51:58 ipsec,debug 01000000 07000010 0000ffff ac154599 ac154599 29000034 00000030 01030404
Apr/07/2021 08:51:58 ipsec,debug 01365d7f 0300000c 0100000c 800e0080 03000008 03000002 03000008 0400000e
Apr/07/2021 08:51:58 ipsec,debug 00000008 05000000 00000008 00004007
Apr/07/2021 08:51:58 ipsec,debug decrypted packet
Apr/07/2021 08:51:58 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: KE (264 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: SA (52 bytes)
Apr/07/2021 08:51:58 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:51:58 ipsec create child: initiator finish
Apr/07/2021 08:51:58 ipsec processing payloads: NOTIFY
Apr/07/2021 08:51:58 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:51:58 ipsec peer selected transport mode
Apr/07/2021 08:51:58 ipsec processing payload: SA
Apr/07/2021 08:51:58 ipsec IKE Protocol: ESP
Apr/07/2021 08:51:58 ipsec proposal #1
Apr/07/2021 08:51:58 ipsec enc: aes128-cbc
Apr/07/2021 08:51:58 ipsec auth: sha1
Apr/07/2021 08:51:58 ipsec dh: modp2048
Apr/07/2021 08:51:58 ipsec can't agree on proposal
Apr/07/2021 08:51:58 ipsec send notify: NO_PROPOSAL_CHOSEN
Apr/07/2021 08:51:58 ipsec adding notify: NO_PROPOSAL_CHOSEN
Apr/07/2021 08:51:58 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:58 ipsec,debug 00000008 0000000e
Apr/07/2021 08:51:58 ipsec <- ike2 request, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec,debug ===== sending 236 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug 1 times of 240 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,info killing ike2 SA: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:4f23346ef367ea12:cf2388996ec53c8a
Apr/07/2021 08:51:58 ipsec adding payload: DELETE
Apr/07/2021 08:51:58 ipsec,debug => (size 0x8)
Apr/07/2021 08:51:58 ipsec,debug 00000008 01000000
Apr/07/2021 08:51:58 ipsec <- ike2 request, exchange: INFORMATIONAL:2 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec,debug ===== sending 220 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug 1 times of 224 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec KA remove: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug KA tree dump: 192.168.20.3[4500]->ISP ADDRESS[4500] (in_use=1)
Apr/07/2021 08:51:58 ipsec,debug KA removing this one...
Apr/07/2021 08:51:58 ipsec,debug ===== received 140 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:58 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec SPI 4f23346ef367ea12 not registered for ISP ADDRESS[4500]
Apr/07/2021 08:51:58 ipsec,debug ===== received 92 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:51:58 ipsec -> ike2 reply, exchange: INFORMATIONAL:2 ISP ADDRESS[4500] cf2388996ec53c8a:4f23346ef367ea12
Apr/07/2021 08:51:58 ipsec SPI 4f23346ef367ea12 not registered for ISP ADDRESS[4500]
Apr/07/2021 08:52:00 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:52:00 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] 0536c9b454b779f7:0000000000000000
Apr/07/2021 08:52:00 ipsec ike2 respond
Apr/07/2021 08:52:00 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: KE (264 bytes)
Apr/07/2021 08:52:00 ipsec payload seen: SA (48 bytes)
Apr/07/2021 08:52:00 ipsec processing payload: NONCE
Apr/07/2021 08:52:00 ipsec processing payload: SA
Apr/07/2021 08:52:00 ipsec IKE Protocol: IKE
Apr/07/2021 08:52:00 ipsec proposal #1
Apr/07/2021 08:52:00 ipsec enc: aes128-cbc
Apr/07/2021 08:52:00 ipsec prf: hmac-sha1
Apr/07/2021 08:52:00 ipsec auth: sha1
Apr/07/2021 08:52:00 ipsec dh: modp2048
Apr/07/2021 08:52:00 ipsec matched proposal:
Apr/07/2021 08:52:00 ipsec proposal #1
Apr/07/2021 08:52:00 ipsec enc: aes128-cbc
Apr/07/2021 08:52:00 ipsec prf: hmac-sha1
Apr/07/2021 08:52:00 ipsec auth: sha1
Apr/07/2021 08:52:00 ipsec dh: modp2048
Apr/07/2021 08:52:00 ipsec processing payload: KE
Apr/07/2021 08:52:01 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 08:52:01 ipsec,debug 0ded106f cbce211c 74037f12 3bcde2b1 317d9d02 49ef6ec1 cfc79b90 7d4d9dfd
Apr/07/2021 08:52:01 ipsec,debug d0a7a7b0 49d4304e dc65464d 3130e753 aa5cadf8 6e76f0e9 e086d31b 804b925a
Apr/07/2021 08:52:01 ipsec,debug 52d0d983 f4621dbf d6b900fe dfb6933a f2fa7eed b1d2541f 539ea0eb 80f9ff6f
Apr/07/2021 08:52:01 ipsec,debug bbd5a4c7 b2aea561 ef0e4d90 eadcaa6a 92052367 0ec63fe2 b18583b4 d2903e86
Apr/07/2021 08:52:01 ipsec,debug 35804855 a3e4dd43 c95af198 7888f2ce b122a67a 788c6341 e14c0305 84f37ede
Apr/07/2021 08:52:01 ipsec,debug def2f889 ebb4b136 665e80e5 17812598 62e32c39 f3706dcb 941fba6e ba2a7c52
Apr/07/2021 08:52:01 ipsec,debug a47b4c32 bc7389f3 7e6f0fe7 6876481b 1b70c895 886c3f3a 7b3d01ea 1d90cbd2
Apr/07/2021 08:52:01 ipsec,debug 6155b7d0 a24eda51 55bcbffc b1e04523 f14404b0 c0f52946 86b7110e cc10cd08
Apr/07/2021 08:52:01 ipsec adding payload: SA
Apr/07/2021 08:52:01 ipsec,debug => (size 0x30)
Apr/07/2021 08:52:01 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 08:52:01 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 08:52:01 ipsec adding payload: KE
Apr/07/2021 08:52:01 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 08:52:01 ipsec,debug 00000108 000e0000 0468f75b 043578de aad3ced2 0e711160 5ad1d37d b8fe02f7
Apr/07/2021 08:52:01 ipsec,debug 8e74f9a3 5e5a5f73 24b5b5bc f865e8cd 799ee834 225feb6f 5c6aa464 64a4c3a5
Apr/07/2021 08:52:01 ipsec,debug 5dbd982e 11331a1b 4155d920 c688ba06 d9a7cf6e 5ce8e5ec 612d73e9 1c07e310
Apr/07/2021 08:52:01 ipsec,debug 13508dc6 ca0f2ecb e5bbcbce 1804b270 3212950b c10f350c 001e71de f130166b
Apr/07/2021 08:52:01 ipsec,debug 119483ce 66dc2bf1 d6635ccd 0494d6f7 a40c4f46 89bcafed 4bc8d031 dbb07ed6
Apr/07/2021 08:52:01 ipsec,debug 4fbe2d84 31024742 177794df 9e772425 cffb20c0 4f9aa084 e241dc6f 3eeba166
Apr/07/2021 08:52:01 ipsec,debug 7547e7a8 8068e4ff 2e93d75e 8eb6e04b ecbd20e7 0cb683d0 3540d4fc fba2b6a0
