Hardware/Software:
- MikroTik RouterOS version: Router OS 7.19.4
- iOS version: iOS 18 - Connecting but disconnecting after ~15 seconds
- macOS version: MacOS 15.6.1 - Working perfectly
- Authentication: Digital signatures with certificates
I'm experiencing a problem configuring IKEv2 VPN server with iOS clients.
The iOS clients successfully establish IKEv2 VPN connections but disconnect after approximately 15 seconds. The clients are configured with Apple Profile and manually (with the certificate imported with a profile).
The concerning part is that iOS is creating two separate IKE SAs simultaneously to the same server, which appears to be causing the instability.
At the same time, macOS clients work flawlessly with the same configuration.
Could someone please help me to figure what the issue is and how to fix it?
Config
> /ip ipsec profile print
Flags: * - default
0 * name="default" hash-algorithm=sha1 enc-algorithm=aes-128,3des dh-group=modp2048,modp1024 lifetime=1d proposal-check=obey nat-traversal=yes dpd-interval=2m dpd-maximum-failures=5
1 name="ike2" hash-algorithm=sha256 enc-algorithm=aes-256 dh-group=ecp256,modp2048,modp1536 lifetime=1d proposal-check=obey nat-traversal=yes dpd-interval=8s dpd-maximum-failures=4
> /ip ipsec peer print
Flags: X - disabled; D - dynamic; R - responder
0 R name="ike2" local-address=<server IP> passive=yes profile=ike2 exchange-mode=ike2 send-initial-contact=no
> /ip ipsec proposal print
Flags: X - disabled; * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=30m pfs-group=modp1024
1 name="ike2" auth-algorithms=sha256 enc-algorithms=aes-256-cbc,aes-256-gcm lifetime=8h30m pfs-group=none
> /ip ipsec identity print
Flags: D - dynamic; X - disabled
0 peer=ike2 auth-method=digital-signature mode-config=ike2-conf certificate=MT generate-policy=port-strict policy-template-group=ike2-policies
> /ip ipsec policy print
Flags: T - TEMPLATE; * - DEFAULT
Columns: SRC-ADDRESS, DST-ADDRESS, PROTOCOL
# SRC-ADDRESS DST-ADDRESS PROTOCOL
0 T* ::/0 ::/0 all
1 T 0.0.0.0/0 192.168.77.0/24 all
iOS Profile
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>DNS</key>
<dict>
<key>SearchDomains</key>
<array>
<string>xxx</string>
</array>
<key>ServerAddresses</key>
<array>
<string>xxx</string>
</array>
<key>SupplementalMatchDomainsNoSearch</key>
<integer>0</integer>
</dict>
<key>IKEv2</key>
<dict>
<key>AuthenticationMethod</key>
<string>Certificate</string>
<key>ChildSecurityAssociationParameters</key>
<dict>
<key>DiffieHellmanGroup</key>
<integer>14</integer>
<key>EncryptionAlgorithm</key>
<string>AES-256</string>
<key>IntegrityAlgorithm</key>
<string>SHA2-256</string>
<key>LifeTimeInMinutes</key>
<integer>1440</integer>
</dict>
<key>DeadPeerDetectionRate</key>
<string>Low</string>
<key>DisableMOBIKE</key>
<true/>
<key>DisableRedirect</key>
<integer>0</integer>
<key>EnableCertificateRevocationCheck</key>
<integer>0</integer>
<key>EnableFallback</key>
<integer>0</integer>
<key>EnablePFS</key>
<false/>
<key>IKESecurityAssociationParameters</key>
<dict>
<key>DiffieHellmanGroup</key>
<integer>14</integer>
<key>EncryptionAlgorithm</key>
<string>AES-256</string>
<key>IntegrityAlgorithm</key>
<string>SHA2-256</string>
