So.. everything worked fine for a few months on this RB4011, until today, when random clients decided to not work anymore, they connect to the server but can’t pass traffic.
What I can see relevant in the logs is in the topic title, but why is this happening, no ideea.
Running 6.46.6.
Help.
LE: upgraded to 6.46.7, same thing.
13:00:43 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:00:43 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 5bb4be18378b4174:f4cb98cc2c50073b
13:00:43 ipsec SPI 3b07502ccc98cbf4 not registered for CLIENT.IP.ADDR[4500]
13:00:43 ipsec,debug ===== received 528 bytes from CLIENT.IP.ADDR[500] to SERVER.IP.ADDR[500]
13:00:43 ipsec -> ike2 request, exchange: SA_INIT:0 CLIENT.IP.ADDR[500] c3952d17a841f992:0000000000000000
13:00:43 ipsec ike2 respond
13:00:43 ipsec payload seen: SA (256 bytes)
13:00:43 ipsec payload seen: KE (136 bytes)
13:00:43 ipsec payload seen: NONCE (52 bytes)
13:00:43 ipsec payload seen: NOTIFY (28 bytes)
13:00:43 ipsec payload seen: NOTIFY (28 bytes)
13:00:43 ipsec processing payload: NONCE
13:00:43 ipsec processing payload: SA
13:00:43 ipsec,debug unknown auth: #13
13:00:43 ipsec,debug unknown prf: #6
13:00:43 ipsec,debug unknown auth: #13
13:00:43 ipsec,debug unknown prf: #6
13:00:43 ipsec IKE Protocol: IKE
13:00:43 ipsec proposal #1
13:00:43 ipsec enc: 3des-cbc
13:00:43 ipsec prf: hmac-sha1
13:00:43 ipsec auth: sha1
13:00:43 ipsec dh: modp1024
13:00:43 ipsec proposal #2
13:00:43 ipsec enc: aes256-cbc
13:00:43 ipsec prf: hmac-sha1
13:00:43 ipsec auth: sha1
13:00:43 ipsec dh: modp1024
13:00:43 ipsec proposal #3
13:00:43 ipsec enc: 3des-cbc
13:00:43 ipsec prf: hmac-sha256
13:00:43 ipsec auth: sha256
13:00:43 ipsec dh: modp1024
13:00:43 ipsec proposal #4
13:00:43 ipsec enc: aes256-cbc
13:00:43 ipsec prf: hmac-sha256
13:00:43 ipsec auth: sha256
13:00:43 ipsec dh: modp1024
13:00:43 ipsec proposal #5
13:00:43 ipsec enc: 3des-cbc
13:00:43 ipsec prf: unknown
13:00:43 ipsec auth: unknown
13:00:43 ipsec dh: modp1024
13:00:43 ipsec proposal #6
13:00:43 ipsec enc: aes256-cbc
13:00:43 ipsec prf: unknown
13:00:43 ipsec auth: unknown
13:00:43 ipsec dh: modp1024
13:00:43 ipsec matched proposal:
13:00:43 ipsec proposal #2
13:00:43 ipsec enc: aes256-cbc
13:00:43 ipsec prf: hmac-sha1
13:00:43 ipsec auth: sha1
13:00:43 ipsec dh: modp1024
13:00:43 ipsec processing payload: KE
13:00:43 ipsec,debug => shared secret (size 0x80)
[...]
13:00:43 ipsec adding payload: SA
13:00:43 ipsec,debug => (size 0x30)
[...]
13:00:43 ipsec adding payload: KE
13:00:43 ipsec,debug => (size 0x88)
[...]