Apr/07/2021 08:52:01 ipsec,debug dfc98c72 37eeef02 47f9d656 5a7de339 1016711e db02eefa 198aa7bc d9092c37
Apr/07/2021 08:52:01 ipsec adding payload: NONCE
Apr/07/2021 08:52:01 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:01 ipsec,debug 0000001c 7d9718fc 74402ada 8f9f886e b31142d4 d5da63fa d6f50df3
Apr/07/2021 08:52:01 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:52:01 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:01 ipsec,debug 0000001c 00004004 84021957 0645682e d107353e 495eaec4 766c46aa
Apr/07/2021 08:52:01 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:52:01 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:01 ipsec,debug 0000001c 00004005 c21f1d7d 0918525e 6f035e3c 6f9a1ba1 fad81cd1
Apr/07/2021 08:52:01 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:52:01 ipsec,debug => (size 0x8)
Apr/07/2021 08:52:01 ipsec,debug 00000008 0000402e
Apr/07/2021 08:52:01 ipsec adding payload: CERTREQ
Apr/07/2021 08:52:01 ipsec,debug => (size 0x5)
Apr/07/2021 08:52:01 ipsec,debug 00000005 04
Apr/07/2021 08:52:01 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 08:52:01 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:52:01 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:52:01 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 2960408e 015da77b 36b185cd 4bcb7c43 0643d314
Apr/07/2021 08:52:01 ipsec,debug => keymat (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 6f081aed fec462e5 9a272acb 6ec93ea8 c15843d2
Apr/07/2021 08:52:01 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug bd23114b 8eedc230 de09e308 5766b132 db64850a
Apr/07/2021 08:52:01 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 8f99dc38 15e4d168 1e1f805d a646e99e abb5a3a1
Apr/07/2021 08:52:01 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 08:52:01 ipsec,debug 820f5dd1 34e984e1 3c482db9 dca24357
Apr/07/2021 08:52:01 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 08:52:01 ipsec,debug db4b2822 f2df09de a709866d e9ee0e01
Apr/07/2021 08:52:01 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug c3204228 2d23f613 b05d798d 84606b95 8d298512
Apr/07/2021 08:52:01 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 08:52:01 ipsec,debug 38513f47 8cb0260f 3aea150a 07ca23a0 c8420008
Apr/07/2021 08:52:01 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:5554d89fdedaab65:0536c9b454b779f7
Apr/07/2021 08:52:01 ipsec processing payloads: VID (none found)
Apr/07/2021 08:52:01 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:01 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 08:52:01 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 08:52:01 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 08:52:01 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 08:52:01 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:52:01 ipsec fragmentation negotiated
Apr/07/2021 08:52:02 ipsec,debug ===== received 412 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 08:52:02 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 08:52:02 ipsec payload seen: ENC (384 bytes)
Apr/07/2021 08:52:02 ipsec processing payload: ENC
Apr/07/2021 08:52:02 ipsec,debug => iv (size 0x10)
Apr/07/2021 08:52:02 ipsec,debug af060ec5 938b1187 66cbb0a9 0518576c
Apr/07/2021 08:52:02 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 08:52:02 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 bb88aab0 2ad7555e 9f979817
Apr/07/2021 08:52:02 ipsec,debug 28ba25b6 36214504 21000008 00004000 2c00002c 00000028 01030403 0193cac7
Apr/07/2021 08:52:02 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 08:52:02 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 08:52:02 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 08:52:02 ipsec,debug decrypted packet
Apr/07/2021 08:52:02 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: SA (44 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 08:52:02 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 08:52:02 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:02 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:52:02 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:52:02 ipsec ike auth: respond
Apr/07/2021 08:52:02 ipsec processing payload: ID_I
Apr/07/2021 08:52:02 ipsec ID_I (ADDR4): 172.21.69.153
Apr/07/2021 08:52:02 ipsec processing payload: ID_R (not found)
Apr/07/2021 08:52:02 ipsec processing payload: AUTH
Apr/07/2021 08:52:02 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:02 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:52:02 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:52:02 ipsec processing payload: AUTH
Apr/07/2021 08:52:02 ipsec requested auth method: SKEY
Apr/07/2021 08:52:02 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug bb88aab0 2ad7555e 9f979817 28ba25b6 36214504
Apr/07/2021 08:52:02 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:52:02 ipsec,debug 7d9718fc 74402ada 8f9f886e b31142d4 d5da63fa d6f50df3
Apr/07/2021 08:52:02 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug c3204228 2d23f613 b05d798d 84606b95 8d298512
Apr/07/2021 08:52:02 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug a5b1f832 dceb7114 5dced26e de618f1c d0fdb445
Apr/07/2021 08:52:02 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug bb88aab0 2ad7555e 9f979817 28ba25b6 36214504
Apr/07/2021 08:52:02 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:5554d89fdedaab65:0536c9b454b779f7
Apr/07/2021 08:52:02 ipsec initial contact
Apr/07/2021 08:52:02 ipsec processing payloads: NOTIFY
Apr/07/2021 08:52:02 ipsec notify: INITIAL_CONTACT
Apr/07/2021 08:52:02 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 08:52:02 ipsec peer wants transport mode
Apr/07/2021 08:52:02 ipsec processing payload: CONFIG (not found)