<key>LifeTimeInMinutes</key>
<integer>1440</integer>
</dict>
<key>LocalIdentifier</key>
<string>==Client ID==</string>
<key>PayloadCertificateUUID</key>
<string>B789443B-8636-4783-869E-1CD32EED7749</string>
<key>RemoteAddress</key>
<string>==Server IP==</string>
<key>RemoteIdentifier</key>
<string>==Server IP==</string>
<key>UseConfigurationAttributeInternalIPSubnet</key>
<integer>0</integer>
</dict>
<key>PayloadDescription</key>
<string>Configures VPN settings</string>
<key>PayloadDisplayName</key>
<string>VPN</string>
<key>PayloadIdentifier</key>
<string>com.apple.vpn.managed.05A33E81-CB15-43BB-A9D5-EF3360A23533</string>
<key>PayloadType</key>
<string>com.apple.vpn.managed</string>
<key>PayloadUUID</key>
<string>05A33E81-CB15-43BB-A9D5-EF3360A23533</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>Proxies</key>
<dict>
<key>HTTPEnable</key>
<integer>0</integer>
<key>HTTPSEnable</key>
<integer>0</integer>
</dict>
<key>UserDefinedName</key>
<string>MT Home</string>
<key>VPNType</key>
<string>IKEv2</string>
</dict>
<dict>
<key>Password</key>
<string>12345678</string>
<key>PayloadCertificateFileName</key>
<string>MT_Client.p12</string>
<key>PayloadContent</key>
<data>==CERTIFICATE==</data>
<key>PayloadDescription</key>
<string>Adds a PKCS#12-formatted certificate</string>
<key>PayloadDisplayName</key>
<string>MT_Artur.p12</string>
<key>PayloadIdentifier</key>
<string>com.apple.security.pkcs12.B789443B-8636-4783-869E-1CD32EED7749</string>
<key>PayloadType</key>
<string>com.apple.security.pkcs12</string>
<key>PayloadUUID</key>
<string>B789443B-8636-4783-869E-1CD32EED7749</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>MT Home VPN</string>
<key>PayloadIdentifier</key>
<string>MT Home VPN</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>D3AAAF5A-070D-48C1-83F2-FD92F73DE2FD</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>
Log
[seventh2@MikroTik] > /log print where topics~"ipsec" and time >= "YYYY-MM-DD HH:MM"
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: SA_INIT:0 192.168.89.32[500] c2c8d72350c8d99c:0000000000000000
YYYY-MM-DD HH:MM:50 ipsec ike2 respond
YYYY-MM-DD HH:MM:50 ipsec payload seen: SA
YYYY-MM-DD HH:MM:50 ipsec payload seen: KE
YYYY-MM-DD HH:MM:50 ipsec payload seen: NONCE
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec processing payload: SA
YYYY-MM-DD HH:MM:50 ipsec IKE Protocol: IKE
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec prf: hmac-sha256
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec dh: modp2048
YYYY-MM-DD HH:MM:50 ipsec matched proposal:
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec prf: hmac-sha256
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec dh: modp2048
YYYY-MM-DD HH:MM:50 ipsec processing payload: KE
YYYY-MM-DD HH:MM:50 ipsec ike2 respond finish: request, exchange: SA_INIT:0 192.168.89.32[500] c2c8d72350c8d99c:0000000000000000
YYYY-MM-DD HH:MM:50 ipsec processing payload: NONCE
YYYY-MM-DD HH:MM:50 ipsec adding payload: SA
YYYY-MM-DD HH:MM:50 ipsec adding payload: KE
YYYY-MM-DD HH:MM:50 ipsec adding payload: NONCE
YYYY-MM-DD HH:MM:50 ipsec adding notify: NAT_DETECTION_SOURCE_IP
YYYY-MM-DD HH:MM:50 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
