IPSEC IKE2 connection problem!

Hellow!
Dear colleagues, please help me debug IPSEC IKE2 connection: WIN10(ISP1,natted)->CRS328-24P-4S+(IPS2,Public IP), this is typical road warrior setup with RSA.
My config:

# apr/11/2020 17:53:02 by RouterOS 6.46.5
# software id = HS7D-L3T2
#
# model = CRS328-24P-4S+
# serial number = A1A10AE98CF6
/interface bridge
add name=Bridge_IKE2 protocol-mode=none
add admin-mac=74:4D:28:B9:60:EF auto-mac=no comment=defconf fast-forward=no \
    name=bridge_LAN protocol-mode=none
/interface ethernet
set [ find default-name=ether1 ] advertise=\
    100M-half,100M-full,1000M-half,1000M-full name=ether1_WAN poe-out=off \
    speed=100Mbps
set [ find default-name=ether2 ] speed=100Mbps
set [ find default-name=ether3 ] speed=100Mbps
set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether5 ] speed=100Mbps
set [ find default-name=ether6 ] speed=100Mbps
set [ find default-name=ether7 ] poe-out=off rx-flow-control=auto speed=\
    100Mbps tx-flow-control=auto
set [ find default-name=ether8 ] speed=100Mbps
set [ find default-name=ether9 ] speed=100Mbps
set [ find default-name=ether10 ] speed=100Mbps
set [ find default-name=ether11 ] speed=100Mbps
set [ find default-name=ether12 ] speed=100Mbps
set [ find default-name=ether13 ] speed=100Mbps
set [ find default-name=ether14 ] speed=100Mbps
set [ find default-name=ether15 ] speed=100Mbps
set [ find default-name=ether16 ] speed=100Mbps
set [ find default-name=ether17 ] speed=100Mbps
set [ find default-name=ether18 ] speed=100Mbps
set [ find default-name=ether19 ] speed=100Mbps
set [ find default-name=ether20 ] rx-flow-control=auto speed=100Mbps \
    tx-flow-control=auto
set [ find default-name=ether21 ] poe-out=off rx-flow-control=auto speed=\
    100Mbps tx-flow-control=auto
set [ find default-name=ether22 ] mac-address=74:4D:28:B9:61:03 poe-out=off \
    rx-flow-control=auto speed=100Mbps tx-flow-control=auto
set [ find default-name=ether23 ] poe-out=off speed=100Mbps
set [ find default-name=ether24 ] poe-out=off speed=100Mbps
set [ find default-name=sfp-sfpplus1 ] disabled=yes speed=10Gbps
set [ find default-name=sfp-sfpplus2 ] disabled=yes speed=10Gbps
set [ find default-name=sfp-sfpplus3 ] disabled=yes speed=10Gbps
set [ find default-name=sfp-sfpplus4 ] disabled=yes speed=10Gbps
/interface sstp-server
add name=sstp-Emin user=ruser5
add name=sstp-arcady user=arcady
/interface bonding
add link-monitoring=none mode=802.3ad name=bonding_QNAP slaves=\
    ether21,ether22
/interface list
add name=WAN
add name=LAN
/ip dhcp-server option
add code=1 name=option1
/ip ipsec policy group
add name=group_IKE2_DynemicUsers
add name=group_T
/ip ipsec profile
set [ find default=yes ] enc-algorithm=aes-256,aes-128,3des
add enc-algorithm=aes-256,aes-128 name=Site_to_site_IKE2
add enc-algorithm=aes-256,aes-128,3des name=VPNUsers
/ip ipsec peer
add address=qp451.myqnapcloud.com exchange-mode=ike2 local-address=\
    W_IP.W_IP.W_IP.W_IP name=peer_QP port=500 profile=Site_to_site_IKE2
add address=IP1.IP1.IP1.IP1/32 exchange-mode=ike2 local-address=W_IP.W_IP.W_IP.W_IP \
    name=SK10_CloudSL port=500 profile=Site_to_site_IKE2 \
    send-initial-contact=no
add address=IP2.IP2.IP2.IP2/32 exchange-mode=ike2 local-address=W_IP.W_IP.W_IP.W_IP \
    name=SK10_HQ port=500 profile=Site_to_site_IKE2
add exchange-mode=ike2 local-address=W_IP.W_IP.W_IP.W_IP name=peer_Dynemic \
    passive=yes profile=VPNUsers
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256,sha1,md5 enc-algorithms=\
    aes-256-cbc,aes-128-cbc,3des
add enc-algorithms=aes-256-cbc,aes-128-cbc name=Site_to_site_IPSec pfs-group=\
    modp2048
add enc-algorithms=aes-256-cbc,aes-128-cbc name=VPNUsers
/ip pool
add name=dhcp ranges=10.100.100.50-10.100.100.150
add name=VPN_Clients ranges=10.250.250.2-10.250.250.50
add name=pool_IKE2 ranges=10.255.255.2-10.255.255.100
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge_LAN name=dhcp1
/ip ipsec mode-config
add address-pool=pool_IKE2 address-prefix-length=32 name=IKE2_vpn \
    split-include=10.100.100.0/24 system-dns=no
/ppp profile
add change-tcp-mss=yes local-address=10.250.250.1 name=SSTP remote-address=\
    VPN_Clients use-encryption=required use-mpls=no
add address-list=EXTVPN change-tcp-mss=yes local-address=10.250.250.1 name=\
    SSTP_EXTVPN remote-address=VPN_Clients use-encryption=required use-mpls=\
    no
set *FFFFFFFE use-encryption=required
/queue simple
add disabled=yes max-limit=45M/45M name=Other packet-marks=no-mark queue=\
    pcq-upload-default/pcq-download-default target=bridge_LAN
add disabled=yes max-limit=2M/2M name=VoIP packet-marks=VoIP priority=2/2 \
    queue=pcq-upload-default/pcq-download-default target=bridge_LAN
/queue tree
add name=VoIP_Download packet-mark=VoIP_pReceive parent=global priority=2 \
    queue=pcq-download-default
add name=VoIP_Upload packet-mark=VoIP_pSend parent=global priority=2 queue=\
    pcq-upload-default
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas\
    sword,web,sniff,sensitive,api,romon,dude,tikapp"
/certificate settings
set crl-download=no crl-store=system
/interface bridge port
add bridge=bridge_LAN comment=defconf interface=ether2
add bridge=bridge_LAN comment=defconf interface=ether3
add bridge=bridge_LAN comment=defconf interface=ether4
add bridge=bridge_LAN comment=defconf interface=ether5
add bridge=bridge_LAN comment=defconf interface=ether6
add bridge=bridge_LAN comment=defconf interface=ether7
add bridge=bridge_LAN comment=defconf interface=ether8
add bridge=bridge_LAN comment=defconf interface=ether9
add bridge=bridge_LAN comment=defconf interface=ether10
add bridge=bridge_LAN comment=defconf interface=ether11
add bridge=bridge_LAN comment=defconf interface=ether12
add bridge=bridge_LAN comment=defconf interface=ether13
add bridge=bridge_LAN comment=defconf interface=ether14
add bridge=bridge_LAN comment=defconf interface=ether15
add bridge=bridge_LAN comment=defconf interface=ether16
add bridge=bridge_LAN comment=defconf interface=ether17
add bridge=bridge_LAN comment=defconf interface=ether18
add bridge=bridge_LAN comment=defconf interface=ether19
add bridge=bridge_LAN comment=defconf interface=ether20
add bridge=bridge_LAN comment=defconf interface=ether23
add bridge=bridge_LAN comment=defconf interface=ether24
add bridge=bridge_LAN comment=defconf interface=sfp-sfpplus1
add bridge=bridge_LAN comment=defconf interface=sfp-sfpplus2
add bridge=bridge_LAN comment=defconf interface=sfp-sfpplus3
add bridge=bridge_LAN comment=defconf interface=sfp-sfpplus4
add bridge=bridge_LAN interface=bonding_QNAP
/ip firewall connection tracking
set generic-timeout=0ms icmp-timeout=0ms loose-tcp-tracking=no \
    tcp-close-timeout=0ms tcp-close-wait-timeout=0ms tcp-established-timeout=\
    0ms tcp-fin-wait-timeout=0ms tcp-last-ack-timeout=0ms \
    tcp-max-retrans-timeout=0ms tcp-syn-received-timeout=0ms \
    tcp-syn-sent-timeout=0ms tcp-time-wait-timeout=0ms tcp-unacked-timeout=\
    0ms udp-stream-timeout=0ms udp-timeout=0ms
/interface l2tp-server server
set authentication=mschap2 use-ipsec=required
/interface list member
add interface=bridge_LAN list=LAN
add interface=ether1_WAN list=WAN
/interface sstp-server server
set authentication=mschap2 certificate=VPNDNS default-profile=\