Apr/07/2021 08:52:02 ipsec processing payload: SA
Apr/07/2021 08:52:02 ipsec IKE Protocol: ESP
Apr/07/2021 08:52:02 ipsec proposal #1
Apr/07/2021 08:52:02 ipsec enc: aes128-cbc
Apr/07/2021 08:52:02 ipsec auth: sha1
Apr/07/2021 08:52:02 ipsec processing payload: TS_I
Apr/07/2021 08:52:02 ipsec 0.0.0.0/0
Apr/07/2021 08:52:02 ipsec processing payload: TS_R
Apr/07/2021 08:52:02 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 08:52:02 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 08:52:02 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 08:52:02 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 08:52:02 ipsec,debug d4af488f cad96d62 8be774c8 123901e3 58e09cd4 c6e87866
Apr/07/2021 08:52:02 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug 38513f47 8cb0260f 3aea150a 07ca23a0 c8420008
Apr/07/2021 08:52:02 ipsec,debug => idhash (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug 202ec285 129628d6 7c3f0f0f 37f23881 a3a7b305
Apr/07/2021 08:52:02 ipsec,debug => my auth (size 0x14)
Apr/07/2021 08:52:02 ipsec,debug 7f00a7d9 eefede7c 03b323e7 0df78eae 7ee285ab
Apr/07/2021 08:52:02 ipsec adding payload: ID_R
Apr/07/2021 08:52:02 ipsec,debug => (size 0xc)
Apr/07/2021 08:52:02 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 08:52:02 ipsec adding payload: AUTH
Apr/07/2021 08:52:02 ipsec,debug => (size 0x1c)
Apr/07/2021 08:52:02 ipsec,debug 0000001c 02000000 7f00a7d9 eefede7c 03b323e7 0df78eae 7ee285ab
Apr/07/2021 08:52:02 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 08:52:02 ipsec,debug => (size 0x8)
Apr/07/2021 08:52:02 ipsec,debug 00000008 00000026
Apr/07/2021 08:52:02 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 08:52:02 ipsec,debug ===== sending 364 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 08:52:02 ipsec,debug 1 times of 368 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 08:52:03 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 08:52:03 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:39 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:39 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:46 ipsec acquire for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:35:46 ipsec connection found for peer: ISP ADDRESS[4500]
Apr/07/2021 13:35:46 ipsec init child for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:35:46 ipsec init child continue
Apr/07/2021 13:35:46 ipsec offering proto: 3
Apr/07/2021 13:35:46 ipsec proposal #1
Apr/07/2021 13:35:46 ipsec enc: aes128-cbc
Apr/07/2021 13:35:46 ipsec auth: sha1
Apr/07/2021 13:35:46 ipsec dh: modp2048
Apr/07/2021 13:35:47 ipsec adding payload: NONCE
Apr/07/2021 13:35:47 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:47 ipsec,debug 0000001c 0af36dc6 1207b4fa f9f1205a 2b445e29 65c25d02 32600b42
Apr/07/2021 13:35:47 ipsec adding payload: KE
Apr/07/2021 13:35:47 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:35:47 ipsec,debug 00000108 000e0000 4e77b09d 6f936632 eae614dc 16eb4064 b19e13e1 d7f79d83
Apr/07/2021 13:35:47 ipsec,debug 8290a0aa 63149161 9b09df59 319e2e47 f5d0a505 6559c831 1f7bbca5 f2a014cc
Apr/07/2021 13:35:47 ipsec,debug 81206fd0 4db7227c 0931a63d 58ca8d53 c3aace7e b655d72b 3324fb9f a0aa8be3
Apr/07/2021 13:35:47 ipsec,debug 1cf6f749 cddef5ac e428a76a 48b09bdb 6ba25279 97ac2b0f e9b09587 27f271e6
Apr/07/2021 13:35:47 ipsec,debug 10212786 cbc2dab6 45ad16bb 55929bc3 7b16baa8 d8af1b0d 8dff09fe b88cfd50
Apr/07/2021 13:35:47 ipsec,debug 3df7e88c 9fc6096c b5e0307f f28498b1 b4abf3ef 90f89488 6426b1d8 7feb3935
Apr/07/2021 13:35:47 ipsec,debug b0a2ab78 af1b5c27 0be7eba9 033418ac ab27d2c2 76bab16e cbd4b3f4 5c0ca0f9
Apr/07/2021 13:35:47 ipsec,debug 9b8a8273 bc76d5f5 7def9b3e 799d9d40 862ee392 8a307e9b 445b6fe5 5c8948d8
Apr/07/2021 13:35:47 ipsec adding payload: SA
Apr/07/2021 13:35:47 ipsec,debug => (size 0x34)
Apr/07/2021 13:35:47 ipsec,debug 00000034 00000030 01030404 01921624 0300000c 0100000c 800e0080 03000008
Apr/07/2021 13:35:47 ipsec,debug 03000002 03000008 0400000e 00000008 05000000
Apr/07/2021 13:35:47 ipsec initiator selector: 192.168.20.3
Apr/07/2021 13:35:47 ipsec adding payload: TS_I
Apr/07/2021 13:35:47 ipsec,debug => (size 0x18)
Apr/07/2021 13:35:47 ipsec,debug 00000018 01000000 07000010 0000ffff c0a81403 c0a81403
Apr/07/2021 13:35:47 ipsec responder selector: ISP ADDRESS
Apr/07/2021 13:35:47 ipsec adding payload: TS_R
Apr/07/2021 13:35:47 ipsec,debug => (size 0x18)
Apr/07/2021 13:35:47 ipsec,debug 00000018 01000000 07000010 0000ffff 4845becf 4845becf
Apr/07/2021 13:35:47 ipsec adding notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:47 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:47 ipsec,debug 00000008 00004007
Apr/07/2021 13:35:47 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 13:35:47 ipsec,debug ===== sending 604 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec,debug 1 times of 608 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec child negitiation timeout in state 4
Apr/07/2021 13:35:47 ipsec,info killing ike2 SA: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:5554d89fdedaab65:0536c9b454b779f7
Apr/07/2021 13:35:47 ipsec adding payload: DELETE
Apr/07/2021 13:35:47 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:47 ipsec,debug 00000008 01000000
Apr/07/2021 13:35:47 ipsec <- ike2 request, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 13:35:47 ipsec,debug ===== sending 284 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec,debug 1 times of 288 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec KA remove: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:47 ipsec,debug KA tree dump: 192.168.20.3[4500]->ISP ADDRESS[4500] (in_use=1)
Apr/07/2021 13:35:47 ipsec,debug KA removing this one...