YYYY-MM-DD HH:MM:50 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec adding payload: CERTREQ
YYYY-MM-DD HH:MM:50 ipsec <- ike2 reply, exchange: SA_INIT:0 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:50 ipsec,info new ike2 SA (R): ike2 <Server IP>[500]-192.168.89.32[500] 67c38baa80f2ab8a:c2c8d72350c8d99c
YYYY-MM-DD HH:MM:50 ipsec processing payloads: VID (none found)
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: REDIRECT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NAT_DETECTION_SOURCE_IP
YYYY-MM-DD HH:MM:50 ipsec notify: NAT_DETECTION_DESTINATION_IP
YYYY-MM-DD HH:MM:50 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: SIGNATURE_HASH_ALGORITHMS
YYYY-MM-DD HH:MM:50 ipsec fragmentation negotiated
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec payload seen: ID_I
YYYY-MM-DD HH:MM:50 ipsec payload seen: CERT
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: ID_R
YYYY-MM-DD HH:MM:50 ipsec payload seen: AUTH
YYYY-MM-DD HH:MM:50 ipsec payload seen: CONFIG
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: SA
YYYY-MM-DD HH:MM:50 ipsec payload seen: TS_I
YYYY-MM-DD HH:MM:50 ipsec payload seen: TS_R
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: INITIAL_CONTACT
YYYY-MM-DD HH:MM:50 ipsec notify: ESP_TFC_PADDING_NOT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NON_FIRST_FRAGMENTS_ALSO
YYYY-MM-DD HH:MM:50 ipsec ike auth: respond
YYYY-MM-DD HH:MM:50 ipsec processing payload: ID_I
YYYY-MM-DD HH:MM:50 ipsec ID_I (FQDN): <Client ID>
YYYY-MM-DD HH:MM:50 ipsec processing payload: ID_R
YYYY-MM-DD HH:MM:50 ipsec ID_R (ADDR4): <Server IP>
YYYY-MM-DD HH:MM:50 ipsec processing payload: AUTH
YYYY-MM-DD HH:MM:50 ipsec processing payload: CERT
YYYY-MM-DD HH:MM:50 ipsec Certificate:
YYYY-MM-DD HH:MM:50 ipsec serialNr: 77:b4:c1:c4:48:c7:c5:b4
YYYY-MM-DD HH:MM:50 ipsec issuer: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=MT CA>
YYYY-MM-DD HH:MM:50 ipsec subject: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=<Client ID>>
YYYY-MM-DD HH:MM:50 ipsec notBefore: Wed Aug 20 18:41:29 2025
YYYY-MM-DD HH:MM:50 ipsec notAfter: Mon Aug 24 18:41:29 2026
YYYY-MM-DD HH:MM:50 ipsec selfSigned:0
YYYY-MM-DD HH:MM:50 ipsec extensions:
YYYY-MM-DD HH:MM:50 ipsec key usage: digital-signature
YYYY-MM-DD HH:MM:50 ipsec subject key id: 3b:fd:08:29:48:96:bf:4a:83:04:df:3f:c8:13:75:de:e9:28:38:8d
YYYY-MM-DD HH:MM:50 ipsec authority key id:fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec subject alternative name:
YYYY-MM-DD HH:MM:50 ipsec DNS: <Client ID>
YYYY-MM-DD HH:MM:50 ipsec signed with: SHA256+RSA
YYYY-MM-DD HH:MM:50 ipsec [RSA-PUBLIC]
YYYY-MM-DD HH:MM:50 ipsec modulus: a220ecf55c946d172df20f61271a54226a8e37fcd2298426050cd7da241ac5eecf0834ebdfd7ad6fd98f9998d080973f3c44cff34fba75ad71c3c4469016e359e521b73ebab6bfa07827961a04c0e4fbf5f41925d19c76beb5d2c955b4fd7548bf2a22aadd085bd021d279355c89e71975618b6fb87cbdcf6deb186ae8f18f2d71350c10705bc0acf733002dea375c26355db4a2ff5f0f3448fea74b46df0d2a0a5043b3bf0b21400021bae70c5ba9a3c20c05092d846685c9e38c0a0937bb884d2987fd46fa3d958578aeff1eb0f6debcc091efb632df0ed4ff2ac6ef1be2bb393fb0dae5cf94a508c0d0d988090c5423a570ccecce3bb3dcd8f3b00df96257
YYYY-MM-DD HH:MM:50 ipsec publicExponent: 10001
