Hi,
i have a problem with VPN connection I’m trying to set up. The complication is that mikrotik router is behind ADSL router (ZyXEL).
So I set up DMZ for Mikrotik on ZyXEL router. Mikrotik router has 10.0.0.50 static IP and its providing network 10.0.1.0/28 which I’m trying to connect to remote network
I have successfully established phase1 connection:
But can’t go through phase2:
Router config:
jul/23/2019 15:31:30 by RouterOS 6.44.3
software id = PNK7-8NB6
model = 2011iLS
serial number = 7DD20A95F8DA
/interface bridge
add admin-mac=74:4D:28:2F:97:79 auto-mac=no comment=defconf name=bridge
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip ipsec profile
add dh-group=modp2048 dpd-interval=1m40s enc-algorithm=aes-256
hash-algorithm=sha256 lifetime=24m name=TFS_profile nat-traversal=no
/ip ipsec peer
add address=52.57.130.45/32 name=TFS_preProd_peer profile=TFS_profile
/ip ipsec proposal
set [ find default=yes ] disabled=yes
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc lifetime=24m name=
TFS_proposal pfs-group=modp2048
/ip pool
add name=default-dhcp ranges=10.0.1.1-10.0.1.100
add name=dhcp ranges=10.0.1.0/28
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
add address-pool=dhcp disabled=no interface=bridge name=dhcp1
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp1
add bridge=bridge disabled=yes interface=ether1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface detect-internet
set detect-interface-list=all
/interface list member
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=ether6 list=LAN
add interface=ether7 list=LAN
add interface=ether8 list=LAN
add interface=ether9 list=LAN
add interface=ether10 list=LAN
add interface=sfp1 list=LAN
add interface=bridge list=LAN
/ip address
add address=10.0.1.1/28 interface=ether2 network=10.0.1.0
add address=10.0.0.50/8 interface=ether1 network=10.0.0.0
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid interface=ether1
/ip dhcp-server network
add address=10.0.0.0/8 comment=defconf gateway=10.0.0.50 netmask=8
add address=10.0.1.0/28 gateway=10.0.1.1 netmask=28
/ip dns
set allow-remote-requests=yes servers=10.0.0.141
/ip dns static
add address=10.0.1.1 name=router.lan
/ip firewall filter
add action=accept chain=input protocol=ipsec-ah
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input port=500 protocol=udp
add action=accept chain=input port=4500 protocol=udp
add action=accept chain=input comment=
“defconf: accept established,related,untracked” connection-state=
established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=
invalid disabled=yes
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid”
connection-limit=!10,32 connection-state=invalid disabled=yes
add action=drop chain=forward comment=
“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat
connection-state=new disabled=yes in-interface-list=WAN
/ip firewall mangle
add action=log chain=prerouting disabled=yes log-prefix=AAAA src-address=
52.57.130.45
add action=log chain=prerouting disabled=yes log=yes log-prefix=AA protocol=
ipsec-esp
add action=log chain=prerouting disabled=yes log=yes log-prefix=__ protocol=
udp src-port=500,4500
/ip firewall nat
add action=accept chain=srcnat dst-address=10.123.113.29 src-address=
10.0.1.0/28
add action=masquerade chain=srcnat comment=“defconf: masquerade”
ipsec-policy=out,none out-interface-list=WAN
/ip ipsec identity
add peer=TFS_preProd_peer secret=**********
/ip ipsec policy
add dst-address=10.123.113.29/32 proposal=TFS_proposal sa-dst-address=
52.57.130.45 sa-src-address=46.13.73.241 src-address=10.0.0.50/32
src-port=500 tunnel=yes
set 1 disabled=yes
/ip route
add distance=1 gateway=10.0.0.138
add disabled=yes distance=1 dst-address=46.13.73.241/32 gateway=10.123.113.29
add disabled=yes distance=1 dst-address=52.57.130.45/32 gateway=ether1
/system clock
set time-zone-name=Europe/Prague
/system logging
add topics=ipsec
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
From mikrotik log:
15:34:11 ipsec,debug compute IV for phase2
15:34:11 ipsec,debug phase1 last IV:
15:34:11 ipsec,debug fed4e9a8 e800f30c f149a8a4 0395444b c1e99bcc
15:34:11 ipsec,debug hash(sha2_256)
15:34:11 ipsec,debug encryption(aes)
15:34:11 ipsec,debug phase2 IV computed:
15:34:11 ipsec,debug 94124878 5f8beb88 cde2b431 c7393bc7
15:34:11 ipsec,debug HASH with:
15:34:11 ipsec,debug c1e99bcc 0000001c 00000001 01100001 ccac3fa1 61594452 8dd011f
4 ce327007
15:34:11 ipsec,debug hmac(hmac_sha2_256)
15:34:11 ipsec,debug HASH computed:
15:34:11 ipsec,debug fa03505f 240e5255 ee11181d 3dfd105f 9c58563c a892844d 9deaf50
d 7b9cc54c
15:34:11 ipsec,debug begin encryption.