13:00:43 ipsec adding payload: NONCE
13:00:43 ipsec,debug => (size 0x1c)
13:00:43 ipsec,debug 0000001c 6c2b020c 1c12f76b 1fab52b8 17d3daa7 e5212847 4adf26f2
13:00:43 ipsec adding notify: NAT_DETECTION_SOURCE_IP
13:00:43 ipsec,debug => (size 0x1c)
13:00:43 ipsec,debug 0000001c 00004004 8f2abe6d 34ca607e 519b96ec ec6d21f6 e7b16e85
13:00:43 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
13:00:43 ipsec,debug => (size 0x1c)
13:00:43 ipsec,debug 0000001c 00004005 5804205d dda7c687 a7d52d4d 9bd93df1 043f0166
13:00:43 ipsec adding payload: CERTREQ
13:00:43 ipsec,debug => (size 0x5)
13:00:43 ipsec,debug 00000005 04
13:00:43 ipsec <- ike2 reply, exchange: SA_INIT:0 CLIENT.IP.ADDR[500] c3952d17a841f992:7d2a8948979076ff
13:00:43 ipsec,debug ===== sending 301 bytes from SERVER.IP.ADDR[500] to CLIENT.IP.ADDR[500]
13:00:43 ipsec,debug 1 times of 301 bytes message will be sent to CLIENT.IP.ADDR[500]
13:00:43 ipsec,debug => skeyseed (size 0x14)
13:00:43 ipsec,debug 2d83dfec 051130a9 79ffa3cd 3e934aac 547798d6
13:00:43 ipsec,debug => keymat (size 0x14)
13:00:43 ipsec,debug 60acabf0 d677961a d7d511e9 939e6b21 47daeaba
13:00:43 ipsec,debug => SK_ai (size 0x14)
13:00:43 ipsec,debug 21df5f64 4d266c11 e80d8e90 658a1a8d 4063283a
13:00:43 ipsec,debug => SK_ar (size 0x14)
13:00:43 ipsec,debug f4fe5ede fffb3644 b8c3b207 d251306e f708a6ef
13:00:43 ipsec,debug => SK_ei (size 0x20)
13:00:43 ipsec,debug 2555c543 897f842c 5d06b335 8b4c6dbc de29cbd1 8124cbf5 7a813001 b07ccfca
13:00:43 ipsec,debug => SK_er (size 0x20)
13:00:43 ipsec,debug 7955ab71 89939ee0 7ab3cbed 482daf76 b23f0891 6bbec076 3254b0ca 1be2b410
13:00:43 ipsec,debug => SK_pi (size 0x14)
13:00:43 ipsec,debug ffcea3fe 4f3cf3af 3f569695 0a16356b 7c723564
13:00:43 ipsec,debug => SK_pr (size 0x14)
13:00:43 ipsec,debug 66fbef5a 7de8ac5f a71ebb66 9b79c902 2f1c3f9c
13:00:43 ipsec,info new ike2 SA (R): SERVER.IP.ADDR[500]-CLIENT.IP.ADDR[500] spi:7d2a8948979076ff:c3952d17a841f992
13:00:43 ipsec processing payloads: VID (none found)
13:00:43 ipsec processing payloads: NOTIFY
13:00:43 ipsec notify: NAT_DETECTION_SOURCE_IP
13:00:43 ipsec notify: NAT_DETECTION_DESTINATION_IP
13:00:43 ipsec (NAT-T) REMOTE
13:00:43 ipsec KA list add: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:00:44 ipsec,debug ===== received 2684 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:00:44 ipsec -> ike2 request, exchange: AUTH:1 CLIENT.IP.ADDR[4500] c3952d17a841f992:7d2a8948979076ff
13:00:44 ipsec payload seen: ENC (2656 bytes)
13:00:44 ipsec processing payload: ENC
13:00:44 ipsec,debug => iv (size 0x10)
13:00:44 ipsec,debug 764011a9 3662bb4c 7fcdee9e 0f45b585
13:00:44 ipsec,debug => plain payload (trimmed) (first 0x100 of 0xa30)
[...]