YYYY-MM-DD HH:MM:50 ipsec requested server id: <Server IP>
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: INITIAL_CONTACT
YYYY-MM-DD HH:MM:50 ipsec notify: ESP_TFC_PADDING_NOT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NON_FIRST_FRAGMENTS_ALSO
YYYY-MM-DD HH:MM:50 ipsec processing payload: AUTH
YYYY-MM-DD HH:MM:50 ipsec requested auth method: RSA
YYYY-MM-DD HH:MM:50 ipsec trust chain:
YYYY-MM-DD HH:MM:50 ipsec 0: SKID: 3b:fd:08:29:48:96:bf:4a:83:04:df:3f:c8:13:75:de:e9:28:38:8d
YYYY-MM-DD HH:MM:50 ipsec AKID: fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec 1: SKID: fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec,info,account peer authorized: ike2 <Server IP>[500]-192.168.89.32[500] 67c38baa80f2ab8a:c2c8d72350c8d99c
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: INITIAL_CONTACT
YYYY-MM-DD HH:MM:50 ipsec notify: ESP_TFC_PADDING_NOT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NON_FIRST_FRAGMENTS_ALSO
YYYY-MM-DD HH:MM:50 ipsec peer wants tunnel mode
YYYY-MM-DD HH:MM:50 ipsec processing payload: CONFIG
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 address
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 netmask
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 DHCP
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 DNS
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv6 address
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv6 DHCP
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv6 DNS
YYYY-MM-DD HH:MM:50 ipsec attribute: internal DNS domain
YYYY-MM-DD HH:MM:50 ipsec,info acquired 192.168.77.20 address for 192.168.89.32, <Client ID>
YYYY-MM-DD HH:MM:50 ipsec processing payload: SA
YYYY-MM-DD HH:MM:50 ipsec IKE Protocol: ESP
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec processing payload: TS_I
YYYY-MM-DD HH:MM:50 ipsec 0.0.0.0/0
YYYY-MM-DD HH:MM:50 ipsec [::/0]
YYYY-MM-DD HH:MM:50 ipsec processing payload: TS_R
YYYY-MM-DD HH:MM:50 ipsec 0.0.0.0/0
YYYY-MM-DD HH:MM:50 ipsec [::/0]
YYYY-MM-DD HH:MM:50 ipsec TSi in tunnel mode replaced with config address: 192.168.77.20
YYYY-MM-DD HH:MM:50 ipsec candidate selectors: 0.0.0.0/0 <=> 192.168.77.20
YYYY-MM-DD HH:MM:50 ipsec candidate selectors: [::/0] <=> [::/0]
YYYY-MM-DD HH:MM:50 ipsec searching for policy for selector: 0.0.0.0/0 <=> 192.168.77.20
YYYY-MM-DD HH:MM:50 ipsec generating policy
YYYY-MM-DD HH:MM:50 ipsec matched proposal:
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec acquired spi 0xc1fbfb7: ike2 <Server IP>[500]-192.168.89.32[500] 67c38baa80f2ab8a:c2c8d72350c8d99c
YYYY-MM-DD HH:MM:50 ipsec ike auth: finish
YYYY-MM-DD HH:MM:50 ipsec ID_R (ADDR4): <Server IP>
YYYY-MM-DD HH:MM:50 ipsec adding payload: ID_R
YYYY-MM-DD HH:MM:50 ipsec adding payload: AUTH
YYYY-MM-DD HH:MM:50 ipsec Certificate:
YYYY-MM-DD HH:MM:50 ipsec serialNr: 75:4c:ce:d6:a0:6b:2b:2f
YYYY-MM-DD HH:MM:50 ipsec issuer: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=MT CA>
YYYY-MM-DD HH:MM:50 ipsec subject: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=<Server IP>>
YYYY-MM-DD HH:MM:50 ipsec notBefore: Thu Mar 13 19:20:04 2025
YYYY-MM-DD HH:MM:50 ipsec notAfter: Tue Mar 17 19:20:04 2026