Apr/07/2021 13:35:48 ipsec,debug ===== received 108 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:35:48 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] 0536c9b454b779f7:5554d89fdedaab65
Apr/07/2021 13:35:48 ipsec SPI 5554d89fdedaab65 not registered for ISP ADDRESS[4500]
Apr/07/2021 13:35:50 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:35:50 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] fbc83897ab43a555:0000000000000000
Apr/07/2021 13:35:50 ipsec ike2 respond
Apr/07/2021 13:35:50 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: KE (264 bytes)
Apr/07/2021 13:35:50 ipsec payload seen: SA (48 bytes)
Apr/07/2021 13:35:50 ipsec processing payload: NONCE
Apr/07/2021 13:35:50 ipsec processing payload: SA
Apr/07/2021 13:35:50 ipsec IKE Protocol: IKE
Apr/07/2021 13:35:50 ipsec proposal #1
Apr/07/2021 13:35:50 ipsec enc: aes128-cbc
Apr/07/2021 13:35:50 ipsec prf: hmac-sha1
Apr/07/2021 13:35:50 ipsec auth: sha1
Apr/07/2021 13:35:50 ipsec dh: modp2048
Apr/07/2021 13:35:50 ipsec matched proposal:
Apr/07/2021 13:35:50 ipsec proposal #1
Apr/07/2021 13:35:50 ipsec enc: aes128-cbc
Apr/07/2021 13:35:50 ipsec prf: hmac-sha1
Apr/07/2021 13:35:50 ipsec auth: sha1
Apr/07/2021 13:35:50 ipsec dh: modp2048
Apr/07/2021 13:35:50 ipsec processing payload: KE
Apr/07/2021 13:35:51 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 13:35:51 ipsec,debug aeba70f9 1a94284b f5f02784 3cb9da0e 33266280 7d241c0c 6d8b43a4 daea7c97
Apr/07/2021 13:35:51 ipsec,debug 62c19cf5 05c8a269 8e1f393e a3f19e30 2415b145 fceb4ec4 2fff3f0b 2debcbc9
Apr/07/2021 13:35:51 ipsec,debug 2ea4bf3b 8649e97c 036ecd1d 963a606f 3217e153 e544e5f8 da39bef1 482f1aa2
Apr/07/2021 13:35:51 ipsec,debug 9f5a32e3 9802a9ba a215b82f 8f0a4316 381012eb ee3da9a7 4b5b5880 40518a1a
Apr/07/2021 13:35:51 ipsec,debug 28cf575c 9b539f63 4bd91134 148a0f6f 802c40bf c08ceef5 25911815 1e29639d
Apr/07/2021 13:35:51 ipsec,debug ec37cf01 a021c781 2ee41173 7cb28944 ba0a7ed6 16e49d84 ba373cd8 cec0973f
Apr/07/2021 13:35:51 ipsec,debug 8f16929e 92a2be24 3e16b614 269c2a69 be9ffb36 d8264726 91aa6a6a 5fe1fca7
Apr/07/2021 13:35:51 ipsec,debug 9c269706 5a288aed 598c1520 6d94b8aa 29929aa1 9b0d63a9 8b419d79 aef88dc6
Apr/07/2021 13:35:51 ipsec adding payload: SA
Apr/07/2021 13:35:51 ipsec,debug => (size 0x30)
Apr/07/2021 13:35:51 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 13:35:51 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 13:35:51 ipsec adding payload: KE
Apr/07/2021 13:35:51 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:35:51 ipsec,debug 00000108 000e0000 d8176f70 63e173d9 3ad28d07 56f18dda 061169c3 82d2b57b
Apr/07/2021 13:35:51 ipsec,debug 12834e5f 2a603514 b6689e6e 741125a6 80c72c76 5b582402 4a03424e 7d8c2557
Apr/07/2021 13:35:51 ipsec,debug 101708cf e2960b6b ccc53570 58cd7f81 04919f83 ba2c6ca6 4b6653ce e0e7b858
Apr/07/2021 13:35:51 ipsec,debug 2df5eeab 956fa028 9301bda6 e15a2a68 7cec8117 35e6c1b3 c116275f 1b828a05
Apr/07/2021 13:35:51 ipsec,debug 45127fa9 2a688549 9d3eca41 e61563f5 d8d9c27e 7d969605 448e38c1 141c5ddd
Apr/07/2021 13:35:51 ipsec,debug 0dbba72a db87f38b f98dcd67 bd34fb61 936bbfdb 9891c554 9f10319f 7b3779cc
Apr/07/2021 13:35:51 ipsec,debug 855e338c 07d9cdff 242dd6b1 71ccfb27 3e1173f3 442db1d8 9dac4061 a0a9eedd
Apr/07/2021 13:35:51 ipsec,debug 27d643d4 d9963cdd 7f1bed3f c82bea4a 4cef3418 1b4c5e95 8fe5a0a7 42fb4d77
Apr/07/2021 13:35:51 ipsec adding payload: NONCE
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c b63de5f1 f0be987e ed3ddd72 8aad48c1 bdc8ea07 f16841fa
Apr/07/2021 13:35:51 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c 00004004 070c0eb8 94ef2487 5547b50a c72e5c56 0372e162
Apr/07/2021 13:35:51 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c 00004005 35095469 88d9f906 0f9861e4 6868cdcd 4f501a44
Apr/07/2021 13:35:51 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:35:51 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:51 ipsec,debug 00000008 0000402e
Apr/07/2021 13:35:51 ipsec adding payload: CERTREQ
Apr/07/2021 13:35:51 ipsec,debug => (size 0x5)
Apr/07/2021 13:35:51 ipsec,debug 00000005 04
Apr/07/2021 13:35:51 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:35:51 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug f6709fd4 cefdcb7a 128fd4d3 ae41072a 804db9fa
Apr/07/2021 13:35:51 ipsec,debug => keymat (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 38c73286 dbbc608b 89bbd3e2 f4d5879a 7e96bed4
Apr/07/2021 13:35:51 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug a2852e3f f710fb91 fae7ff5b c9b188cc 3a8e027c
Apr/07/2021 13:35:51 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 8015a9c3 9fc6e3c2 321daa74 fec26d1c 112dd7c1
Apr/07/2021 13:35:51 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 13:35:51 ipsec,debug 2fff8836 d55426ba 1769abf2 bb7300fe
Apr/07/2021 13:35:51 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 13:35:51 ipsec,debug 05994acf f05e05ea 42120222 002599f7
Apr/07/2021 13:35:51 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 46c89d5e 516dba61 3cd5de99 81537e41 f269e214
Apr/07/2021 13:35:51 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug f4bcb433 72451997 54ee8176 cfbf2de4 437ebf0d
Apr/07/2021 13:35:51 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:a5eaa91b237c8515:fbc83897ab43a555
Apr/07/2021 13:35:51 ipsec processing payloads: VID (none found)
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:35:51 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:35:51 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:35:51 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 13:35:51 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec fragmentation negotiated