    default-encryption enabled=yes force-aes=yes
/ip address
add address=10.100.100.1/24 comment=defconf interface=bridge_LAN network=\
    10.100.100.0
add address=W_IP.W_IP.W_IP.W_IP/30 interface=ether1_WAN network=W_NET.W_NET.W_NET.W_NET
add address=10.255.255.1/24 interface=Bridge_IKE2 network=10.255.255.0
/ip dhcp-client
add interface=ether1_WAN
/ip dhcp-server network
add address=10.100.100.0/24 dns-server=10.100.100.1 domain=tm.local gateway=\
    10.100.100.1 netmask=24 wins-server=10.100.100.254
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4
/ip dns static
add address=10.100.100.31 regexp="host[0-9]|[0-9]{2}.test"
add address=W_IP.W_IP.W_IP.W_IP name=server.techno-mir.net
/ip firewall address-list
add address=10.100.100.11-10.100.100.20 list="VoIP Phones"
add address=10.0.14.0/23 list="VPN lans"
add address=192.168.0.0/24 list="VPN lans"
add address=10.0.12.0/24 list="VPN lans"
add address=10.250.250.254 list=EXTVPN
add address=10.255.255.0/24 list="VPN lans"
add address=172.16.250.0/24 list="VPN lans"
add address=192.168.88.0/24 list="VPN lans"
/ip firewall filter
add action=accept chain=forward comment="Accept est/ and related conn" \
    connection-state=established,related,untracked
add action=accept chain=input comment="Accept est/ and related conn" \
    connection-state=established,related,untracked
add action=accept chain=input connection-state="" ipsec-policy=in,ipsec
add action=accept chain=forward comment="IPsec in" connection-state="" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="IPsec out" connection-state="" \
    ipsec-policy=out,ipsec
add action=accept chain=input comment="Winbox & HTTPS from WAN" dst-port=\
    8291,443,80 protocol=tcp
add action=accept chain=input comment="" dst-port=\
    500,4500,1701 in-interface=ether1_WAN protocol=udp
add action=accept chain=input comment="" in-interface=\
    ether1_WAN protocol=ipsec-esp
add action=accept chain=input comment="Accept est/ and related conn" \
    protocol=icmp
add action=drop chain=forward dst-address=!10.100.100.31 src-address-list=\
    EXTVPN
add action=fasttrack-connection chain=forward comment="Accept fasttrack" \
    connection-state=established,related disabled=yes
add action=drop chain=input comment="Drop all from WAN" in-interface-list=\
    !LAN log-prefix="Drop from input"
add action=drop chain=forward comment="Drop inalid" connection-state=invalid
add action=drop chain=input comment="Drop all from WAN" connection-state=\
    invalid log-prefix="Drop from input"
add action=drop chain=forward comment="Drop WAN -> LAN" connection-nat-state=\
    !dstnat in-interface-list=WAN
/ip firewall mangle
add action=change-mss chain=forward ipsec-policy=in,ipsec new-mss=1360 \
    passthrough=yes protocol=tcp src-address-list="VPN lans" tcp-flags=syn \
    tcp-mss=!0-1360
add action=change-mss chain=forward dst-address-list="VPN lans" ipsec-policy=\
    out,ipsec new-mss=1360 passthrough=yes protocol=tcp src-address-list="" \
    tcp-flags=syn tcp-mss=!0-1360
add action=mark-connection chain=prerouting new-connection-mark=VoIP_send \
    passthrough=yes src-address-list="VoIP Phones" tcp-flags=""
add action=mark-connection chain=forward dst-address-list="VoIP Phones" \
    new-connection-mark=VoIP_Receve passthrough=yes
add action=mark-packet chain=prerouting connection-mark=VoIP_send \
    new-packet-mark=VoIP_pSend passthrough=no
add action=mark-packet chain=forward connection-mark=VoIP_Receve \
    new-packet-mark=VoIP_pReceive passthrough=no
/ip firewall nat
add action=accept chain=srcnat disabled=yes dst-address-list="VPN lans"
add action=dst-nat chain=dstnat dst-port=4080 in-interface-list=WAN protocol=\
    tcp to-addresses=10.100.100.31 to-ports=80
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface-list=\
    WAN src-address=10.100.100.0/24
/ip firewall service-port
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip ipsec identity
add auth-method=digital-signature certificate=SK10_MT_IKE2.crt_0 match-by=\
    certificate peer=SK10_HQ remote-certificate=cert_export_SSTP_Server.crt_0
add peer=peer_QP
add auth-method=digital-signature certificate=Server generate-policy=\
    port-strict match-by=certificate mode-config=IKE2_vpn notrack-chain=\
    prerouting peer=peer_Dynemic policy-template-group=\
    group_IKE2_DynemicUsers remote-certificate=RUser
add generate-policy=port-strict my-id=fqdn:server.techno-mir.net peer=\
    peer_Dynemic policy-template-group=group_T remote-id=\
    user-fqdn:alex32c@tm.net
add generate-policy=port-strict notrack-chain=prerouting peer=peer_Dynemic \
    policy-template-group=group_T
add peer=SK10_CloudSL
/ip ipsec policy
add dst-address=10.0.12.0/24 peer=SK10_CloudSL proposal=Site_to_site_IPSec \
    sa-dst-address=92.246.148.41 sa-src-address=W_IP.W_IP.W_IP.W_IP src-address=\
    10.100.100.0/24 tunnel=yes
add dst-address=10.0.14.0/23 peer=SK10_HQ proposal=Site_to_site_IPSec \
    sa-dst-address=87.117.9.31 sa-src-address=W_IP.W_IP.W_IP.W_IP src-address=\
    10.100.100.0/24 tunnel=yes
add dst-address=172.16.91.0/24 peer=SK10_HQ proposal=Site_to_site_IPSec \
    sa-dst-address=87.117.9.31 sa-src-address=W_IP.W_IP.W_IP.W_IP src-address=\
    10.100.100.0/24 tunnel=yes
add dst-address=192.168.0.0/24 peer=peer_QP proposal=Site_to_site_IPSec \
    sa-dst-address=5.167.50.85 sa-src-address=W_IP.W_IP.W_IP.W_IP src-address=\
    10.100.100.0/24 tunnel=yes
add dst-address=10.255.255.0/24 group=group_IKE2_DynemicUsers proposal=\
    VPNUsers src-address=0.0.0.0/0 template=yes
add comment="IKE2 Site2Site dynemic" dst-address=192.168.0.0/16 group=group_T \
    proposal=VPNUsers src-address=10.100.100.0/24 template=yes
add comment="IKE2 Site2Site dynemic" dst-address=172.16.0.0/12 group=group_T \
    proposal=VPNUsers src-address=10.100.100.0/24 template=yes
/ip route
add distance=1 gateway==W_GW.W_GW.W_GW.W_GW
add distance=1 dst-address=10.0.12.0/24 gateway=bridge_LAN pref-src=\
    10.100.100.1
add distance=1 dst-address=172.16.200.0/24 gateway=sstp-Emin
add distance=1 dst-address=192.168.11.0/24 gateway=sstp-arcady
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ip smb
set interfaces=bridge_LAN
/ppp secret
add name=ruser profile=default-encryption
add name=alik profile=SSTP service=sstp
add name=arcady profile=SSTP service=sstp
add name=olgan profile=SSTP service=sstp
add name=komar61 profile=SSTP service=sstp
add name=ruser1 profile=SSTP service=sstp
add name=ruser2 profile=SSTP service=sstp
add name=ruser3 profile=SSTP service=sstp
add name=ruser4 profile=SSTP service=sstp
add name=ruser5 profile=SSTP service=sstp
add name=ruser6 profile=SSTP_EXTVPN service=sstp
add name=ruser7 profile=SSTP_EXTVPN service=sstp
add name=ruser8 profile=SSTP_EXTVPN service=sstp
add name=ruser9 profile=SSTP_EXTVPN service=sstp
add name=ruser10 profile=SSTP_EXTVPN service=sstp
/radius incoming
set accept=yes
/system clock
set time-zone-name=Europe/Moscow
/system identity
set name=CRS328.tm.local
/system logging
add topics=ipsec,!packet
add disabled=yes topics=sstp
add disabled=yes topics=l2tp
/system ntp client
set enabled=yes server-dns-names=pool.ntp.org
/system routerboard settings
set auto-upgrade=yes boot-os=router-os
/tool sniffer
set filter-interface=ether8
/tool traffic-monitor
add interface=ether8 name=tmon1 threshold=0