13:00:44 ipsec,debug decrypted
13:00:44 ipsec payload seen: ID_I (41 bytes)
13:00:44 ipsec payload seen: CERT (938 bytes)
13:00:44 ipsec payload seen: CERTREQ (1205 bytes)
13:00:44 ipsec payload seen: AUTH (264 bytes)
13:00:44 ipsec payload seen: NOTIFY (8 bytes)
13:00:44 ipsec payload seen: CONFIG (24 bytes)
13:00:44 ipsec payload seen: SA (80 bytes)
13:00:44 ipsec payload seen: TS_I (24 bytes)
13:00:44 ipsec payload seen: TS_R (24 bytes)
13:00:44 ipsec processing payloads: NOTIFY
13:00:44 ipsec notify: MOBIKE_SUPPORTED
13:00:44 ipsec ike auth: respond
13:00:44 ipsec processing payload: ID_I
13:00:44 ipsec ID_I (DER DN): nexus-pc.peco.frasin
13:00:44 ipsec processing payload: ID_R (not found)
13:00:44 ipsec processing payload: AUTH
13:00:44 ipsec processing payload: CERT
13:00:44 ipsec got CERT: client.cert
13:00:44 ipsec,debug => (size 0x3a5)
[...]
13:00:44 ipsec,debug dc7a0bb1 8d
13:00:44 ipsec processing payloads: NOTIFY
13:00:44 ipsec notify: MOBIKE_SUPPORTED
13:00:44 ipsec processing payload: AUTH
13:00:44 ipsec requested auth method: RSA
13:00:44 ipsec,debug => peer's auth (size 0x100)
[...]
13:00:44 ipsec,debug => auth nonce (size 0x18)
13:00:44 ipsec,debug 6c2b020c 1c12f76b 1fab52b8 17d3daa7 e5212847 4adf26f2
13:00:44 ipsec,debug => SK_p (size 0x14)
13:00:44 ipsec,debug ffcea3fe 4f3cf3af 3f569695 0a16356b 7c723564
13:00:44 ipsec,debug => idhash (size 0x14)
13:00:44 ipsec,debug 8f73b268 c619c6b0 732ae8f6 04b60770 37eb2096
13:00:44 ipsec,info,account peer authorized: SERVER.IP.ADDR[4500]-CLIENT.IP.ADDR[4500] spi:7d2a8948979076ff:c3952d17a841f992
13:00:44 ipsec processing payloads: NOTIFY
13:00:44 ipsec notify: MOBIKE_SUPPORTED
13:00:44 ipsec peer wants tunnel mode
13:00:44 ipsec processing payload: CONFIG
13:00:44 ipsec attribute: internal IPv4 address
13:00:44 ipsec attribute: internal IPv4 DNS
13:00:44 ipsec attribute: internal IPv4 NBNS
13:00:44 ipsec attribute: MS internal IPv4 server
13:00:44 ipsec processing payload: TS_I
13:00:44 ipsec 0.0.0.0/0
13:00:44 ipsec processing payload: TS_R
13:00:44 ipsec 0.0.0.0/0
13:00:44 ipsec TSi in tunnel mode replaced with config address: 172.28.248.0/24
13:00:44 ipsec TSr in tunnel mode replaced with split subnet: 192.168.248.0/24
13:00:44 ipsec canditate selectors: 192.168.248.0/24 <=> 172.28.248.14
13:00:44 ipsec processing payload: SA
13:00:44 ipsec IKE Protocol: ESP
13:00:44 ipsec proposal #1
13:00:44 ipsec enc: aes256-cbc
13:00:44 ipsec auth: sha1
13:00:44 ipsec proposal #2
13:00:44 ipsec enc: 3des-cbc
13:00:44 ipsec auth: sha1
13:00:44 ipsec searching for policy for selector: 192.168.248.0/24 <=> 172.28.248.14
13:00:44 ipsec generating policy
13:00:44 ipsec matched proposal:
13:00:44 ipsec proposal #1
13:00:44 ipsec enc: aes256-cbc
13:00:44 ipsec auth: sha1
13:00:44 ipsec ike auth: finish
13:00:44 ipsec ID_R (FQDN): [...]
13:00:44 ipsec processing payload: NONCE
13:00:44 ipsec,debug => auth nonce (size 0x30)
13:00:44 ipsec,debug fd6802c7 266d4437 87b8e20f c16218ba 4489ac7b ee72c982 1077f15b cb727651
13:00:44 ipsec,debug bd5eea39 6285c61d 1eea90ba c3646564
13:00:44 ipsec,debug => SK_p (size 0x14)
13:00:44 ipsec,debug 66fbef5a 7de8ac5f a71ebb66 9b79c902 2f1c3f9c
13:00:44 ipsec,debug => idhash (size 0x14)
13:00:44 ipsec,debug ff621f18 5f833c53 8ada4d5b 69675083 56328283
13:00:44 ipsec,debug => my auth (size 0x100)
[...]