Apr/07/2021 13:35:51 ipsec,debug ===== received 460 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:35:51 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:35:51 ipsec payload seen: ENC (432 bytes)
Apr/07/2021 13:35:51 ipsec processing payload: ENC
Apr/07/2021 13:35:51 ipsec,debug => iv (size 0x10)
Apr/07/2021 13:35:51 ipsec,debug 5aef4a93 377cc7ed 89d3b0eb cc23e65b
Apr/07/2021 13:35:51 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 13:35:51 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 546d02f7 1e06b4b3 abbef540
Apr/07/2021 13:35:51 ipsec,debug 31cb6060 a7d19249 21000008 00004000 2c00002c 00000028 01030403 00457966
Apr/07/2021 13:35:51 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 13:35:51 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 13:35:51 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 13:35:51 ipsec,debug decrypted packet
Apr/07/2021 13:35:51 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: SA (44 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 13:35:51 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:35:51 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:51 ipsec ike auth: respond
Apr/07/2021 13:35:51 ipsec processing payload: ID_I
Apr/07/2021 13:35:51 ipsec ID_I (ADDR4): 172.21.69.153
Apr/07/2021 13:35:51 ipsec processing payload: ID_R (not found)
Apr/07/2021 13:35:51 ipsec processing payload: AUTH
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:35:51 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:51 ipsec processing payload: AUTH
Apr/07/2021 13:35:51 ipsec requested auth method: SKEY
Apr/07/2021 13:35:51 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 546d02f7 1e06b4b3 abbef540 31cb6060 a7d19249
Apr/07/2021 13:35:51 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:35:51 ipsec,debug b63de5f1 f0be987e ed3ddd72 8aad48c1 bdc8ea07 f16841fa
Apr/07/2021 13:35:51 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 46c89d5e 516dba61 3cd5de99 81537e41 f269e214
Apr/07/2021 13:35:51 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug c75bf466 a81b3aa9 4db72031 6beab7bd ea2af14a
Apr/07/2021 13:35:51 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 546d02f7 1e06b4b3 abbef540 31cb6060 a7d19249
Apr/07/2021 13:35:51 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:a5eaa91b237c8515:fbc83897ab43a555
Apr/07/2021 13:35:51 ipsec initial contact
Apr/07/2021 13:35:51 ipsec processing payloads: NOTIFY
Apr/07/2021 13:35:51 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:35:51 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:35:51 ipsec peer wants transport mode
Apr/07/2021 13:35:51 ipsec processing payload: CONFIG (not found)
Apr/07/2021 13:35:51 ipsec processing payload: SA
Apr/07/2021 13:35:51 ipsec IKE Protocol: ESP
Apr/07/2021 13:35:51 ipsec proposal #1
Apr/07/2021 13:35:51 ipsec enc: aes128-cbc
Apr/07/2021 13:35:51 ipsec auth: sha1
Apr/07/2021 13:35:51 ipsec processing payload: TS_I
Apr/07/2021 13:35:51 ipsec 0.0.0.0/0
Apr/07/2021 13:35:51 ipsec processing payload: TS_R
Apr/07/2021 13:35:51 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 13:35:51 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 13:35:51 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 13:35:51 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:35:51 ipsec,debug 5959863a e51c4d10 23bfa014 159c6889 c75d7572 0d0b26ae
Apr/07/2021 13:35:51 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug f4bcb433 72451997 54ee8176 cfbf2de4 437ebf0d
Apr/07/2021 13:35:51 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug 32fcc29c 9044c1f7 fd57d487 d23b5e23 73a61790
Apr/07/2021 13:35:51 ipsec,debug => my auth (size 0x14)
Apr/07/2021 13:35:51 ipsec,debug ed34b106 5b7f5ca6 cc9e2fd2 ee78b9a1 eae7f478
Apr/07/2021 13:35:51 ipsec adding payload: ID_R
Apr/07/2021 13:35:51 ipsec,debug => (size 0xc)
Apr/07/2021 13:35:51 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 13:35:51 ipsec adding payload: AUTH
Apr/07/2021 13:35:51 ipsec,debug => (size 0x1c)
Apr/07/2021 13:35:51 ipsec,debug 0000001c 02000000 ed34b106 5b7f5ca6 cc9e2fd2 ee78b9a1 eae7f478
Apr/07/2021 13:35:51 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 13:35:51 ipsec,debug => (size 0x8)
Apr/07/2021 13:35:51 ipsec,debug 00000008 00000026
Apr/07/2021 13:35:51 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:35:51 ipsec,debug ===== sending 348 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:35:51 ipsec,debug 1 times of 352 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:35:59 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:35:59 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:19 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:19 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:20 ipsec acquire for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:36:20 ipsec connection found for peer: ISP ADDRESS[4500]
Apr/07/2021 13:36:20 ipsec init child for policy: 192.168.20.3 <=> ISP ADDRESS
Apr/07/2021 13:36:20 ipsec init child continue
Apr/07/2021 13:36:20 ipsec offering proto: 3
Apr/07/2021 13:36:20 ipsec proposal #1
Apr/07/2021 13:36:20 ipsec enc: aes128-cbc
Apr/07/2021 13:36:20 ipsec auth: sha1
Apr/07/2021 13:36:20 ipsec dh: modp2048
Apr/07/2021 13:36:21 ipsec adding payload: NONCE
Apr/07/2021 13:36:21 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:21 ipsec,debug 0000001c 91141652 b4c48d3f 3483a233 73a0588c d5df0c65 0d4e0f06