15:34:11 ipsec,debug encryption(aes)
15:34:11 ipsec,debug pad length = 16
15:34:11 ipsec,debug 0c000024 fa03505f 240e5255 ee11181d 3dfd105f 9c58563c a892844
d 9deaf50d
15:34:11 ipsec,debug 7b9cc54c 0000001c 00000001 01100001 ccac3fa1 61594452 8dd011f
4 ce327007
15:34:11 ipsec,debug 2107367b 7af1e393 ba25a6fa c2b1990f
15:34:11 ipsec,debug encryption(aes)
15:34:11 ipsec,debug with key:
15:34:11 ipsec,debug f9f0bb68 08ab893e 698c1bf5 e10f03f0 4c858f1d 3b53da60 1084a9b
3 bb4619f7
15:34:11 ipsec,debug encrypted payload by IV:
15:34:11 ipsec,debug 94124878 5f8beb88 cde2b431 c7393bc7
15:34:11 ipsec,debug save IV for next:
15:34:11 ipsec,debug 9472e9da e905c828 64032370 87e7b936
15:34:11 ipsec,debug encrypted.
15:34:11 ipsec,debug 108 bytes from 10.0.0.50[500] to 52.57.130.45[500]
15:34:11 ipsec,debug 1 times of 108 bytes message will be sent to 52.57.130.45[500
]
15:34:11 ipsec,debug,packet ccac3fa1 61594452 8dd011f4 ce327007 08100501 c1e99bcc
0000006c dbf69ee5
15:34:11 ipsec,debug,packet 9edfc7b0 cc2ed2b3 7a96259c f29f36e3 5e81ddb9 e7bad3fc
52235b34 ddd67797
15:34:11 ipsec,debug,packet fee31214 9b6ac1c4 82143780 8c2b5c45 1beefbb1 ac5c65cb
6b55c156 9472e9da
15:34:11 ipsec,debug,packet e905c828 64032370 87e7b936
15:34:11 ipsec,debug sendto Information delete.
15:34:11 ipsec,info ISAKMP-SA deleted 10.0.0.50[500]-52.57.130.45[500] spi:ccac3fa
161594452:8dd011f4ce327007 rekey:1
15:34:11 ipsec,debug an undead schedule has been deleted.
15:34:11 system,info ipsec peer TFS_preProd_peer changed by admin
15:34:11 ipsec,debug ===
15:34:11 ipsec,info initiate new phase 1 (Identity Protection): 10.0.0.50[500]<=>5
2.57.130.45[500]
15:34:11 ipsec,debug new cookie:
15:34:11 ipsec,debug 2ba46988e906ed5c
15:34:11 ipsec,debug add payload of len 52, next type 13
15:34:11 ipsec,debug add payload of len 16, next type 13
15:34:11 ipsec,debug add payload of len 16, next type 0
15:34:11 ipsec,debug 124 bytes from 10.0.0.50[500] to 52.57.130.45[500]
15:34:11 ipsec,debug 1 times of 124 bytes message will be sent to 52.57.130.45[500
]
15:34:11 ipsec,debug,packet 2ba46988 e906ed5c 00000000 00000000 01100200 00000000
0000007c 0d000038
15:34:11 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000
800b0001 800c05a0
15:34:11 ipsec,debug,packet 80010007 800e0100 80030001 80020004 8004000e 0d000014
12f5f28c 457168a9
15:34:11 ipsec,debug,packet 702d9fe2 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc
77570100
15:34:11 ipsec sent phase1 packet 10.0.0.50[500]<=>52.57.130.45[500] 2ba46988e906e
d5c:0000000000000000
15:34:11 ipsec,debug ===== received 144 bytes from 52.57.130.45[500] to 10.0.0.50[
500]
15:34:11 ipsec,debug,packet 2ba46988 e906ed5c a40ab059 364d34ee 01100200 00000000
00000090 0d000038
15:34:11 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 01010000
800b0001 800c05a0
15:34:11 ipsec,debug,packet 80010007 800e0100 80030001 80020004 8004000e 0d000014
12f5f28c 457168a9
15:34:11 ipsec,debug,packet 702d9fe2 74cc0100 0d000014 afcad713 68a1f1c9 6b8696fc
77570100 00000014
15:34:11 ipsec,debug,packet a9b9b103 4f7e50a2 513b47b1 00bb85a9
15:34:11 ipsec,debug begin.