YYYY-MM-DD HH:MM:50 ipsec selfSigned:0
YYYY-MM-DD HH:MM:50 ipsec extensions:
YYYY-MM-DD HH:MM:50 ipsec key usage: digital-signature
YYYY-MM-DD HH:MM:50 ipsec subject key id: 15:47:59:6b:db:52:ba:5f:12:37:1d:50:ad:34:9f:75:d5:1f:e1:e5
YYYY-MM-DD HH:MM:50 ipsec authority key id:fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec subject alternative name:
YYYY-MM-DD HH:MM:50 ipsec IP: <Server IP>
YYYY-MM-DD HH:MM:50 ipsec signed with: SHA256+RSA
YYYY-MM-DD HH:MM:50 ipsec [RSA-PUBLIC]
YYYY-MM-DD HH:MM:50 ipsec modulus: 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
YYYY-MM-DD HH:MM:50 ipsec publicExponent: 10001
YYYY-MM-DD HH:MM:50 ipsec adding payload: CERT
YYYY-MM-DD HH:MM:50 ipsec preparing internal IPv4 address
YYYY-MM-DD HH:MM:50 ipsec preparing internal IPv4 netmask
YYYY-MM-DD HH:MM:50 ipsec preparing internal IPv4 DNS
YYYY-MM-DD HH:MM:50 ipsec adding payload: CONFIG
YYYY-MM-DD HH:MM:50 ipsec initiator selector: 192.168.77.20
YYYY-MM-DD HH:MM:50 ipsec adding payload: TS_I
YYYY-MM-DD HH:MM:50 ipsec responder selector: 0.0.0.0/0
YYYY-MM-DD HH:MM:50 ipsec adding payload: TS_R
YYYY-MM-DD HH:MM:50 ipsec adding payload: SA
YYYY-MM-DD HH:MM:50 ipsec <- ike2 reply, exchange: AUTH:1 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:50 ipsec fragmenting into 2 chunks
YYYY-MM-DD HH:MM:50 ipsec adding payload: SKF
YYYY-MM-DD HH:MM:50 ipsec adding payload: SKF
YYYY-MM-DD HH:MM:50 ipsec IPsec-SA established: 192.168.89.32[500]-><Server IP>[500] spi=0xc1fbfb7
YYYY-MM-DD HH:MM:50 ipsec IPsec-SA established: <Server IP>[500]->192.168.89.32[500] spi=0x2bb465
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: SA_INIT:0 192.168.89.32[500] 1ed069d97fb76e4c:0000000000000000
YYYY-MM-DD HH:MM:50 ipsec ike2 respond
YYYY-MM-DD HH:MM:50 ipsec payload seen: SA
YYYY-MM-DD HH:MM:50 ipsec payload seen: KE
YYYY-MM-DD HH:MM:50 ipsec payload seen: NONCE
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec processing payload: SA
YYYY-MM-DD HH:MM:50 ipsec IKE Protocol: IKE
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec prf: hmac-sha256
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec dh: modp2048
YYYY-MM-DD HH:MM:50 ipsec matched proposal:
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec prf: hmac-sha256
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec dh: modp2048
YYYY-MM-DD HH:MM:50 ipsec processing payload: KE
YYYY-MM-DD HH:MM:50 ipsec ike2 respond finish: request, exchange: SA_INIT:0 192.168.89.32[500] 1ed069d97fb76e4c:0000000000000000
YYYY-MM-DD HH:MM:50 ipsec processing payload: NONCE
YYYY-MM-DD HH:MM:50 ipsec adding payload: SA
YYYY-MM-DD HH:MM:50 ipsec adding payload: KE
YYYY-MM-DD HH:MM:50 ipsec adding payload: NONCE
YYYY-MM-DD HH:MM:50 ipsec adding notify: NAT_DETECTION_SOURCE_IP
YYYY-MM-DD HH:MM:50 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
YYYY-MM-DD HH:MM:50 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec adding payload: CERTREQ
YYYY-MM-DD HH:MM:50 ipsec <- ike2 reply, exchange: SA_INIT:0 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:50 ipsec,info new ike2 SA (R): ike2 <Server IP>[500]-192.168.89.32[500] 5873d5bd27dfda08:1ed069d97fb76e4c
YYYY-MM-DD HH:MM:50 ipsec processing payloads: VID (none found)