Apr/07/2021 13:36:21 ipsec adding payload: KE
Apr/07/2021 13:36:21 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:36:21 ipsec,debug 00000108 000e0000 bada2529 1e0245f2 e44228bb dbd2d0fb a9b83813 dbdf4f32
Apr/07/2021 13:36:21 ipsec,debug c5ab35e8 ff8caf12 eeb7ee87 06a178de 014edbda 70dbde77 26282e69 8a2de677
Apr/07/2021 13:36:21 ipsec,debug 428f0d48 38ea0e3c 2270f400 1487c9b3 6ae17b6d 6e10b4c6 f0e5a705 f4ca4744
Apr/07/2021 13:36:21 ipsec,debug d2b79c2a a487337d 75fbd994 7c78c8e2 e56996a9 ae8694d6 ff6dc113 4f345645
Apr/07/2021 13:36:21 ipsec,debug 44db7b33 8050bf04 6cbbcddc d4782dba 66049d5f 489e85a4 2bc9dd45 3cbd5246
Apr/07/2021 13:36:21 ipsec,debug 30425260 09f61a69 a4d799fe a339fa48 5aea0fce a0adeda0 e8082dc3 f1550513
Apr/07/2021 13:36:21 ipsec,debug 24991025 da17f558 29d5bbe6 3030437a 0051dd0c 133f42f7 fb3085ca 35b845e3
Apr/07/2021 13:36:21 ipsec,debug 0a29f03a 4dbf3662 1f847ecd b0fbd69c d245c672 a1f2f3e1 313fe865 aa3abac4
Apr/07/2021 13:36:21 ipsec adding payload: SA
Apr/07/2021 13:36:21 ipsec,debug => (size 0x34)
Apr/07/2021 13:36:21 ipsec,debug 00000034 00000030 01030404 02bd80b1 0300000c 0100000c 800e0080 03000008
Apr/07/2021 13:36:21 ipsec,debug 03000002 03000008 0400000e 00000008 05000000
Apr/07/2021 13:36:21 ipsec initiator selector: 192.168.20.3
Apr/07/2021 13:36:21 ipsec adding payload: TS_I
Apr/07/2021 13:36:21 ipsec,debug => (size 0x18)
Apr/07/2021 13:36:21 ipsec,debug 00000018 01000000 07000010 0000ffff c0a81403 c0a81403
Apr/07/2021 13:36:21 ipsec responder selector: ISP ADDRESS
Apr/07/2021 13:36:21 ipsec adding payload: TS_R
Apr/07/2021 13:36:21 ipsec,debug => (size 0x18)
Apr/07/2021 13:36:21 ipsec,debug 00000018 01000000 07000010 0000ffff 4845becf 4845becf
Apr/07/2021 13:36:21 ipsec adding notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:21 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:21 ipsec,debug 00000008 00004007
Apr/07/2021 13:36:21 ipsec <- ike2 request, exchange: CREATE_CHILD_SA:0 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:36:21 ipsec,debug ===== sending 620 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec,debug 1 times of 624 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec child negitiation timeout in state 4
Apr/07/2021 13:36:21 ipsec,info killing ike2 SA: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:a5eaa91b237c8515:fbc83897ab43a555
Apr/07/2021 13:36:21 ipsec adding payload: DELETE
Apr/07/2021 13:36:21 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:21 ipsec,debug 00000008 01000000
Apr/07/2021 13:36:21 ipsec <- ike2 request, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:36:21 ipsec,debug ===== sending 252 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec,debug 1 times of 256 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec KA remove: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:21 ipsec,debug KA tree dump: 192.168.20.3[4500]->ISP ADDRESS[4500] (in_use=1)
Apr/07/2021 13:36:21 ipsec,debug KA removing this one...
Apr/07/2021 13:36:22 ipsec,debug ===== received 92 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:36:22 ipsec -> ike2 reply, exchange: INFORMATIONAL:1 ISP ADDRESS[4500] fbc83897ab43a555:a5eaa91b237c8515
Apr/07/2021 13:36:22 ipsec SPI a5eaa91b237c8515 not registered for ISP ADDRESS[4500]
Apr/07/2021 13:36:24 ipsec,debug ===== received 432 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:36:24 ipsec -> ike2 request, exchange: SA_INIT:0 ISP ADDRESS[4500] 89bce8d0d7a745ef:0000000000000000
Apr/07/2021 13:36:24 ipsec ike2 respond
Apr/07/2021 13:36:24 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: NOTIFY (28 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: NONCE (28 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: KE (264 bytes)
Apr/07/2021 13:36:24 ipsec payload seen: SA (48 bytes)
Apr/07/2021 13:36:24 ipsec processing payload: NONCE
Apr/07/2021 13:36:24 ipsec processing payload: SA
Apr/07/2021 13:36:24 ipsec IKE Protocol: IKE
Apr/07/2021 13:36:24 ipsec proposal #1
Apr/07/2021 13:36:24 ipsec enc: aes128-cbc
Apr/07/2021 13:36:24 ipsec prf: hmac-sha1
Apr/07/2021 13:36:24 ipsec auth: sha1
Apr/07/2021 13:36:24 ipsec dh: modp2048
Apr/07/2021 13:36:24 ipsec matched proposal:
Apr/07/2021 13:36:24 ipsec proposal #1
Apr/07/2021 13:36:24 ipsec enc: aes128-cbc
Apr/07/2021 13:36:24 ipsec prf: hmac-sha1
Apr/07/2021 13:36:24 ipsec auth: sha1
Apr/07/2021 13:36:24 ipsec dh: modp2048
Apr/07/2021 13:36:24 ipsec processing payload: KE
Apr/07/2021 13:36:25 ipsec,debug => shared secret (size 0x100)
Apr/07/2021 13:36:25 ipsec,debug 6c7516d9 9c9670be 0b16d419 4f2cac91 e5cda6cc 96428d3e 8b78237e f4594ced
Apr/07/2021 13:36:25 ipsec,debug 8711d24d ef2d90e9 b7f4bc5e a6c4ef9b 1bc328b7 c588ca9c 45e8fc5e ef786dae
Apr/07/2021 13:36:25 ipsec,debug 432666f9 688f385c 50a96296 08467135 0bddf82c 815c1771 2e45592c 2851f6ae
Apr/07/2021 13:36:25 ipsec,debug 74faa4c2 80d4cdc3 5692962a 25a1625a 43ccfa6f 8609f3f6 b83dac57 eacd7ea6
Apr/07/2021 13:36:25 ipsec,debug d925610c 253f7c6b 1575f444 653c83e3 704d983e 96c8d85a 2b8b6611 0073f181
Apr/07/2021 13:36:25 ipsec,debug d8496d2c b5016787 6a9fad0b 1170525a 176f9452 dd73618f af85f3b9 b6c779f5
Apr/07/2021 13:36:25 ipsec,debug 20396aea 76331ddd ba132fef 5a57f301 9e7d9d39 69bdea18 ceb7f8da 881e4849
Apr/07/2021 13:36:25 ipsec,debug f38c096f 1aea4e21 1934930f eedfc070 0aa41011 0681bb5e 4f90e8e3 717bbbb1
Apr/07/2021 13:36:25 ipsec adding payload: SA
Apr/07/2021 13:36:25 ipsec,debug => (size 0x30)
Apr/07/2021 13:36:25 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0080 03000008 02000002