Debug:
# apr/11/2020 17:07:24 by RouterOS 6.46.5
# software id = HS7D-L3T2
#
# model = CRS328-24P-4S+
# serial number = *********
/ip ipsec mode-config
add address-pool=pool_IKE2 address-prefix-length=32 name=IKE2_vpn split-include=10.100.100.0/24 system-dns=no
/ip ipsec policy group
add name=group_IKE2_DynemicUsers
add name=group_T
/ip ipsec profile
set [ find default=yes ] enc-algorithm=aes-256,aes-128,3des
add enc-algorithm=aes-256,aes-128,3des name=VPNUsers
/ip ipsec peer
add exchange-mode=ike2 local-address=xxx.xxx.xxx.xxx name=peer_Dynemic passive=yes profile=VPNUsers
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256,sha1,md5 enc-algorithms=aes-256-cbc,aes-128-cbc,3des
add enc-algorithms=aes-256-cbc,aes-128-cbc name=VPNUsers
/ip ipsec identity
add auth-method=digital-signature certificate=Server generate-policy=port-strict match-by=certificate mode-config=IKE2_vpn notrack-chain=prerouting peer=peer_Dynemic policy-template-group=group_IKE2_DynemicUsers remote-certificate=RUser
/ip ipsec policy
add dst-address=10.255.255.0/24 group=group_IKE2_DynemicUsers proposal=VPNUsers src-address=0.0.0.0/0 template=yes
Debug
16:55:11 ipsec -> ike2 request, exchange: SA_INIT:0 109.172.70.44[223] 6d3d606cb0e19562:0000000000000000 
16:55:11 ipsec ike2 respond 
16:55:11 ipsec payload seen: SA (256 bytes) 
16:55:11 ipsec payload seen: KE (136 bytes) 
16:55:11 ipsec payload seen: NONCE (52 bytes) 
16:55:11 ipsec payload seen: NOTIFY (8 bytes) 
16:55:11 ipsec payload seen: NOTIFY (28 bytes) 
16:55:11 ipsec payload seen: NOTIFY (28 bytes) 
16:55:11 ipsec payload seen: VID (24 bytes) 
16:55:11 ipsec,debug 1e2b516905991c7d7c96fcbfb587e46100000009 
16:55:11 ipsec payload seen: VID (20 bytes) 
16:55:11 ipsec,debug fb1de3cdf341b7ea16b7e5be0855f120 
16:55:11 ipsec payload seen: VID (20 bytes) 
16:55:11 ipsec,debug 26244d38eddb61b3172a36e3d0cfb819 
16:55:11 ipsec payload seen: VID (24 bytes) 
16:55:11 ipsec,debug 01528bbbc00696121849ab9a1c5b2a5100000002 
16:55:11 ipsec processing payload: NONCE 
16:55:11 ipsec processing payload: SA 
16:55:11 ipsec,debug unknown auth: #13 
16:55:11 ipsec,debug unknown prf: #6 
16:55:11 ipsec,debug unknown auth: #13 
16:55:11 ipsec,debug unknown prf: #6 
16:55:11 ipsec IKE Protocol: IKE 
16:55:11 ipsec  proposal #1 
16:55:11 ipsec   enc: 3des-cbc 
16:55:11 ipsec   prf: hmac-sha1 
16:55:11 ipsec   auth: sha1 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec  proposal #2 
16:55:11 ipsec   enc: aes256-cbc 
16:55:11 ipsec   prf: hmac-sha1 
16:55:11 ipsec   auth: sha1 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec  proposal #3 
16:55:11 ipsec   enc: 3des-cbc 
16:55:11 ipsec   prf: hmac-sha256 
16:55:11 ipsec   auth: sha256 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec  proposal #4 
16:55:11 ipsec   enc: aes256-cbc 
16:55:11 ipsec   prf: hmac-sha256 
16:55:11 ipsec   auth: sha256 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec  proposal #5 
16:55:11 ipsec   enc: 3des-cbc 
16:55:11 ipsec   prf: unknown 
16:55:11 ipsec   auth: unknown 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec  proposal #6 
16:55:11 ipsec   enc: aes256-cbc 
16:55:11 ipsec   prf: unknown 
16:55:11 ipsec   auth: unknown 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec matched proposal: 
16:55:11 ipsec  proposal #2 
16:55:11 ipsec   enc: aes256-cbc 
16:55:11 ipsec   prf: hmac-sha1 
16:55:11 ipsec   auth: sha1 
16:55:11 ipsec   dh: modp1024 
16:55:11 ipsec processing payload: KE 
16:55:11 ipsec,debug => shared secret (size 0x80) 
16:55:11 ipsec,debug 4dc86b54 541c1a68 4486fbd1 315042fb ce923ecc 2f63f201 f2e3f2a0 40f0af05 
16:55:11 ipsec,debug 35ff351b 9731dad8 5baed6df 9f4939e0 56f4c3f1 e858979e 1af3a08c afe446aa 
16:55:11 ipsec,debug f13ac102 88f8d6e3 e216f630 25838738 407ab192 7d4c3d64 df950033 abf4373c 