15:34:11 ipsec,debug seen nptype=1(sa) len=56
15:34:11 ipsec,debug seen nptype=13(vid) len=20
15:34:11 ipsec,debug seen nptype=13(vid) len=20
15:34:11 ipsec,debug seen nptype=13(vid) len=20
15:34:11 ipsec,debug succeed.
15:34:11 ipsec received Vendor ID: CISCO-UNITY
15:34:11 ipsec received Vendor ID: DPD
15:34:11 ipsec,debug remote supports DPD
15:34:11 ipsec,debug received unknown Vendor ID
15:34:11 ipsec,debug a9b9b103 4f7e50a2 513b47b1 00bb85a9
15:34:11 ipsec,debug total SA len=52
15:34:11 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 01010000 800b000
1 800c05a0
15:34:11 ipsec,debug 80010007 800e0100 80030001 80020004 8004000e
15:34:11 ipsec,debug begin.
15:34:11 ipsec,debug seen nptype=2(prop) len=44
15:34:11 ipsec,debug succeed.
15:34:11 ipsec,debug proposal #1 len=44
15:34:11 ipsec,debug begin.
15:34:11 ipsec,debug seen nptype=3(trns) len=36
15:34:11 ipsec,debug succeed.
15:34:11 ipsec,debug transform #1 len=36
15:34:11 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
15:34:11 ipsec,debug type=Life Duration, flag=0x8000, lorv=1440
15:34:11 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
15:34:11 ipsec,debug encryption(aes)
15:34:11 ipsec,debug type=Key Length, flag=0x8000, lorv=256
15:34:11 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
15:34:11 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
15:34:11 ipsec,debug hash(sha2_256)
15:34:11 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group15:34:11 ipsec,debug dh(modp2048)
15:34:11 ipsec,debug pair 1:
15:34:11 ipsec,debug 0x491410: next=(nil) tnext=(nil)
15:34:11 ipsec,debug proposal #1: 1 transform
15:34:11 ipsec,debug -checking with pre-shared key auth-
15:34:11 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
15:34:11 ipsec,debug trns#=1, trns-id=IKE
15:34:11 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds
15:34:11 ipsec,debug type=Life Duration, flag=0x8000, lorv=1440
15:34:11 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
15:34:11 ipsec,debug type=Key Length, flag=0x8000, lorv=256
15:34:11 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key
15:34:11 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=4
15:34:11 ipsec,debug type=Group Description, flag=0x8000, lorv=2048-bit MODP group15:34:11 ipsec,debug -compare proposal #1: Local:Peer
15:34:11 ipsec,debug (lifetime = 1440:1440)
15:34:11 ipsec,debug (lifebyte = 0:0)
15:34:11 ipsec,debug enctype = AES-CBC:AES-CBC
15:34:11 ipsec,debug (encklen = 256:256)
15:34:11 ipsec,debug hashtype = 4:4
15:34:11 ipsec,debug authmethod = pre-shared key:pre-shared key
15:34:11 ipsec,debug dh_group = 2048-bit MODP group:2048-bit MODP group
15:34:11 ipsec,debug -an acceptable proposal found-
15:34:11 ipsec,debug dh(modp2048)
15:34:11 ipsec,debug -agreed on pre-shared key auth-
15:34:11 ipsec,debug ===
15:34:11 ipsec,debug dh(modp2048)
15:34:12 ipsec,debug compute DH’s private.