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: REDIRECT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NAT_DETECTION_SOURCE_IP
YYYY-MM-DD HH:MM:50 ipsec notify: NAT_DETECTION_DESTINATION_IP
YYYY-MM-DD HH:MM:50 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: SIGNATURE_HASH_ALGORITHMS
YYYY-MM-DD HH:MM:50 ipsec fragmentation negotiated
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec -> ike2 request, exchange: AUTH:1 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:50 ipsec payload seen: SKF
YYYY-MM-DD HH:MM:50 ipsec processing payload: ENC (not found)
YYYY-MM-DD HH:MM:50 ipsec processing payload: SKF
YYYY-MM-DD HH:MM:50 ipsec payload seen: ID_I
YYYY-MM-DD HH:MM:50 ipsec payload seen: CERT
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: ID_R
YYYY-MM-DD HH:MM:50 ipsec payload seen: AUTH
YYYY-MM-DD HH:MM:50 ipsec payload seen: CONFIG
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec payload seen: SA
YYYY-MM-DD HH:MM:50 ipsec payload seen: TS_I
YYYY-MM-DD HH:MM:50 ipsec payload seen: TS_R
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: INITIAL_CONTACT
YYYY-MM-DD HH:MM:50 ipsec notify: ESP_TFC_PADDING_NOT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NON_FIRST_FRAGMENTS_ALSO
YYYY-MM-DD HH:MM:50 ipsec ike auth: respond
YYYY-MM-DD HH:MM:50 ipsec processing payload: ID_I
YYYY-MM-DD HH:MM:50 ipsec ID_I (FQDN): <Client ID>
YYYY-MM-DD HH:MM:50 ipsec processing payload: ID_R
YYYY-MM-DD HH:MM:50 ipsec ID_R (ADDR4): <Server IP>
YYYY-MM-DD HH:MM:50 ipsec processing payload: AUTH
YYYY-MM-DD HH:MM:50 ipsec processing payload: CERT
YYYY-MM-DD HH:MM:50 ipsec Certificate:
YYYY-MM-DD HH:MM:50 ipsec serialNr: 77:b4:c1:c4:48:c7:c5:b4
YYYY-MM-DD HH:MM:50 ipsec issuer: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=MT CA>
YYYY-MM-DD HH:MM:50 ipsec subject: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=<Client ID>>
YYYY-MM-DD HH:MM:50 ipsec notBefore: Wed Aug 20 18:41:29 2025
YYYY-MM-DD HH:MM:50 ipsec notAfter: Mon Aug 24 18:41:29 2026
YYYY-MM-DD HH:MM:50 ipsec selfSigned:0
YYYY-MM-DD HH:MM:50 ipsec extensions:
YYYY-MM-DD HH:MM:50 ipsec key usage: digital-signature
YYYY-MM-DD HH:MM:50 ipsec subject key id: 3b:fd:08:29:48:96:bf:4a:83:04:df:3f:c8:13:75:de:e9:28:38:8d
YYYY-MM-DD HH:MM:50 ipsec authority key id:fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec subject alternative name:
YYYY-MM-DD HH:MM:50 ipsec DNS: <Client ID>
YYYY-MM-DD HH:MM:50 ipsec signed with: SHA256+RSA
YYYY-MM-DD HH:MM:50 ipsec [RSA-PUBLIC]
YYYY-MM-DD HH:MM:50 ipsec modulus: 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
YYYY-MM-DD HH:MM:50 ipsec publicExponent: 10001
YYYY-MM-DD HH:MM:50 ipsec requested server id: <Server IP>
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: INITIAL_CONTACT
YYYY-MM-DD HH:MM:50 ipsec notify: ESP_TFC_PADDING_NOT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NON_FIRST_FRAGMENTS_ALSO
YYYY-MM-DD HH:MM:50 ipsec processing payload: AUTH
YYYY-MM-DD HH:MM:50 ipsec requested auth method: RSA
YYYY-MM-DD HH:MM:50 ipsec trust chain:
YYYY-MM-DD HH:MM:50 ipsec 0: SKID: 3b:fd:08:29:48:96:bf:4a:83:04:df:3f:c8:13:75:de:e9:28:38:8d