16:55:11 ipsec,debug a3283322 52328fd0 18ddbc30 019294e1 2fd6b70b 21b77d87 c2a1a1c8 d30f590e 
16:55:11 ipsec adding payload: SA 
16:55:11 ipsec,debug => (size 0x30) 
16:55:11 ipsec,debug 00000030 0000002c 02010004 0300000c 0100000c 800e0100 03000008 02000002 
16:55:11 ipsec,debug 03000008 03000002 00000008 04000002 
16:55:11 ipsec adding payload: KE 
16:55:11 ipsec,debug => (size 0x88) 
16:55:11 ipsec,debug 00000088 00020000 6a390a71 1c9c6b69 5a8ceab0 763a7fe7 135f8adb 8860e38d 
16:55:11 ipsec,debug e99ce94e c1629671 a2bca42a 179244a9 d5611256 c54703a2 cbdffd01 ac06ca0c 
16:55:11 ipsec,debug b7ca6633 7db9901e 1d217c62 c87fa085 893149c7 68f0ed32 c3a835fa 806118e6 
16:55:11 ipsec,debug 6e29d69f 1988c6b2 9b47ecb8 3a1d8cb7 fd162eda b63869f7 b0e6659e 4e78b89f 
16:55:11 ipsec,debug 529b2ad8 4d06b367 
16:55:11 ipsec adding payload: NONCE 
16:55:11 ipsec,debug => (size 0x1c) 
16:55:11 ipsec,debug 0000001c 7eb5bf4a f4999c3f d3f42a88 bc383193 19071fc1 65104f47 
16:55:11 ipsec adding notify: NAT_DETECTION_SOURCE_IP 
16:55:11 ipsec,debug => (size 0x1c) 
16:55:11 ipsec,debug 0000001c 00004004 21d45705 d076eb89 bc6bdd0a 3cbcf014 cd1a319f 
16:55:11 ipsec adding notify: NAT_DETECTION_DESTINATION_IP 
16:55:11 ipsec,debug => (size 0x1c) 
16:55:11 ipsec,debug 0000001c 00004005 57956165 87fb93b7 4e7dc4ae 94209352 a2d11879 
16:55:11 ipsec adding payload: CERTREQ 
16:55:11 ipsec,debug => (size 0x5) 
16:55:11 ipsec,debug 00000005 04 
16:55:11 ipsec <- ike2 reply, exchange: SA_INIT:0 109.172.70.44[223] 6d3d606cb0e19562:ef2f19c1c765fc1a 
16:55:11 ipsec,debug ===== sending 301 bytes from W_IP.W_IP.W_IP.W_IP[500] to 109.172.70.44[223] 
16:55:11 ipsec,debug 1 times of 301 bytes message will be sent to 109.172.70.44[223] 
16:55:11 ipsec,debug => skeyseed (size 0x14) 
16:55:11 ipsec,debug 61c574cc 680657c7 c1894032 732798a7 a4a0561d 
16:55:11 ipsec,debug => keymat (size 0x14) 
16:55:11 ipsec,debug a2babe96 fc96a1db c21c45e0 4e628260 d8d15d6a 
16:55:11 ipsec,debug => SK_ai (size 0x14) 
16:55:11 ipsec,debug 1be94ac4 42844d68 e3d30c9e 4b442d2b 0174abb5 
16:55:11 ipsec,debug => SK_ar (size 0x14) 
16:55:11 ipsec,debug 8b3a80b6 26b44196 a7211d2c 29f77418 f71b7d5b 
16:55:11 ipsec,debug => SK_ei (size 0x20) 
16:55:11 ipsec,debug 63a8a29a 8d5cd850 263edd6b 02bff7c7 6ff4855d dbad8165 aee839ec 7329b9c5 
16:55:11 ipsec,debug => SK_er (size 0x20) 
16:55:11 ipsec,debug 8378d215 ea6f780b d1e34665 1e68b0ad f855ba1f 35b4d024 4af8b82b a7bb84be 
16:55:11 ipsec,debug => SK_pi (size 0x14) 
16:55:11 ipsec,debug 45adac7f 37fc54a5 87474d8f d64ee499 b2b7470a 
16:55:11 ipsec,debug => SK_pr (size 0x14) 
16:55:11 ipsec,debug 5234960c 78aa54d6 f498f32d 0d1d4d65 b842376f 
16:55:11 ipsec,info new ike2 SA (R): W_IP.W_IP.W_IP.W_IP[500]-109.172.70.44[223] spi:ef2f19c1c765fc1a:6d3d606cb0e19562 
16:55:11 ipsec processing payloads: VID 
16:55:11 ipsec peer is MS Windows (ISAKMPOAKLEY 9) 
16:55:11 ipsec processing payloads: NOTIFY 
16:55:11 ipsec   notify: IKEV2_FRAGMENTATION_SUPPORTED 
16:55:11 ipsec   notify: NAT_DETECTION_SOURCE_IP 
16:55:11 ipsec   notify: NAT_DETECTION_DESTINATION_IP 
16:55:11 ipsec (NAT-T) REMOTE  
16:55:11 ipsec KA list add: W_IP.W_IP.W_IP.W_IP[4500]->109.172.70.44[223] 
16:55:20 ipsec,debug KA: W_IP.W_IP.W_IP.W_IP[4500]->109.172.70.44[223] 
16:55:20 ipsec,debug 1 times of 1 bytes message will be sent to 109.172.70.44[223] 
16:55:40 ipsec,debug KA: W_IP.W_IP.W_IP.W_IP[4500]->109.172.70.44[223] 
16:55:40 ipsec,debug 1 times of 1 bytes message will be sent to 109.172.70.44[223] 
16:55:41 ipsec child negitiation timeout in state 0 
16:55:41 ipsec,info killing ike2 SA: W_IP.W_IP.W_IP.W_IP[4500]-109.172.70.44[223] spi:ef2f19c1c765fc1a:6d3d606cb0e19562 
16:55:41 ipsec KA remove: W_IP.W_IP.W_IP.W_IP[4500]->109.172.70.44[223] 
16:55:41 ipsec,debug KA tree dump: W_IP.W_IP.W_IP.W_IP[4500]->109.172.70.44[223] (in_use=1) 
16:55:41 ipsec,debug KA removing this one...