15:34:12 ipsec,debug 5deab771 5ded8327 8fe71812 9e5541ff 10a4637b 48492c15 816d043
7 cd0562fc
15:34:12 ipsec,debug 2d902eac 2120153e b6489e5f 6b14d714 f5e3f4b1 166f46f0 4aca20d
4 90b3e201
15:34:12 ipsec,debug a387e5e3 54e43323 c60c9f9f 30305f6c 33b9a01b 35b68d5c 2d7162e
4 10731c7b
15:34:12 ipsec,debug 4aff98c0 44e99652 e251a264 864aa285 47cac067 adeafce2 40e2203
a ee536db2
15:34:12 ipsec,debug d1dc41a9 193f1828 045e65f8 620a77bb 2620f00e e2416438 a249d93
1 33b596f7
15:34:12 ipsec,debug 2aa43285 4d678297 c9a89abe 8f9a5586 6a54e5d0 6eab09bd df4d801
b fd967c78
15:34:12 ipsec,debug a9545a7a 24789cfa bece82a4 71f11097 463ca316 efc7d897 62c105e
e 9c82ba09
15:34:12 ipsec,debug bed26ee0 3046b3a3 a6143a74 cc8aeba8 fa6f73cf d00c537d cf6a3a1
8 d6e1f2cd
15:34:12 ipsec,debug compute DH’s public.
15:34:12 ipsec,debug 24d945e8 ed137b46 08f3b3a6 9ef73bf3 ee05679e d73e730c 4d68860
6 08b658ea
15:34:12 ipsec,debug c469dbae 7ce22f75 034b4c5b b6650667 5f048581 c1373a61 72904cd
c 135911c7
15:34:12 ipsec,debug 6a89ce8d fdab9eaf a6a4067a 2c14ba96 d4efe527 f9adf5f6 2e05b94
3 64005c03
15:34:12 ipsec,debug 3577f8f2 f6626bb2 31edeff2 1eb24961 49956074 32ec0cfa fb18ea6
d 4b547e87
15:34:12 ipsec,debug 1833c08d bd07970c 6c03ebe2 51c74fb2 2430344a 6a15964a 5b026bb
f ff3706d1
15:34:12 ipsec,debug 06fa0319 b75efc81 4441158a 7d9e640e 12cf90f0 987b513e 8804504
5 7889bcb4
15:34:12 ipsec,debug 71e8c1a7 af759e2f f8b4ad6b 50b0b0ba f26d5462 90a950f4 cd9ced5
e d6968020
15:34:12 ipsec,debug 2ddabfad b389b38c d201e55f e8885f14 25a277e1 5b00ab21 6c41d8d
4 6d2f1d5b
15:34:12 ipsec,debug add payload of len 256, next type 10
15:34:12 ipsec,debug add payload of len 24, next type 0
15:34:12 ipsec,debug 316 bytes from 10.0.0.50[500] to 52.57.130.45[500]
15:34:12 ipsec,debug 1 times of 316 bytes message will be sent to 52.57.130.45[500
]
15:34:12 ipsec,debug,packet 2ba46988 e906ed5c a40ab059 364d34ee 04100200 00000000
0000013c 0a000104
15:34:12 ipsec,debug,packet 24d945e8 ed137b46 08f3b3a6 9ef73bf3 ee05679e d73e730c
4d688606 08b658ea
15:34:12 ipsec,debug,packet c469dbae 7ce22f75 034b4c5b b6650667 5f048581 c1373a61
72904cdc 135911c7
15:34:12 ipsec,debug,packet 6a89ce8d fdab9eaf a6a4067a 2c14ba96 d4efe527 f9adf5f6
2e05b943 64005c03
15:34:12 ipsec,debug,packet 3577f8f2 f6626bb2 31edeff2 1eb24961 49956074 32ec0cfa
fb18ea6d 4b547e87
15:34:12 ipsec,debug,packet 1833c08d bd07970c 6c03ebe2 51c74fb2 2430344a 6a15964a
5b026bbf ff3706d1
15:34:12 ipsec,debug,packet 06fa0319 b75efc81 4441158a 7d9e640e 12cf90f0 987b513e
88045045 7889bcb4
15:34:12 ipsec,debug,packet 71e8c1a7 af759e2f f8b4ad6b 50b0b0ba f26d5462 90a950f4
cd9ced5e d6968020
15:34:12 ipsec,debug,packet 2ddabfad b389b38c d201e55f e8885f14 25a277e1 5b00ab21
6c41d8d4 6d2f1d5b
15:34:12 ipsec,debug,packet 0000001c 915ebfbe 20f17dd5 8fa2a5a9 5d813027 a890e6d0
a2d1a43a