YYYY-MM-DD HH:MM:50 ipsec AKID: fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec 1: SKID: fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec,info,account peer authorized: ike2 <Server IP>[500]-192.168.89.32[500] 5873d5bd27dfda08:1ed069d97fb76e4c
YYYY-MM-DD HH:MM:50 ipsec processing payloads: NOTIFY
YYYY-MM-DD HH:MM:50 ipsec notify: INITIAL_CONTACT
YYYY-MM-DD HH:MM:50 ipsec notify: ESP_TFC_PADDING_NOT_SUPPORTED
YYYY-MM-DD HH:MM:50 ipsec notify: NON_FIRST_FRAGMENTS_ALSO
YYYY-MM-DD HH:MM:50 ipsec peer wants tunnel mode
YYYY-MM-DD HH:MM:50 ipsec processing payload: CONFIG
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 address
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 netmask
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 DHCP
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv4 DNS
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv6 address
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv6 DHCP
YYYY-MM-DD HH:MM:50 ipsec attribute: internal IPv6 DNS
YYYY-MM-DD HH:MM:50 ipsec attribute: internal DNS domain
YYYY-MM-DD HH:MM:50 ipsec,info acquired 192.168.77.23 address for 192.168.89.32, <Client ID>
YYYY-MM-DD HH:MM:50 ipsec processing payload: SA
YYYY-MM-DD HH:MM:50 ipsec IKE Protocol: ESP
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec processing payload: TS_I
YYYY-MM-DD HH:MM:50 ipsec 0.0.0.0/0
YYYY-MM-DD HH:MM:50 ipsec [::/0]
YYYY-MM-DD HH:MM:50 ipsec processing payload: TS_R
YYYY-MM-DD HH:MM:50 ipsec 0.0.0.0/0
YYYY-MM-DD HH:MM:50 ipsec [::/0]
YYYY-MM-DD HH:MM:50 ipsec TSi in tunnel mode replaced with config address: 192.168.77.23
YYYY-MM-DD HH:MM:50 ipsec candidate selectors: 0.0.0.0/0 <=> 192.168.77.23
YYYY-MM-DD HH:MM:50 ipsec candidate selectors: [::/0] <=> [::/0]
YYYY-MM-DD HH:MM:50 ipsec searching for policy for selector: 0.0.0.0/0 <=> 192.168.77.23
YYYY-MM-DD HH:MM:50 ipsec generating policy
YYYY-MM-DD HH:MM:50 ipsec matched proposal:
YYYY-MM-DD HH:MM:50 ipsec proposal #1
YYYY-MM-DD HH:MM:50 ipsec enc: aes256-cbc
YYYY-MM-DD HH:MM:50 ipsec auth: sha256
YYYY-MM-DD HH:MM:50 ipsec acquired spi 0xfbc1e40: ike2 <Server IP>[500]-192.168.89.32[500] 5873d5bd27dfda08:1ed069d97fb76e4c
YYYY-MM-DD HH:MM:50 ipsec ike auth: finish
YYYY-MM-DD HH:MM:50 ipsec ID_R (ADDR4): <Server IP>
YYYY-MM-DD HH:MM:50 ipsec adding payload: ID_R
YYYY-MM-DD HH:MM:50 ipsec adding payload: AUTH
YYYY-MM-DD HH:MM:50 ipsec Certificate:
YYYY-MM-DD HH:MM:50 ipsec serialNr: 75:4c:ce:d6:a0:6b:2b:2f
YYYY-MM-DD HH:MM:50 ipsec issuer: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=MT CA>
YYYY-MM-DD HH:MM:50 ipsec subject: <C=Country, S=A, L=Location, O=Home, OU=Router, CN=<Server IP>>
YYYY-MM-DD HH:MM:50 ipsec notBefore: Thu Mar 13 19:20:04 2025
YYYY-MM-DD HH:MM:50 ipsec notAfter: Tue Mar 17 19:20:04 2026
YYYY-MM-DD HH:MM:50 ipsec selfSigned:0
YYYY-MM-DD HH:MM:50 ipsec extensions:
YYYY-MM-DD HH:MM:50 ipsec key usage: digital-signature
YYYY-MM-DD HH:MM:50 ipsec subject key id: 15:47:59:6b:db:52:ba:5f:12:37:1d:50:ad:34:9f:75:d5:1f:e1:e5
YYYY-MM-DD HH:MM:50 ipsec authority key id:fa:ad:ee:b5:4c:23:40:91:3d:0d:7d:81:a9:dc:5b:90:66:8b:cd:b3
YYYY-MM-DD HH:MM:50 ipsec subject alternative name:
YYYY-MM-DD HH:MM:50 ipsec IP: <Server IP>
YYYY-MM-DD HH:MM:50 ipsec signed with: SHA256+RSA