WIN10 get error 809. I try connect to two another different Mikrotik routers use IKE2 RSA from my WIN10. All connection was successful.
Please ask if need additional information to debug…

From what I can see in the log, either the first response of the Tik does not reach the Windows machine, or the next packet from the Windows machine gets lost in transmission.
Hence my first step would be to run Wireshark on the Windows machine before trying to connect again; the capture filter would be just udp port 500 (or none at all and display filter udp.port == 500, either will do).

In a recent topic here, the root cause of a similar issue was a too large certificate causing the packet to be fragmented, and some ill-configured firewall along the way dropping the fragment, but it is just one of the possibilities. But I must admit that a firewall which src-nats port 500 to 223 looks really suspicious to me :slight_smile:

I agree with You: “223” look very strange.
Dump from WIN10 udp.port==500

No.     Time           Source                Destination           Protocol Length Info
   2477 7.070058       172.16.250.69         W_IP.W_IP.W_IP.W_IP        ISAKMP   666    IKE_SA_INIT MID=00 Initiator Request

Frame 2477: 666 bytes on wire (5328 bits), 666 bytes captured (5328 bits) on interface \Device\NPF_{EF7DF19E-29D7-4020-9622-CB24D90C88F3}, id 0
Ethernet II, Src: RivetNet_b1:38:91 (9c:b6:d0:b1:38:91), Dst: ZyxelCom_6b:9c:0c (58:8b:f3:6b:9c:0c)
Internet Protocol Version 4, Src: 172.16.250.69, Dst: W_IP.W_IP.W_IP.W_IP
User Datagram Protocol, Src Port: 500, Dst Port: 500
Internet Security Association and Key Management Protocol
    Initiator SPI: 9a777722b5e2dc8a
    Responder SPI: 0000000000000000
    Next payload: Security Association (33)
    Version: 2.0
    Exchange type: IKE_SA_INIT (34)
    Flags: 0x08 (Initiator, No higher version, Request)
    Message ID: 0x00000000
    Length: 624
    Payload: Security Association (33)
        Next payload: Key Exchange (34)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 256
        Payload: Proposal (2) # 1
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 40
            Proposal number: 1
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 2
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 2
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 3
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 40
            Proposal number: 3
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_256_128 (12)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 4
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 4
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_256_128 (12)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 5
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 40
            Proposal number: 5
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 6
            Next payload: NONE / No Next Payload  (0)
            Reserved: 00
            Payload length: 44
            Proposal number: 6
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
    Payload: Key Exchange (34)
        Next payload: Nonce (40)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 136
        DH Group #: Alternate 1024-bit MODP group (2)
        Reserved: 0000
        Key Exchange Data: 5ed2c03f7476b4194e6085b739cc0c179932e07f840e59ef…
    Payload: Nonce (40)
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 52
        Nonce DATA: 3314e7aa21231e492eea3d6d1ea7be44400399c92dd773d6…
    Payload: Notify (41) - IKEV2_FRAGMENTATION_SUPPORTED
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 8
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: IKEV2_FRAGMENTATION_SUPPORTED (16430)
        Notification DATA: <MISSING>
    Payload: Notify (41) - NAT_DETECTION_SOURCE_IP
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_SOURCE_IP (16388)
        Notification DATA: 9fecc240ede44903957c20ed5c89dde06739dfb0
    Payload: Notify (41) - NAT_DETECTION_DESTINATION_IP
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_DESTINATION_IP (16389)
        Notification DATA: 00f1f76acdf970b5d557e45b3e04d8282d1ab2ad
    Payload: Vendor ID (43) : MS NT5 ISAKMPOAKLEY
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 24
        Vendor ID: 1e2b516905991c7d7c96fcbfb587e46100000009
        Vendor ID: MS NT5 ISAKMPOAKLEY
        MS NT5 ISAKMPOAKLEY: Unknown (9)
    Payload: Vendor ID (43) : MS-Negotiation Discovery Capable
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 20
        Vendor ID: fb1de3cdf341b7ea16b7e5be0855f120
        Vendor ID: MS-Negotiation Discovery Capable
    Payload: Vendor ID (43) : Microsoft Vid-Initial-Contact
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 20
        Vendor ID: 26244d38eddb61b3172a36e3d0cfb819
        Vendor ID: Microsoft Vid-Initial-Contact
    Payload: Vendor ID (43) : Unknown Vendor ID
        Next payload: NONE / No Next Payload  (0)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 24
        Vendor ID: 01528bbbc00696121849ab9a1c5b2a5100000002
        Vendor ID: Unknown Vendor ID