15:34:12 ipsec sent phase1 packet 10.0.0.50[500]<=>52.57.130.45[500] 2ba46988e906e
d5c:a40ab059364d34ee
15:34:12 ipsec,debug ===== received 308 bytes from 52.57.130.45[500] to 10.0.0.50[
500]
15:34:12 ipsec,debug,packet 2ba46988 e906ed5c a40ab059 364d34ee 04100200 00000000
00000134 0a000104
15:34:12 ipsec,debug,packet 61f9a2ed 610edc48 beee0233 11129686 b3a036ca 1725d29d
feaf54e5 5e582972
15:34:12 ipsec,debug,packet 7243abc7 54a8dc4f bc837d65 e1ca7b4c b8373f0f 4a781b89
28ebb8d9 97d8d6ce
15:34:12 ipsec,debug,packet 08660a8b 55424303 e3c7e28f ea885158 10f3b4fa cfef9c92
958a8db7 eb094712
15:34:12 ipsec,debug,packet 40ab9dcb 5ca62b8f adf4a830 33d904d6 3b079b96 bb58ecca
a0d89f67 b680a0fb
15:34:12 ipsec,debug,packet 2590c022 435d483b 66800136 9d72e00d 5ca4bd6c 6b779e1a
48e792bc 6a90d8a7
15:34:12 ipsec,debug,packet 4e54b0d0 4460b80f 95f6701a 6346a33f 98aa5bbe 998a67a3
a9f74789 84895249
15:34:12 ipsec,debug,packet d91bb7bc f78efd8c 75866404 4b5478ee abda35d3 082aa642
c5d9bfd5 91934008
15:34:12 ipsec,debug,packet 191a61cb ee979d46 fb5593d4 5b864090 42fcd469 c24dade8
14a5cb71 7b6518b2
15:34:12 ipsec,debug,packet 00000014 793414ad 7daa6374 12db2258 5953e72f
15:34:12 ipsec,debug begin.
15:34:12 ipsec,debug seen nptype=4(ke) len=260
15:34:12 ipsec,debug seen nptype=10(nonce) len=20
15:34:12 ipsec,debug succeed.
15:34:12 ipsec,debug ===
15:34:12 ipsec,debug dh(modp2048)
15:34:12 ipsec,debug compute DH’s shared.
15:34:12 ipsec,debug
15:34:12 ipsec,debug ac4b13e3 cfe6e1db 3f9b1d69 0e5a516d adeb1414 18471ef5 9733175
2 eded8337
15:34:12 ipsec,debug 07b10c18 fc9185e2 cb47b442 1776382e 6fda9d12 dcc96419 2b09373
2 0e061122
15:34:12 ipsec,debug 5aed1cc4 481609b1 67783b28 4d0441a3 ddbddda6 5fd814b1 13e94a5
d 52c5a638
15:34:12 ipsec,debug 9383df48 e557e461 c6cd3353 a0a3d124 1281c97c a7b63a04 7f8bb72
4 b701ffdf
15:34:12 ipsec,debug c5406baf 3cbec4b0 0bb93370 441e7561 37d6db66 cbcf3c50 ce25abc
e 115d8299
15:34:12 ipsec,debug b7ea72c1 641f9aee c2e5745d 2ceaeb41 edeb1ebb 9efd7af2 f22d879
f 69fdddc4
15:34:12 ipsec,debug dd1bbebf 74f5aec5 469dbc72 be000ca0 694173dd 5348a466 a4bedd6
1 0a37a0db
15:34:12 ipsec,debug 5df82937 8a025d08 ace4514b 853ded06 9553022b a562fd6c 9cba503
1 587ff0ca
15:34:12 ipsec,debug nonce 1:
15:34:12 ipsec,debug 915ebfbe 20f17dd5 8fa2a5a9 5d813027 a890e6d0 a2d1a43a
15:34:12 ipsec,debug nonce 2:
15:34:12 ipsec,debug 793414ad 7daa6374 12db2258 5953e72f
15:34:12 ipsec,debug hmac(hmac_sha2_256)
15:34:12 ipsec,debug SKEYID computed:
15:34:12 ipsec,debug 92705e5a b2de7d09 72b9ec70 1888b0fa e5b0b2c3 a7273d17 73165d6
5 2be1ebe3
15:34:12 ipsec,debug hmac(hmac_sha2_256)
15:34:12 ipsec,debug SKEYID_d computed:
15:34:12 ipsec,debug 2da874b6 ff1ad69a 5297e72d 6b5eac3b f156cd87 a1933251 c0c65c7
1 39d222f8
15:34:12 ipsec,debug hmac(hmac_sha2_256)
15:34:12 ipsec,debug SKEYID_a computed:
15:34:12 ipsec,debug 4feb20cf ebb45ede b220c052 9f6a15fb e8920000 d9062ab1 a92a531
1 f78b56e0
15:34:12 ipsec,debug hmac(hmac_sha2_256)
15:34:12 ipsec,debug SKEYID_e computed:
15:34:12 ipsec,debug e321b001 3872d078 aca238b6 9fd69c5e 88d52a3e 70259d49 1be32a6
6 3159739a
15:34:12 ipsec,debug encryption(aes)
15:34:12 ipsec,debug hash(sha2_256)
15:34:12 ipsec,debug final encryption key computed:
15:34:12 ipsec,debug e321b001 3872d078 aca238b6 9fd69c5e 88d52a3e 70259d49 1be32a6
6 3159739a
15:34:12 ipsec,debug hash(sha2_256)
15:34:12 ipsec,debug encryption(aes)
15:34:12 ipsec,debug IV computed:
15:34:12 ipsec,debug e07dfc5d a081f94a 5d41a84a b3727382
15:34:12 ipsec,debug use ID type of IPv4_address
15:34:12 ipsec,debug HASH with:
15:34:12 ipsec,debug 24d945e8 ed137b46 08f3b3a6 9ef73bf3 ee05679e d73e730c 4d68860
6 08b658ea
15:34:12 ipsec,debug c469dbae 7ce22f75 034b4c5b b6650667 5f048581 c1373a61 72904cd
c 135911c7
15:34:12 ipsec,debug 6a89ce8d fdab9eaf a6a4067a 2c14ba96 d4efe527 f9adf5f6 2e05b94
3 64005c03
15:34:12 ipsec,debug 3577f8f2 f6626bb2 31edeff2 1eb24961 49956074 32ec0cfa fb18ea6
d 4b547e87
15:34:12 ipsec,debug 1833c08d bd07970c 6c03ebe2 51c74fb2 2430344a 6a15964a 5b026bb
f ff3706d1
15:34:12 ipsec,debug 06fa0319 b75efc81 4441158a 7d9e640e 12cf90f0 987b513e 8804504
5 7889bcb4
15:34:12 ipsec,debug 71e8c1a7 af759e2f f8b4ad6b 50b0b0ba f26d5462 90a950f4 cd9ced5
e d6968020
15:34:12 ipsec,debug 2ddabfad b389b38c d201e55f e8885f14 25a277e1 5b00ab21 6c41d8d
4 6d2f1d5b
15:34:12 ipsec,debug 61f9a2ed 610edc48 beee0233 11129686 b3a036ca 1725d29d feaf54e
5 5e582972
15:34:12 ipsec,debug 7243abc7 54a8dc4f bc837d65 e1ca7b4c b8373f0f 4a781b89 28ebb8d
9 97d8d6ce
15:34:12 ipsec,debug 08660a8b 55424303 e3c7e28f ea885158 10f3b4fa cfef9c92 958a8db
7 eb094712
15:34:12 ipsec,debug 40ab9dcb 5ca62b8f adf4a830 33d904d6 3b079b96 bb58ecca a0d89f6
7 b680a0fb
15:34:12 ipsec,debug 2590c022 435d483b 66800136 9d72e00d 5ca4bd6c 6b779e1a 48e792b
c 6a90d8a7
15:34:12 ipsec,debug 4e54b0d0 4460b80f 95f6701a 6346a33f 98aa5bbe 998a67a3 a9f7478
9 84895249
15:34:12 ipsec,debug d91bb7bc f78efd8c 75866404 4b5478ee abda35d3 082aa642 c5d9bfd
5 91934008
15:34:12 ipsec,debug 191a61cb ee979d46 fb5593d4 5b864090 42fcd469 c24dade8 14a5cb7
1 7b6518b2
15:34:12 ipsec,debug 2ba46988 e906ed5c a40ab059 364d34ee 00000001 00000001 0000002
c 01010001
15:34:12 ipsec,debug 00000024 01010000 800b0001 800c05a0 80010007 800e0100 8003000
1 80020004
15:34:12 ipsec,debug 8004000e 011101f4 0a000032
15:34:12 ipsec,debug hmac(hmac_sha2_256)
15:34:12 ipsec,debug HASH computed:
15:34:12 ipsec,debug 499ad36d 40fd0b02 5bbe1674 8280e61d 808530e6 86017486 ae9d20b
b 8a6d4106
15:34:12 ipsec,debug add payload of len 8, next type 8
15:34:12 ipsec,debug add payload of len 32, next type 0
15:34:12 ipsec,debug begin encryption.