YYYY-MM-DD HH:MM:50 ipsec [RSA-PUBLIC]
YYYY-MM-DD HH:MM:50 ipsec modulus: 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
YYYY-MM-DD HH:MM:50 ipsec publicExponent: 10001
YYYY-MM-DD HH:MM:50 ipsec adding payload: CERT
YYYY-MM-DD HH:MM:50 ipsec preparing internal IPv4 address
YYYY-MM-DD HH:MM:50 ipsec preparing internal IPv4 netmask
YYYY-MM-DD HH:MM:50 ipsec preparing internal IPv4 DNS
YYYY-MM-DD HH:MM:50 ipsec adding payload: CONFIG
YYYY-MM-DD HH:MM:50 ipsec initiator selector: 192.168.77.23
YYYY-MM-DD HH:MM:50 ipsec adding payload: TS_I
YYYY-MM-DD HH:MM:50 ipsec responder selector: 0.0.0.0/0
YYYY-MM-DD HH:MM:50 ipsec adding payload: TS_R
YYYY-MM-DD HH:MM:50 ipsec adding payload: SA
YYYY-MM-DD HH:MM:50 ipsec <- ike2 reply, exchange: AUTH:1 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:50 ipsec fragmenting into 2 chunks
YYYY-MM-DD HH:MM:50 ipsec adding payload: SKF
YYYY-MM-DD HH:MM:50 ipsec adding payload: SKF
YYYY-MM-DD HH:MM:50 ipsec IPsec-SA established: 192.168.89.32[500]-><Server IP>[500] spi=0xfbc1e40
YYYY-MM-DD HH:MM:50 ipsec IPsec-SA established: <Server IP>[500]->192.168.89.32[500] spi=0xe8196ad
YYYY-MM-DD HH:MM:58 ipsec sending dpd packet
YYYY-MM-DD HH:MM:58 ipsec <- ike2 request, exchange: INFORMATIONAL:0 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:58 ipsec sending dpd packet
YYYY-MM-DD HH:MM:58 ipsec <- ike2 request, exchange: INFORMATIONAL:0 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:03 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:03 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:08 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:08 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:13 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:13 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:18 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:18 ipsec dpd: retransmit
YYYY-MM-DD HH:MM:23 ipsec dpd: max retransmit failures reached
YYYY-MM-DD HH:MM:23 ipsec,info killing ike2 SA: ike2 <Server IP>[500]-192.168.89.32[500] 67c38baa80f2ab8a:c2c8d72350c8d99c
YYYY-MM-DD HH:MM:23 ipsec IPsec-SA killing: 192.168.89.32[500]-><Server IP>[500] spi=0xc1fbfb7
YYYY-MM-DD HH:MM:23 ipsec IPsec-SA killing: <Server IP>[500]->192.168.89.32[500] spi=0x2bb465
YYYY-MM-DD HH:MM:23 ipsec removing generated policy
YYYY-MM-DD HH:MM:23 ipsec adding payload: DELETE
YYYY-MM-DD HH:MM:23 ipsec <- ike2 request, exchange: INFORMATIONAL:1 192.168.89.32[500] c2c8d72350c8d99c:67c38baa80f2ab8a
YYYY-MM-DD HH:MM:23 ipsec,info releasing address 192.168.77.20
YYYY-MM-DD HH:MM:23 ipsec dpd: max retransmit failures reached
YYYY-MM-DD HH:MM:23 ipsec,info killing ike2 SA: ike2 <Server IP>[500]-192.168.89.32[500] 5873d5bd27dfda08:1ed069d97fb76e4c
YYYY-MM-DD HH:MM:23 ipsec IPsec-SA killing: 192.168.89.32[500]-><Server IP>[500] spi=0xfbc1e40
YYYY-MM-DD HH:MM:23 ipsec IPsec-SA killing: <Server IP>[500]->192.168.89.32[500] spi=0xe8196ad
YYYY-MM-DD HH:MM:23 ipsec removing generated policy
YYYY-MM-DD HH:MM:23 ipsec adding payload: DELETE
YYYY-MM-DD HH:MM:23 ipsec <- ike2 request, exchange: INFORMATIONAL:1 192.168.89.32[500] 1ed069d97fb76e4c:5873d5bd27dfda08
YYYY-MM-DD HH:MM:23 ipsec,info releasing address 192.168.77.23