13:00:44 ipsec cert: server.cert
13:00:44 ipsec adding payload: CERT
13:00:44 ipsec,debug => (first 0x100 of 0x3d7)
[...]
13:00:44 ipsec adding payload: ID_R
13:00:44 ipsec,debug => (size 0x21)
13:00:44 ipsec,debug 00000021 02000000 7a332e72 61646175 74692e65 75726f2d 7465686e 69632e72
13:00:44 ipsec,debug 6f
13:00:44 ipsec adding payload: AUTH
13:00:44 ipsec,debug => (first 0x100 of 0x108)
[...]
13:00:44 ipsec prepearing internal IPv4 address
13:00:44 ipsec prepearing internal IPv4 netmask
13:00:44 ipsec prepearing internal IPv6 subnet
13:00:44 ipsec adding payload: CONFIG
13:00:44 ipsec,debug => (size 0x24)
13:00:44 ipsec,debug 00000024 02000000 00010004 ac1cf80e 00020004 ffffff00 000d0008 c0a8f800
13:00:44 ipsec,debug ffffff00
13:00:44 ipsec initiator selector: 172.28.248.14
13:00:44 ipsec adding payload: TS_I
13:00:44 ipsec,debug => (size 0x18)
13:00:44 ipsec,debug 00000018 01000000 07000010 0000ffff ac1cf80e ac1cf80e
13:00:44 ipsec responder selector: 192.168.248.0/24
13:00:44 ipsec adding payload: TS_R
13:00:44 ipsec,debug => (size 0x18)
13:00:44 ipsec,debug 00000018 01000000 07000010 0000ffff c0a8f800 c0a8f8ff
13:00:44 ipsec adding payload: SA
13:00:44 ipsec,debug => (size 0x2c)
13:00:44 ipsec,debug 0000002c 00000028 01030403 00ac8905 0300000c 0100000c 800e0100 03000008
13:00:44 ipsec,debug 03000002 00000008 05000000
13:00:44 ipsec <- ike2 reply, exchange: AUTH:1 CLIENT.IP.ADDR[4500] c3952d17a841f992:7d2a8948979076ff
13:00:44 ipsec,debug ===== sending 1644 bytes from SERVER.IP.ADDR[4500] to CLIENT.IP.ADDR[4500]
13:00:44 ipsec,debug 1 times of 1648 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:00:44 ipsec,debug => child keymat (size 0x78)
[...]
13:00:44 ipsec IPsec-SA established: CLIENT.IP.ADDR[4500]->SERVER.IP.ADDR[4500] spi=0xac8905
13:00:44 ipsec IPsec-SA established: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500] spi=0x150d8501
13:00:46 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:00:46 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] b11fd45efa9bc4fa:cf4eae90ff15f549
13:00:46 ipsec SPI 49f515ff90ae4ecf not registered for CLIENT.IP.ADDR[4500]
13:00:48 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:00:48 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 760c35ec088aba1b:e17939f2e0d7a175
13:00:48 ipsec SPI 75a1d7e0f23979e1 not registered for CLIENT.IP.ADDR[4500]
13:00:50 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:00:50 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 55831bbbccd4d65d:62dcc1ea15a31c5a
13:00:50 ipsec SPI 5a1ca315eac1dc62 not registered for CLIENT.IP.ADDR[4500]
13:00:56 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:00:56 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:01:02 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:02 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] b11fd45efa9bc4fa:cf4eae90ff15f549
13:01:02 ipsec SPI 49f515ff90ae4ecf not registered for CLIENT.IP.ADDR[4500]
13:01:04 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:04 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 9e399247461797c5:cc3c5c259b8d473c
13:01:04 ipsec SPI 3c478d9b255c3ccc not registered for CLIENT.IP.ADDR[4500]
[..]