No.     Time           Source                Destination           Protocol Length Info
   2478 7.217603       W_IP.W_IP.W_IP.W_IP        172.16.250.69         ISAKMP   339    IKE_SA_INIT MID=00 Responder Response

Frame 2478: 339 bytes on wire (2712 bits), 339 bytes captured (2712 bits) on interface \Device\NPF_{EF7DF19E-29D7-4020-9622-CB24D90C88F3}, id 0
Ethernet II, Src: ZyxelCom_6b:9c:0c (58:8b:f3:6b:9c:0c), Dst: RivetNet_b1:38:91 (9c:b6:d0:b1:38:91)
Internet Protocol Version 4, Src: W_IP.W_IP.W_IP.W_IP, Dst: 172.16.250.69
User Datagram Protocol, Src Port: 500, Dst Port: 500
Internet Security Association and Key Management Protocol
    Initiator SPI: 9a777722b5e2dc8a
    Responder SPI: 3d9b819330b70e73
    Next payload: Security Association (33)
    Version: 2.0
    Exchange type: IKE_SA_INIT (34)
    Flags: 0x20 (Responder, No higher version, Response)
    Message ID: 0x00000000
    Length: 297
    Payload: Security Association (33)
        Next payload: Key Exchange (34)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 44
        Payload: Proposal (2) # 1
            Next payload: NONE / No Next Payload  (0)
            Reserved: 00
            Payload length: 40
            Proposal number: 1
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
    Payload: Key Exchange (34)
        Next payload: Nonce (40)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 136
        DH Group #: Alternate 1024-bit MODP group (2)
        Reserved: 0000
        Key Exchange Data: 77bdde43a185a37ca4a95f8150641de4466201e4ce9c6973…
    Payload: Nonce (40)
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Nonce DATA: e791442eb5e0fb6c13bfb5229fc4513fc1859ce9e384ef58
    Payload: Notify (41) - NAT_DETECTION_SOURCE_IP
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_SOURCE_IP (16388)
        Notification DATA: 2116c124b019adc64c2146f4809ba362af9e2681
    Payload: Notify (41) - NAT_DETECTION_DESTINATION_IP
        Next payload: Certificate Request (38)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_DESTINATION_IP (16389)
        Notification DATA: 3ba3da7ca9ee728ed3bdb495a5d88aca2599026b
    Payload: Certificate Request (38)
        Next payload: NONE / No Next Payload  (0)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 5
        Certificate Type: X.509 Certificate - Signature (4)

OK, so the next packet from Windows side didn’t get lost but the Windows have never sent it, which means they didn’t like something about the Tik’s response.

Normally I would say that there is a NAT with port forwarding at server side which the Windows don’t handle well unless you tweak the registry, but as you say it is the real IP of the WAN (W_IP…), I can only imagine that the Windows cannot find/use the certificate. Do you use the same certificate on these Win10 also to connect to the other Mikrotiks?

Sindy thank You for quick response!

Do you use the same certificate on these Win10 also to connect to the other Mikrotiks?

No, I use different certificates signed by these routers and set-vpnconnection to select right CA certificate.
Also I try connect by LTE, and ask colleagues to connect, renault was the same - 809.

Hm. If so, I would try to tell the VPN client to use one of the certificates that work with another Mikrotik also for this one and run the Wireshark again. If the Windows send the third packet of the IKEv2 initial exchange (i.e. the “response to Tik’s response”) in this case, it means that the issue is with the certificate (the connection will not fully succeed of course as it would need more certificates to be copied at various places). If it doesn’t change anything, I’d change the server address in one of the existing connections to the W_IP… and try the same - if the session establishment gets past the first response from the Tik, it means that the issue is with the virtual interface on the Windows.

Ok, if i understand right:

  1. I set wrong CA on my connection and run dump:
No.     Time           Source                Destination           Protocol Length Info
     77 9.559994       172.16.250.51         91.221.164.210        ISAKMP   1146   IKE_SA_INIT MID=00 Initiator Request

Frame 77: 1146 bytes on wire (9168 bits), 1146 bytes captured (9168 bits) on interface \Device\NPF_{EF7DF19E-29D7-4020-9622-CB24D90C88F3}, id 0
Ethernet II, Src: RivetNet_b1:38:91 (9c:b6:d0:b1:38:91), Dst: ZyxelCom_6b:9c:0c (58:8b:f3:6b:9c:0c)
Internet Protocol Version 4, Src: 172.16.250.51, Dst: 91.221.164.210
User Datagram Protocol, Src Port: 500, Dst Port: 500
Internet Security Association and Key Management Protocol
    Initiator SPI: fe865ae2b3552225
    Responder SPI: 0000000000000000
    Next payload: Security Association (33)
    Version: 2.0
    Exchange type: IKE_SA_INIT (34)
    Flags: 0x08 (Initiator, No higher version, Request)
    Message ID: 0x00000000
    Length: 1104
    Payload: Security Association (33)
        Next payload: Key Exchange (34)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 736
        Payload: Proposal (2) # 1
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 40
            Proposal number: 1
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 2
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 40
            Proposal number: 2
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_256_128 (12)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 3
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 40
            Proposal number: 3
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 4
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 4
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 128
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 5
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 5
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 128
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_256_128 (12)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 6
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 6
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 128
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 7
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 7
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 192
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 8
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 8
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 192
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_256_128 (12)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 9
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 9
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 192
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 10
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 10
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 11
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 11
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_256_128 (12)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 12
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 44
            Proposal number: 12
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_AES_CBC (12)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 13
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 36
            Proposal number: 13
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 3
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)
                Transform Attribute (t=14,l=2): Key Length: 128
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 14
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 36
            Proposal number: 14
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 3
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)
                Transform Attribute (t=14,l=2): Key Length: 128
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 15
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 36
            Proposal number: 15
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 3
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)
                Transform Attribute (t=14,l=2): Key Length: 128
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 16
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 36
            Proposal number: 16
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 3
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 17
            Next payload: Proposal (2)
            Reserved: 00
            Payload length: 36
            Proposal number: 17
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 3
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_256 (5)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
        Payload: Proposal (2) # 18
            Next payload: NONE / No Next Payload  (0)
            Reserved: 00
            Payload length: 36
            Proposal number: 18
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 3
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 12
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)
                Transform Attribute (t=14,l=2): Key Length: 256
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA2_384 (6)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
    Payload: Key Exchange (34)
        Next payload: Nonce (40)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 136
        DH Group #: Alternate 1024-bit MODP group (2)
        Reserved: 0000
        Key Exchange Data: 6121e5a5e0770937d33bdc50d53138aa70f03666655dd91f…
    Payload: Nonce (40)
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 52
        Nonce DATA: 5a694378439a30be9cb04fdf3ef646048da768de9474e802…
    Payload: Notify (41) - IKEV2_FRAGMENTATION_SUPPORTED
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 8
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: IKEV2_FRAGMENTATION_SUPPORTED (16430)
        Notification DATA: <MISSING>
    Payload: Notify (41) - NAT_DETECTION_SOURCE_IP
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_SOURCE_IP (16388)
        Notification DATA: b3657915ae8f1d2a8af069108c2e480d4150becb
    Payload: Notify (41) - NAT_DETECTION_DESTINATION_IP
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_DESTINATION_IP (16389)
        Notification DATA: 838991edec7fa2bcf0e59ab7d33814c6e2c86e19
    Payload: Vendor ID (43) : MS NT5 ISAKMPOAKLEY
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 24
        Vendor ID: 1e2b516905991c7d7c96fcbfb587e46100000009
        Vendor ID: MS NT5 ISAKMPOAKLEY
        MS NT5 ISAKMPOAKLEY: Unknown (9)
    Payload: Vendor ID (43) : MS-Negotiation Discovery Capable
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 20
        Vendor ID: fb1de3cdf341b7ea16b7e5be0855f120
        Vendor ID: MS-Negotiation Discovery Capable
    Payload: Vendor ID (43) : Microsoft Vid-Initial-Contact
        Next payload: Vendor ID (43)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 20
        Vendor ID: 26244d38eddb61b3172a36e3d0cfb819
        Vendor ID: Microsoft Vid-Initial-Contact
    Payload: Vendor ID (43) : Unknown Vendor ID
        Next payload: NONE / No Next Payload  (0)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 24
        Vendor ID: 01528bbbc00696121849ab9a1c5b2a5100000002
        Vendor ID: Unknown Vendor ID