Apr/07/2021 13:36:25 ipsec,debug 03000008 03000002 00000008 0400000e
Apr/07/2021 13:36:25 ipsec adding payload: KE
Apr/07/2021 13:36:25 ipsec,debug => (first 0x100 of 0x108)
Apr/07/2021 13:36:25 ipsec,debug 00000108 000e0000 25c6d76a 9cb6b6ad df0025a7 b9f964e2 58724d5c 19d284b8
Apr/07/2021 13:36:25 ipsec,debug 11324f6d f87da5fd 85f5d384 cc183a74 4d81195b 0344d8d4 bcc15d2b 9ba5a60f
Apr/07/2021 13:36:25 ipsec,debug e0d94b49 0af44735 fa526402 060a7c80 d03ca682 f2a1f138 ef580def cfdaa543
Apr/07/2021 13:36:25 ipsec,debug 01252718 734bb05d 3671dead d2fabf5f 0edc4594 92901ac9 ec3975fc 565743f5
Apr/07/2021 13:36:25 ipsec,debug 44899795 7fc3f93d b625d78b 234da447 9f86a42c da2ded2e 3776d498 193130ea
Apr/07/2021 13:36:25 ipsec,debug 3f243f1e 407fcbea b6584139 9cff0490 f143394d 0e5a65a7 e135ac28 96a70761
Apr/07/2021 13:36:25 ipsec,debug dbf427fc db37663c f074064a 25aee4c5 ebfd4f23 086be101 37e93a1b c2dc2825
Apr/07/2021 13:36:25 ipsec,debug d66eeb23 5cbd77ee e0eed07d bc4ce2f6 96aed9b1 008984a8 b8574446 4d1fa2c5
Apr/07/2021 13:36:25 ipsec adding payload: NONCE
Apr/07/2021 13:36:25 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:25 ipsec,debug 0000001c 48697613 6ec67da6 af5b6a52 a86ad848 7365c010 bd6a2478
Apr/07/2021 13:36:25 ipsec adding notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:36:25 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:25 ipsec,debug 0000001c 00004004 3c242328 b661c2f6 89789793 adee08f9 4726520d
Apr/07/2021 13:36:25 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:36:25 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:25 ipsec,debug 0000001c 00004005 82b66212 131c2e89 607b30ce c2971d58 0eb7388a
Apr/07/2021 13:36:25 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:36:25 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:25 ipsec,debug 00000008 0000402e
Apr/07/2021 13:36:25 ipsec adding payload: CERTREQ
Apr/07/2021 13:36:25 ipsec,debug => (size 0x5)
Apr/07/2021 13:36:25 ipsec,debug 00000005 04
Apr/07/2021 13:36:25 ipsec <- ike2 reply, exchange: SA_INIT:0 ISP ADDRESS[4500] 89bce8d0d7a745ef:e6dc5476d3cf5126
Apr/07/2021 13:36:25 ipsec,debug ===== sending 437 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:25 ipsec,debug 1 times of 441 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:25 ipsec,debug => skeyseed (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug a0f06947 136a13d4 64d0e53a 33500aa0 165dcc2c
Apr/07/2021 13:36:25 ipsec,debug => keymat (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug 8bdbb31a fe167d65 49b7f268 b621a557 db3df7ec
Apr/07/2021 13:36:25 ipsec,debug => SK_ai (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug b3323d93 a0deb0e6 08701ea1 2e21fff0 797d8ea7
Apr/07/2021 13:36:25 ipsec,debug => SK_ar (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug 47095869 df53da5e 1e6cb375 1c8beb14 70a3528c
Apr/07/2021 13:36:25 ipsec,debug => SK_ei (size 0x10)
Apr/07/2021 13:36:25 ipsec,debug 5278f724 977d2976 f79113fb f29c9b3e
Apr/07/2021 13:36:25 ipsec,debug => SK_er (size 0x10)
Apr/07/2021 13:36:25 ipsec,debug 676c6d85 13f0e1b4 9c24fd3b 9d17a3f7
Apr/07/2021 13:36:25 ipsec,debug => SK_pi (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug e2941106 3fda3383 2caf51a8 0ac1ccc0 bcac654f
Apr/07/2021 13:36:25 ipsec,debug => SK_pr (size 0x14)
Apr/07/2021 13:36:25 ipsec,debug 2bae0a16 e06e146c 2af58435 659b2343 25731708
Apr/07/2021 13:36:25 ipsec,info new ike2 SA (R): 192.168.20.3[4500]-ISP ADDRESS[4500] spi:e6dc5476d3cf5126:89bce8d0d7a745ef
Apr/07/2021 13:36:25 ipsec processing payloads: VID (none found)
Apr/07/2021 13:36:25 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:25 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
Apr/07/2021 13:36:25 ipsec notify: NAT_DETECTION_DESTINATION_IP
Apr/07/2021 13:36:25 ipsec notify: NAT_DETECTION_SOURCE_IP
Apr/07/2021 13:36:25 ipsec (NAT-T) REMOTE LOCAL
Apr/07/2021 13:36:25 ipsec KA list add: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:25 ipsec fragmentation negotiated
Apr/07/2021 13:36:26 ipsec,debug ===== received 428 bytes from ISP ADDRESS[4500] to 192.168.20.3[4500]
Apr/07/2021 13:36:26 ipsec -> ike2 request, exchange: AUTH:1 ISP ADDRESS[4500] 89bce8d0d7a745ef:e6dc5476d3cf5126
Apr/07/2021 13:36:26 ipsec payload seen: ENC (400 bytes)
Apr/07/2021 13:36:26 ipsec processing payload: ENC
Apr/07/2021 13:36:26 ipsec,debug => iv (size 0x10)
Apr/07/2021 13:36:26 ipsec,debug 2089ddd1 4dd0028a 43f44c7d 48bf5247
Apr/07/2021 13:36:26 ipsec,debug => decrypted and trimmed payload (size 0x94)
Apr/07/2021 13:36:26 ipsec,debug 2700000c 01000000 ac154599 2900001c 02000000 c3278863 4bfea4ec ceafc452
Apr/07/2021 13:36:26 ipsec,debug ab7e1cb4 ac9174ed 21000008 00004000 2c00002c 00000028 01030403 02ed1eb0
Apr/07/2021 13:36:26 ipsec,debug 0300000c 0100000c 800e0080 03000008 03000002 00000008 05000000 2d000018
Apr/07/2021 13:36:26 ipsec,debug 01000000 07000010 0000ffff 00000000 ffffffff 29000018 01000000 07000010
Apr/07/2021 13:36:26 ipsec,debug 0000ffff b05ca33b b05ca33b 00000008 00004007
Apr/07/2021 13:36:26 ipsec,debug decrypted packet
Apr/07/2021 13:36:26 ipsec payload seen: ID_I (12 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: AUTH (28 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: SA (44 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: TS_I (24 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: TS_R (24 bytes)
Apr/07/2021 13:36:26 ipsec payload seen: NOTIFY (8 bytes)
Apr/07/2021 13:36:26 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:26 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:36:26 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:26 ipsec ike auth: respond