13:01:16 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:01:16 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:01:16 ipsec sending dpd packet
[...]
13:01:16 ipsec payload seen: ENC (112 bytes)
13:01:16 ipsec processing payload: ENC
13:01:16 ipsec,debug => iv (size 0x10)
13:01:16 ipsec,debug 8ede295c 5ff527cb 65e6db1b 56a3cab0
13:01:16 ipsec,debug => plain payload (trimmed) (size 0x0)
13:01:16 ipsec,debug decrypted
13:01:16 ipsec dpd collision
[...]
13:01:16 ipsec payload seen: ENC (128 bytes)
13:01:16 ipsec processing payload: ENC
13:01:16 ipsec,debug => iv (size 0x10)
13:01:16 ipsec,debug 85980c15 f9a47347 2e940f1c a7565d3a
13:01:16 ipsec,debug => plain payload (trimmed) (size 0x0)
13:01:16 ipsec,debug decrypted
13:01:16 ipsec respond: info
13:01:16 ipsec,debug reply ignored
13:01:31 ipsec sending dpd packet
[...]
13:01:31 ipsec payload seen: ENC (48 bytes)
13:01:31 ipsec processing payload: ENC
13:01:31 ipsec,debug => iv (size 0x10)
13:01:31 ipsec,debug ed475be6 17a15b2c 7c5539ed c00a1bdf
13:01:31 ipsec,debug => plain payload (trimmed) (size 0x0)
13:01:31 ipsec,debug decrypted
13:01:31 ipsec respond: info
13:01:31 ipsec,debug reply ignored
13:01:32 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:32 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] b11fd45efa9bc4fa:cf4eae90ff15f549
13:01:32 ipsec SPI 49f515ff90ae4ecf not registered for CLIENT.IP.ADDR[4500]
13:01:34 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:34 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:01:34 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
[...]
13:01:36 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:01:36 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:01:36 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:36 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] e5c6c59620089051:43454680f3df61a7
13:01:36 ipsec SPI a761dff380464543 not registered for CLIENT.IP.ADDR[4500]
13:01:36 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:36 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:01:36 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
13:01:39 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:39 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:01:39 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
13:01:42 ipsec sending dpd packet
[...]
13:01:42 ipsec payload seen: ENC (64 bytes)
13:01:42 ipsec processing payload: ENC
13:01:42 ipsec,debug => iv (size 0x10)
13:01:42 ipsec,debug 6d5cc273 cd489c18 61671d08 263a34a4
13:01:42 ipsec,debug => plain payload (trimmed) (size 0x0)
13:01:42 ipsec,debug decrypted
13:01:42 ipsec dpd collision
[...]
13:01:42 ipsec payload seen: ENC (80 bytes)
13:01:42 ipsec processing payload: ENC
13:01:42 ipsec,debug => iv (size 0x10)
13:01:42 ipsec,debug 02176aef 5b5faf8b 65517f7e d30863b8
13:01:42 ipsec,debug => plain payload (trimmed) (size 0x0)
13:01:42 ipsec,debug decrypted
13:01:42 ipsec respond: info
13:01:42 ipsec,debug reply ignored
13:01:43 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:43 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:01:43 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
13:01:49 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:49 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 760c35ec088aba1b:e17939f2e0d7a175
13:01:49 ipsec SPI 75a1d7e0f23979e1 not registered for CLIENT.IP.ADDR[4500]
13:01:51 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:51 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:01:51 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
[...]
13:01:55 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:55 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 780eef68084c98b9:d9c0a584d36563f1
13:01:55 ipsec SPI f16365d384a5c0d9 not registered for CLIENT.IP.ADDR[4500]
[...]
13:01:56 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:01:56 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:01:59 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:01:59 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 08858a865ae5bc63:3c6a23a54e03b5d5
13:01:59 ipsec SPI d5b5034ea5236a3c not registered for CLIENT.IP.ADDR[4500]
[...]