15:34:12 ipsec,debug encryption(aes)
15:34:12 ipsec,debug pad length = 16
15:34:12 ipsec,debug 0800000c 011101f4 0a000032 00000024 499ad36d 40fd0b02 5bbe167
4 8280e61d
15:34:12 ipsec,debug 808530e6 86017486 ae9d20bb 8a6d4106 e5d6f76e 563e87d0 43e1231
3 e612f30f
15:34:12 ipsec,debug encryption(aes)
15:34:12 ipsec,debug with key:
15:34:12 ipsec,debug e321b001 3872d078 aca238b6 9fd69c5e 88d52a3e 70259d49 1be32a6
6 3159739a
15:34:12 ipsec,debug encrypted payload by IV:
15:34:12 ipsec,debug e07dfc5d a081f94a 5d41a84a b3727382
15:34:12 ipsec,debug save IV for next:
15:34:12 ipsec,debug 8ccfb8ef 0df4e709 d9a6a915 5286c07f
15:34:12 ipsec,debug encrypted.
15:34:12 ipsec,debug 92 bytes from 10.0.0.50[500] to 52.57.130.45[500]
15:34:12 ipsec,debug 1 times of 92 bytes message will be sent to 52.57.130.45[500]15:34:12 ipsec,debug,packet 2ba46988 e906ed5c a40ab059 364d34ee 05100201 00000000
0000005c 41fed14c
15:34:12 ipsec,debug,packet d6443102 fe7d7471 8c7e9fc1 d69c78df 545bdb92 f4e6893c
f358af4d 4e067f67
15:34:12 ipsec,debug,packet ebb632b1 9e9e1a13 7e766c76 8ccfb8ef 0df4e709 d9a6a915
5286c07f
15:34:12 ipsec sent phase1 packet 10.0.0.50[500]<=>52.57.130.45[500] 2ba46988e906e
d5c:a40ab059364d34ee
15:34:12 ipsec,debug ===== received 92 bytes from 52.57.130.45[500] to 10.0.0.50[5
00]
15:34:12 ipsec,debug,packet 2ba46988 e906ed5c a40ab059 364d34ee 05100201 00000000
0000005c d1e7de03
15:34:12 ipsec,debug,packet ec050d7c 6b44dd2b c261c8bd 5206f0ae abe22638 abcb8e8d
f1769a8c 2e78d647
15:34:12 ipsec,debug,packet 2ed838fe a6fde611 f6cfc09e 64a67a8f 8f9f1933 917ada42
003be903
15:34:12 ipsec,debug encryption(aes)
15:34:12 ipsec,debug IV was saved for next processing:
15:34:12 ipsec,debug 64a67a8f 8f9f1933 917ada42 003be903
15:34:12 ipsec,debug encryption(aes)
15:34:12 ipsec,debug with key:
15:34:12 ipsec,debug e321b001 3872d078 aca238b6 9fd69c5e 88d52a3e 70259d49 1be32a6
6 3159739a
15:34:12 ipsec,debug decrypted payload by IV:
15:34:12 ipsec,debug 8ccfb8ef 0df4e709 d9a6a915 5286c07f
15:34:12 ipsec,debug decrypted payload, but not trimed.
15:34:12 ipsec,debug 0800000c 01000000 3439822d 00000024 356dd398 bed074fe d7e4701
c 428a0d1d
15:34:12 ipsec,debug e0979cc3 746bba82 5e17f1ab c85f53ef 8df6bcdf 96aede10 2909fb5
5 a51cc710
15:34:12 ipsec,debug padding len=17
15:34:12 ipsec,debug skip to trim padding.
15:34:12 ipsec,debug decrypted.
15:34:12 ipsec,debug 2ba46988 e906ed5c a40ab059 364d34ee 05100201 00000000 0000005
c 0800000c
15:34:12 ipsec,debug 01000000 3439822d 00000024 356dd398 bed074fe d7e4701c 428a0d1
d e0979cc3
15:34:12 ipsec,debug 746bba82 5e17f1ab c85f53ef 8df6bcdf 96aede10 2909fb55 a51cc71
0
15:34:12 ipsec,debug begin.