Apr/07/2021 13:36:26 ipsec processing payload: ID_I
Apr/07/2021 13:36:26 ipsec ID_I (ADDR4): 172.21.69.153
Apr/07/2021 13:36:26 ipsec processing payload: ID_R (not found)
Apr/07/2021 13:36:26 ipsec processing payload: AUTH
Apr/07/2021 13:36:26 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:26 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:36:26 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:26 ipsec processing payload: AUTH
Apr/07/2021 13:36:26 ipsec requested auth method: SKEY
Apr/07/2021 13:36:26 ipsec,debug => peer's auth (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug c3278863 4bfea4ec ceafc452 ab7e1cb4 ac9174ed
Apr/07/2021 13:36:26 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:36:26 ipsec,debug 48697613 6ec67da6 af5b6a52 a86ad848 7365c010 bd6a2478
Apr/07/2021 13:36:26 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug e2941106 3fda3383 2caf51a8 0ac1ccc0 bcac654f
Apr/07/2021 13:36:26 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug def86bc2 0e9c5c7a 0b1ea216 d0218a44 47b6a7cd
Apr/07/2021 13:36:26 ipsec,debug => calculated peer's AUTH (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug c3278863 4bfea4ec ceafc452 ab7e1cb4 ac9174ed
Apr/07/2021 13:36:26 ipsec,info,account peer authorized: 192.168.20.3[4500]-ISP ADDRESS[4500] spi:e6dc5476d3cf5126:89bce8d0d7a745ef
Apr/07/2021 13:36:26 ipsec initial contact
Apr/07/2021 13:36:26 ipsec processing payloads: NOTIFY
Apr/07/2021 13:36:26 ipsec notify: INITIAL_CONTACT
Apr/07/2021 13:36:26 ipsec notify: USE_TRANSPORT_MODE
Apr/07/2021 13:36:26 ipsec peer wants transport mode
Apr/07/2021 13:36:26 ipsec processing payload: CONFIG (not found)
Apr/07/2021 13:36:26 ipsec processing payload: SA
Apr/07/2021 13:36:26 ipsec IKE Protocol: ESP
Apr/07/2021 13:36:26 ipsec proposal #1
Apr/07/2021 13:36:26 ipsec enc: aes128-cbc
Apr/07/2021 13:36:26 ipsec auth: sha1
Apr/07/2021 13:36:26 ipsec processing payload: TS_I
Apr/07/2021 13:36:26 ipsec 0.0.0.0/0
Apr/07/2021 13:36:26 ipsec processing payload: TS_R
Apr/07/2021 13:36:26 ipsec ISP CLIENT IP ADDRESS
Apr/07/2021 13:36:26 ipsec skipping not specific selector in transport mode with NAT
Apr/07/2021 13:36:26 ipsec ID_R (ADDR4): 192.168.20.3
Apr/07/2021 13:36:26 ipsec,debug => auth nonce (size 0x18)
Apr/07/2021 13:36:26 ipsec,debug 1a7282db 6c7c55b5 9cc3462f a05029ae e8697751 bc576a8e
Apr/07/2021 13:36:26 ipsec,debug => SK_p (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug 2bae0a16 e06e146c 2af58435 659b2343 25731708
Apr/07/2021 13:36:26 ipsec,debug => idhash (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug a4912301 4695b4ab a9dcf6f3 4f5c9771 9115697c
Apr/07/2021 13:36:26 ipsec,debug => my auth (size 0x14)
Apr/07/2021 13:36:26 ipsec,debug 04f8d6c8 63253661 f10cd15a 265d269d 6c959dc3
Apr/07/2021 13:36:26 ipsec adding payload: ID_R
Apr/07/2021 13:36:26 ipsec,debug => (size 0xc)
Apr/07/2021 13:36:26 ipsec,debug 0000000c 01000000 c0a81403
Apr/07/2021 13:36:26 ipsec adding payload: AUTH
Apr/07/2021 13:36:26 ipsec,debug => (size 0x1c)
Apr/07/2021 13:36:26 ipsec,debug 0000001c 02000000 04f8d6c8 63253661 f10cd15a 265d269d 6c959dc3
Apr/07/2021 13:36:26 ipsec adding notify: TS_UNACCEPTABLE
Apr/07/2021 13:36:26 ipsec,debug => (size 0x8)
Apr/07/2021 13:36:26 ipsec,debug 00000008 00000026
Apr/07/2021 13:36:26 ipsec <- ike2 reply, exchange: AUTH:1 ISP ADDRESS[4500] 89bce8d0d7a745ef:e6dc5476d3cf5126
Apr/07/2021 13:36:26 ipsec,debug ===== sending 364 bytes from 192.168.20.3[4500] to ISP ADDRESS[4500]
Apr/07/2021 13:36:26 ipsec,debug 1 times of 368 bytes message will be sent to ISP ADDRESS[4500]
Apr/07/2021 13:36:39 ipsec,debug KA: 192.168.20.3[4500]->ISP ADDRESS[4500]
Apr/07/2021 13:36:39 ipsec,debug 1 times of 1 bytes message will be sent to ISP ADDRESS[4500]
Without most making any sense to me, I have a feeling that there is a NAT issue causing it? Then again, why without changing anything, and by disabling-enabling the peer, it comes back on-line? I vaguely remember that during some tests if I unplugged and then powered back the client before the 10-minute DPD check (5 times every 120 seconds), the link would be established automatically…just in case it matters.
C) I haven’t checked your firewall rules. Again, sniffing is your best friend here, it will show you how far the packets get. If a packet arrives to some intermediate router but doesn’t leave it, that router may not have a route for it, a firewall rule in chain forwardon that router may block it, or an IPsec policy may divert it into an SA; if a packet arrives to the destination router but there is no response to it, a firewall rule in chain input may block the request packet, an IPsec policy may reverse-match it (which means the packet is dropped if it doesn’t arrive via the SA associated to that policy), a route may be missing for the response, or the process expected to receive that request doesn’t listen (maybe because there is a restriction on addresses from which the requests are accepted).
Let me work on the firewall rules and get back to you…all three MT clients + Server MT (and the rest clients in the future) are/will be behind regular ISP modems (modems take care of firewall rules, in the sense that they are not in bridge mode). Was looking/hoping to keep a very simple firewall rule table in the MT’s, under the understanding that MT firewall works in the opposite way than “commercial modems”, meaning allowing everything-unless-blocking-it …