No.     Time           Source                Destination           Protocol Length Info
     78 9.831974       91.221.164.210        172.16.250.51         ISAKMP   339    IKE_SA_INIT MID=00 Responder Response

Frame 78: 339 bytes on wire (2712 bits), 339 bytes captured (2712 bits) on interface \Device\NPF_{EF7DF19E-29D7-4020-9622-CB24D90C88F3}, id 0
Ethernet II, Src: ZyxelCom_6b:9c:0c (58:8b:f3:6b:9c:0c), Dst: RivetNet_b1:38:91 (9c:b6:d0:b1:38:91)
Internet Protocol Version 4, Src: 91.221.164.210, Dst: 172.16.250.51
User Datagram Protocol, Src Port: 500, Dst Port: 500
Internet Security Association and Key Management Protocol
    Initiator SPI: fe865ae2b3552225
    Responder SPI: ad49fbca235b8967
    Next payload: Security Association (33)
    Version: 2.0
    Exchange type: IKE_SA_INIT (34)
    Flags: 0x20 (Responder, No higher version, Response)
    Message ID: 0x00000000
    Length: 297
    Payload: Security Association (33)
        Next payload: Key Exchange (34)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 44
        Payload: Proposal (2) # 1
            Next payload: NONE / No Next Payload  (0)
            Reserved: 00
            Payload length: 40
            Proposal number: 1
            Protocol ID: IKE (1)
            SPI Size: 0
            Proposal transforms: 4
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Encryption Algorithm (ENCR) (1)
                Reserved: 00
                Transform ID (ENCR): ENCR_3DES (3)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Pseudo-random Function (PRF) (2)
                Reserved: 00
                Transform ID (PRF): PRF_HMAC_SHA1 (2)
            Payload: Transform (3)
                Next payload: Transform (3)
                Reserved: 00
                Payload length: 8
                Transform Type: Integrity Algorithm (INTEG) (3)
                Reserved: 00
                Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)
            Payload: Transform (3)
                Next payload: NONE / No Next Payload  (0)
                Reserved: 00
                Payload length: 8
                Transform Type: Diffie-Hellman Group (D-H) (4)
                Reserved: 00
                Transform ID (D-H): Alternate 1024-bit MODP group (2)
    Payload: Key Exchange (34)
        Next payload: Nonce (40)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 136
        DH Group #: Alternate 1024-bit MODP group (2)
        Reserved: 0000
        Key Exchange Data: 1e7c056080c6afe502a20b16401bd611441443a7fc23906c…
    Payload: Nonce (40)
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Nonce DATA: 0e99fe5c6871af2b1046a4c47b75a7882155fff7b1e19fce
    Payload: Notify (41) - NAT_DETECTION_SOURCE_IP
        Next payload: Notify (41)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_SOURCE_IP (16388)
        Notification DATA: c66a7fca202e3c20003c0e59156193b25c74946c
    Payload: Notify (41) - NAT_DETECTION_DESTINATION_IP
        Next payload: Certificate Request (38)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 28
        Protocol ID: RESERVED (0)
        SPI Size: 0
        Notify Message Type: NAT_DETECTION_DESTINATION_IP (16389)
        Notification DATA: c7598ea9aceb7b9c4f587da337ae6ed8ca3127a6
    Payload: Certificate Request (38)
        Next payload: NONE / No Next Payload  (0)
        0... .... = Critical Bit: Not Critical
        .000 0000 = Reserved: 0x00
        Payload length: 5
        Certificate Type: X.509 Certificate - Signature (4)

it look like prevision dump. So I run dump from good connection and it the same with this one: 2 packets.

  1. I change IP in good connection and get 809. Dump is the same.

May be problem with ISP wan ip (91.221.164.210) translation?

“Wrong” as in “не родной”, i.e. a good one but not relevant for the server, yes.


Now wait a bit… a good connection towards another router successfully connects but you can see only two packets in the dump as well? In that case I’m an idiot and the third packet already goes to port 4500, so please repeat all tests while watching also (not only) for UDP port 4500 because the initial setup (new server, appropriate certificate) likely does the same and the problem is not the certificate.


I cannot see how the initial packet could get to the router if there was something like that. Port 4500 blocked at ISP sounds more likely to me than some IP address manipulation.

“Wrong” as in “не родной”, i.e. a good one but not relevant for the server, yes.

Yes, I use good CA cert. from another router.

Now wait a bit… a good connection towards another router successfully connects but you can see only two packets in the dump as well? In that case I’m an idiot and the third packet already goes to port 4500, so please repeat all tests while watching also (not only) for UDP port 4500 because the initial setup (new server, appropriate certificate) likely does the same and the problem is not the certificate.