15:34:12 ipsec,debug seen nptype=5(id) len=12
15:34:12 ipsec,debug seen nptype=8(hash) len=36
15:34:12 ipsec,debug succeed.
15:34:12 ipsec,debug HASH received:
15:34:12 ipsec,debug 356dd398 bed074fe d7e4701c 428a0d1d e0979cc3 746bba82 5e17f1a
b c85f53ef
15:34:12 ipsec,debug HASH with:
15:34:12 ipsec,debug 61f9a2ed 610edc48 beee0233 11129686 b3a036ca 1725d29d feaf54e
5 5e582972
15:34:12 ipsec,debug 7243abc7 54a8dc4f bc837d65 e1ca7b4c b8373f0f 4a781b89 28ebb8d
9 97d8d6ce
15:34:12 ipsec,debug 08660a8b 55424303 e3c7e28f ea885158 10f3b4fa cfef9c92 958a8db
7 eb094712
15:34:12 ipsec,debug 40ab9dcb 5ca62b8f adf4a830 33d904d6 3b079b96 bb58ecca a0d89f6
7 b680a0fb
15:34:12 ipsec,debug 2590c022 435d483b 66800136 9d72e00d 5ca4bd6c 6b779e1a 48e792b
c 6a90d8a7
15:34:12 ipsec,debug 4e54b0d0 4460b80f 95f6701a 6346a33f 98aa5bbe 998a67a3 a9f7478
9 84895249
15:34:12 ipsec,debug d91bb7bc f78efd8c 75866404 4b5478ee abda35d3 082aa642 c5d9bfd
5 91934008
15:34:12 ipsec,debug 191a61cb ee979d46 fb5593d4 5b864090 42fcd469 c24dade8 14a5cb7
1 7b6518b2
15:34:12 ipsec,debug 24d945e8 ed137b46 08f3b3a6 9ef73bf3 ee05679e d73e730c 4d68860
6 08b658ea
15:34:12 ipsec,debug c469dbae 7ce22f75 034b4c5b b6650667 5f048581 c1373a61 72904cd
c 135911c7
15:34:12 ipsec,debug 6a89ce8d fdab9eaf a6a4067a 2c14ba96 d4efe527 f9adf5f6 2e05b94
3 64005c03
15:34:12 ipsec,debug 3577f8f2 f6626bb2 31edeff2 1eb24961 49956074 32ec0cfa fb18ea6
d 4b547e87
15:34:12 ipsec,debug 1833c08d bd07970c 6c03ebe2 51c74fb2 2430344a 6a15964a 5b026bb
f ff3706d1
15:34:12 ipsec,debug 06fa0319 b75efc81 4441158a 7d9e640e 12cf90f0 987b513e 8804504
5 7889bcb4
15:34:12 ipsec,debug 71e8c1a7 af759e2f f8b4ad6b 50b0b0ba f26d5462 90a950f4 cd9ced5
e d6968020
15:34:12 ipsec,debug 2ddabfad b389b38c d201e55f e8885f14 25a277e1 5b00ab21 6c41d8d
4 6d2f1d5b
15:34:12 ipsec,debug a40ab059 364d34ee 2ba46988 e906ed5c 00000001 00000001 0000002
c 01010001
15:34:12 ipsec,debug 00000024 01010000 800b0001 800c05a0 80010007 800e0100 8003000
1 80020004
15:34:12 ipsec,debug 8004000e 01000000 3439822d
15:34:12 ipsec,debug hmac(hmac_sha2_256)
15:34:12 ipsec,debug HASH computed:
15:34:12 ipsec,debug 356dd398 bed074fe d7e4701c 428a0d1d e0979cc3 746bba82 5e17f1a
b c85f53ef
15:34:12 ipsec,debug HASH for PSK validated.
15:34:12 ipsec,debug 52.57.130.45 peer’s ID:
15:34:12 ipsec,debug 01000000 3439822d
15:34:12 ipsec,debug ===
15:34:12 ipsec,info ISAKMP-SA established 10.0.0.50[500]-52.57.130.45[500] spi:2ba
46988e906ed5c:a40ab059364d34ee
15:34:12 ipsec,debug ===
15:34:42 system,info,account user admin logged in via local
Can anyone help please?
Thanks!