13:02:05 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:05 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] e54b551edb87afe2:80fbcbddb8f34ac2
13:02:05 ipsec SPI c24af3b8ddcbfb80 not registered for CLIENT.IP.ADDR[4500]
13:02:05 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:05 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 9e399247461797c5:cc3c5c259b8d473c
13:02:05 ipsec SPI 3c478d9b255c3ccc not registered for CLIENT.IP.ADDR[4500]
[...]
13:02:07 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:07 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:02:07 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
[...]
13:02:16 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:02:16 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:02:21 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:21 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] fc85ac080a4e5987:f191500a5846422d
13:02:21 ipsec SPI 2d4246580a5091f1 not registered for CLIENT.IP.ADDR[4500]
13:02:33 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:33 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] b11fd45efa9bc4fa:cf4eae90ff15f549
13:02:33 ipsec SPI 49f515ff90ae4ecf not registered for CLIENT.IP.ADDR[4500]
[...]
13:02:36 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:02:36 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:02:38 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:38 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 156ac3e7a99519dc:efaff804dfcbf0b0
13:02:38 ipsec SPI b0f0cbdf04f8afef not registered for CLIENT.IP.ADDR[4500]
13:02:43 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:43 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 5bb4be18378b4174:f4cb98cc2c50073b
13:02:43 ipsec SPI 3b07502ccc98cbf4 not registered for CLIENT.IP.ADDR[4500]
13:02:44 ipsec sending dpd packet
13:02:44 ipsec <- ike2 request, exchange: INFORMATIONAL:0 CLIENT.IP.ADDR[4500] c3952d17a841f992:7d2a8948979076ff
13:02:44 ipsec,debug ===== sending 156 bytes from SERVER.IP.ADDR[4500] to CLIENT.IP.ADDR[4500]
13:02:44 ipsec,debug 1 times of 160 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:02:49 ipsec dpd: retransmit
13:02:49 ipsec,debug ===== sending 156 bytes from SERVER.IP.ADDR[4500] to CLIENT.IP.ADDR[4500]
13:02:49 ipsec,debug 1 times of 160 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:02:50 ipsec,debug ===== received 76 bytes from CLIENT.IP.ADDR[4500] to SERVER.IP.ADDR[4500]
13:02:50 ipsec -> ike2 request, exchange: INFORMATIONAL:2 CLIENT.IP.ADDR[4500] 55831bbbccd4d65d:62dcc1ea15a31c5a
13:02:50 ipsec SPI 5a1ca315eac1dc62 not registered for CLIENT.IP.ADDR[4500]
13:02:54 ipsec dpd: retransmit
13:02:54 ipsec,debug ===== sending 156 bytes from SERVER.IP.ADDR[4500] to CLIENT.IP.ADDR[4500]
13:02:54 ipsec,debug 1 times of 160 bytes message will be sent to CLIENT.IP.ADDR[4500]
[...]
13:02:56 ipsec,debug KA: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500]
13:02:56 ipsec,debug 1 times of 1 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:02:59 ipsec dpd: retransmit
13:02:59 ipsec,debug ===== sending 156 bytes from SERVER.IP.ADDR[4500] to CLIENT.IP.ADDR[4500]
13:02:59 ipsec,debug 1 times of 160 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:03:04 ipsec dpd: retransmit
13:03:04 ipsec,debug ===== sending 156 bytes from SERVER.IP.ADDR[4500] to CLIENT.IP.ADDR[4500]
13:03:04 ipsec,debug 1 times of 160 bytes message will be sent to CLIENT.IP.ADDR[4500]
13:03:09 ipsec dpd: max retransmit failures reached
13:03:09 ipsec,info killing ike2 SA: SERVER.IP.ADDR[4500]-CLIENT.IP.ADDR[4500] spi:7d2a8948979076ff:c3952d17a841f992
13:03:09 ipsec IPsec-SA killing: CLIENT.IP.ADDR[4500]->SERVER.IP.ADDR[4500] spi=0xac8905
13:03:09 ipsec IPsec-SA killing: SERVER.IP.ADDR[4500]->CLIENT.IP.ADDR[4500] spi=0x150d8501
13:03:09 ipsec removing generated policy