…I also forgot add 4500 port :slight_smile:
Good connection dump:

No.     Time           Source                Destination           Protocol Length Info
     91 11.927829      172.16.250.51         xxx.xxx.xxx.xxx       ISAKMP   1146   IKE_SA_INIT MID=00 Initiator Request
     94 12.102856      xxx.xxx.xxx.xxx       172.16.250.51         ISAKMP   343    IKE_SA_INIT MID=00 Responder Response
     96 12.135474      172.16.250.51         xxx.xxx.xxx.xxx       ISAKMP   1442   IKE_AUTH MID=01 Initiator Request
     97 12.319531      xxx.xxx.xxx.xxx       172.16.250.51         ISAKMP   1450   IKE_AUTH MID=01 Responder Response
    103 12.418832      172.16.250.51         xxx.xxx.xxx.xxx       ESP      126    ESP (SPI=0x09daa5ec)
    107 12.440902      172.16.250.51         xxx.xxx.xxx.xxx       ESP      1198   ESP (SPI=0x09daa5ec)
    112 12.443049      172.16.250.51         xxx.xxx.xxx.xxx       ESP      126    ESP (SPI=0x09daa5ec)
    113 12.443193      172.16.250.51         xxx.xxx.xxx.xxx       ESP      126    ESP (SPI=0x09daa5ec)
    117 12.457210      172.16.250.51         xxx.xxx.xxx.xxx       ESP      142    ESP (SPI=0x09daa5ec)
    124 12.475977      172.16.250.51         xxx.xxx.xxx.xxx       ESP      414    ESP (SPI=0x09daa5ec)
    125 12.491855      172.16.250.51         xxx.xxx.xxx.xxx       ESP      158    ESP (SPI=0x09daa5ec)
    130 12.505841      172.16.250.51         xxx.xxx.xxx.xxx       ESP      254    ESP (SPI=0x09daa5ec)
    142 12.537450      xxx.xxx.xxx.xxx       172.16.250.51         ESP      414    ESP (SPI=0x6afbe220)
    557 16.921050      xxx.xxx.xxx.xxx       172.16.250.51         UDPENCAP 60     NAT-keepalive
   1147 36.833545      172.16.250.51         xxx.xxx.xxx.xxx       ISAKMP   1146   IKE_SA_INIT MID=00 Initiator Request
   1148 36.980012      xxx.xxx.xxx.xxx       172.16.250.51         ISAKMP   343    IKE_SA_INIT MID=00 Responder Response
   1149 36.980602      xxx.xxx.xxx.xxx       172.16.250.51         UDPENCAP 60     NAT-keepalive
   1151 37.005758      172.16.250.51         xxx.xxx.xxx.xxx       ISAKMP   1442   IKE_AUTH MID=01 Initiator Request
   1154 37.187702      xxx.xxx.xxx.xxx       172.16.250.51         ISAKMP   1450   IKE_AUTH MID=01 Responder Response
   1160 37.284709      172.16.250.51         xxx.xxx.xxx.xxx       ESP      126    ESP (SPI=0x05cd621a)
   1161 37.284949      172.16.250.51         xxx.xxx.xxx.xxx       ESP      126    ESP (SPI=0x05cd621a)

and bad:

No.     Time           Source                Destination           Protocol Length Info
    253 5.065111       172.16.250.51         91.221.164.210        ISAKMP   1146   IKE_SA_INIT MID=00 Initiator Request
    254 5.368809       91.221.164.210        172.16.250.51         ISAKMP   339    IKE_SA_INIT MID=00 Responder Response
    256 5.408198       172.16.250.51         91.221.164.210        ISAKMP   1458   IKE_AUTH MID=01 Initiator Request
    272 6.408282       172.16.250.51         91.221.164.210        ISAKMP   1458   IKE_AUTH MID=01 Initiator Request
    279 7.408384       172.16.250.51         91.221.164.210        ISAKMP   1458   IKE_AUTH MID=01 Initiator Request

WIN10 do not receive respond from Router

I cannot see how the initial packet could get to the router if there was something like that. Port 4500 blocked at ISP sounds more likely to me than some IP address manipulation.

how it is possible to check?

If you have a Windows softphone already installed, tell it to register at server address port 4500 using UDP, otherwise look for a tool which can send a UDP packet to an arbitraty port and address.

On the Tik, use a firewall passthrough rule or /tool sniffer to see whether the packet arrives.

But seeing that the third packet in the “good” case has 1450 bytes whereas in the “bad” one it has 1458, the fragmentation-related root cause comes back into play, especially if there is PPPoE somewhere in the path. Do you use RSA or ECDSA certificates, and what key length?

If you have a Windows softphone already installed, tell it to register at server address port 4500 using UDP, otherwise look for a tool which can send a UDP packet to an arbitraty port and address.
On the Tik, use a firewall passthrough rule or /tool sniffer to see whether the packet arrives.

I am meke separate rule for UDP4500 on Tik and log it:

  1. Start SIP registration and log packet
UDP4500 input: in:ether1_WAN out:(unknown 0), src-mac 90:e2:ba:f7:34:95, proto UDP, 109.172.70.44:35016->91.221.164.210:4500, len 421
  1. Start vpn connection from WIN10 and do not get packets on 4500 port;
  2. Start vpn from mobile phone by LTE and do not get packets on 4500 port;
  3. Configure Vpn IKE2 preshared key(RSA not supported) and successfully connect :-0. Router ‘public’ ip - 10.61.73.44
    2020-04-14_18-37-44.png

The pre-shared key is significantly smaller than an certificate, plus, given that you mention another IP, I guess the path is not the same between this test client and the Tik like between. So if you can run this client which only supports PSK with IKEv2 (is it a PC application or something else?) in the same network where you run the PC and it connects as well, it’s the certificate size and the fragmentation.

That’s why I was asking what kind of certificates you use. ECDSA allows much shorter keys for the same level of security, and we talk here about only 8 or even less bytes which need to be saved to make the 3rd packet short enough to pass through.

Sorry I forgot about certificate: RSA 2048 default, Mikrotik settings.

OK, in that case, even secp384r1 will be more secure and at the same time smaller. Choose it to create both a new CA certificate and a new client one signed by the new CA. Unfortunately, I haven’t seen in Mikrotik’s changelog yet that ECDSA certificates could be created the proper way, where you create a certificate request with a private key on the machine which will be using the certificate, send only the request to the CA, and import the signed certificate back to the requesting machine, so the private key for the certificate never leaves that machine. So you have to create the client certificate on the Mikrotik, export it along with the private key, and import it on the PC the way the manual suggests.

We changed the provider and the problem went away :slight_smile: