Hi
I have followed the “Road_Warrior_setup_using_IKEv2_with_RSA_authentication” from the wiki, but it not working for me.
https://wiki.mikrotik.com/wiki/Manual:IP/IPsec#Road_Warrior_setup_using_IKEv2_with_RSA_authentication
The client is win10 1903. windows gives the error when i try to connect: “The parameter is incorrect”
I see the ClientIp in the PEER, with the state Starting, for estimated 20 seconds.
I just cannot see where the error is, when i look into the log on the router or in evenlog.
I hope someone is able to point me in the correct direction for fix’ing this error.
I have replace the route ip with “MyWanIP” and client ip with “ClientIP”
I have add some of the ipsec modes that is compertible with windows 10 to the config, to check if this was the reason for the error.
oct/15/2019 21: 4:29 by RouterOS 6.45.2
software id = MQ0P-RBII
21:03:09 ipsec → ike2 request, exchange: SA_INIT:0 ClientIP[500]
21:03:09 ipsec ike2 respond
21:03:09 ipsec payload seen: SA (736 bytes)
21:03:09 ipsec payload seen: KE (136 bytes)
21:03:09 ipsec payload seen: NONCE (52 bytes)
21:03:09 ipsec payload seen: NOTIFY (8 bytes)
21:03:09 ipsec payload seen: NOTIFY (28 bytes)
21:03:09 ipsec payload seen: NOTIFY (28 bytes)
21:03:09 ipsec payload seen: VID (24 bytes)
21:03:09 ipsec,debug 1e2b516905991c7d7c96fcbfb587e46100000009
21:03:09 ipsec payload seen: VID (20 bytes)
21:03:09 ipsec,debug fb1de3cdf341b7ea16b7e5be0855f120
21:03:09 ipsec payload seen: VID (20 bytes)
21:03:09 ipsec,debug 26244d38eddb61b3172a36e3d0cfb819
21:03:09 ipsec payload seen: VID (24 bytes)
21:03:09 ipsec,debug 01528bbbc00696121849ab9a1c5b2a5100000002
21:03:09 ipsec processing payload: NONCE
21:03:09 ipsec processing payload: SA
21:03:09 ipsec,debug unknown auth: #13
21:03:09 ipsec,debug unknown prf: #6
21:03:09 ipsec,debug unknown auth: #13
21:03:09 ipsec,debug unknown prf: #6
21:03:09 ipsec,debug unknown auth: #13
21:03:09 ipsec,debug unknown prf: #6
21:03:09 ipsec,debug unknown auth: #13
21:03:09 ipsec,debug unknown prf: #6
21:03:09 ipsec,debug unknown prf: #6
21:03:09 ipsec,debug unknown prf: #6
21:03:09 ipsec IKE Protocol: IKE
21:03:09 ipsec proposal #1
21:03:09 ipsec enc: 3des-cbc
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec auth: sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #2
21:03:09 ipsec enc: 3des-cbc
21:03:09 ipsec prf: hmac-sha256
21:03:09 ipsec auth: sha256
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #3
21:03:09 ipsec enc: 3des-cbc
21:03:09 ipsec prf: unknown
21:03:09 ipsec auth: unknown
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #4
21:03:09 ipsec enc: aes128-cbc
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec auth: sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #5
21:03:09 ipsec enc: aes128-cbc
21:03:09 ipsec prf: hmac-sha256
21:03:09 ipsec auth: sha256
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #6
21:03:09 ipsec enc: aes128-cbc
21:03:09 ipsec prf: unknown
21:03:09 ipsec auth: unknown
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #7
21:03:09 ipsec enc: aes192-cbc
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec auth: sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #8
21:03:09 ipsec enc: aes192-cbc
21:03:09 ipsec prf: hmac-sha256
21:03:09 ipsec auth: sha256
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #9
21:03:09 ipsec enc: aes192-cbc
21:03:09 ipsec prf: unknown
21:03:09 ipsec auth: unknown
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #10
21:03:09 ipsec enc: aes256-cbc
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec auth: sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #11
21:03:09 ipsec enc: aes256-cbc
21:03:09 ipsec prf: hmac-sha256
21:03:09 ipsec auth: sha256
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #12
21:03:09 ipsec enc: aes256-cbc
21:03:09 ipsec prf: unknown
21:03:09 ipsec auth: unknown
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #13
21:03:09 ipsec enc: aes128-gcm
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #14
21:03:09 ipsec enc: aes128-gcm
21:03:09 ipsec prf: hmac-sha256
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #15
21:03:09 ipsec enc: aes128-gcm
21:03:09 ipsec prf: unknown
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #16
21:03:09 ipsec enc: aes256-gcm
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #17
21:03:09 ipsec enc: aes256-gcm
21:03:09 ipsec prf: hmac-sha256
21:03:09 ipsec dh: modp1024
21:03:09 ipsec proposal #18
21:03:09 ipsec enc: aes256-gcm
21:03:09 ipsec prf: unknown
21:03:09 ipsec dh: modp1024
21:03:09 ipsec matched proposal:
21:03:09 ipsec proposal #1
21:03:09 ipsec enc: 3des-cbc
21:03:09 ipsec prf: hmac-sha1
21:03:09 ipsec auth: sha1
21:03:09 ipsec dh: modp1024
21:03:09 ipsec processing payload: KE
21:03:09 ipsec,debug => shared secret (size 0x80)
21:03:09 ipsec,debug 6f06083c c27d3f05 235ab68f 56044240 1308dc4b de72a6f5 62ddc55f 5b2b9ac1
21:03:09 ipsec,debug cfb19923 82076c50 7e057d81 263aed99 181c9155 1f38d4fb 059eb5d9 e1020fce
21:03:09 ipsec,debug 9590927e e1301897 6b4ea035 f4af63f9 7f49eb56 372aa5fc 77dbd1df 01252d5a
21:03:09 ipsec,debug 7886e301 72310391 8a46f4a0 1eb3f9df d692206b fea8c020 344237cf 5165c6c2
21:03:09 ipsec adding payload: SA
21:03:09 ipsec,debug => (size 0x2c)
21:03:09 ipsec,debug 0000002c 00000028 01010004 03000008 01000003 03000008 02000002 03000008
21:03:09 ipsec,debug 03000002 00000008 04000002
21:03:09 ipsec adding payload: KE
21:03:09 ipsec,debug => (size 0x88)
21:03:09 ipsec,debug 00000088 00020000 1f7c144e b0a8f5d7 3d111c99 41552e19 3d90ecff d1513d47
21:03:09 ipsec,debug fa677ffb e1b79aa7 a31f3381 6e202c17 f9f9eafc 877921f5 5cdebfb0 d5043628
21:03:09 ipsec,debug 92c71941 737667d0 aa3632af f5f84e06 f5d2e49b 71cb2f2d c3ba969b 9043f59d
21:03:09 ipsec,debug 48c8dcc4 130dba69 99147cfb a00a49ce 73c7be99 0cf4210c b4a91148 ff2ac53b
21:03:09 ipsec,debug 7ca41a22 ae666d98
21:03:09 ipsec adding payload: NONCE
21:03:09 ipsec,debug => (size 0x1c)
21:03:09 ipsec,debug 0000001c d1ceb6ad e2f4b215 97e313d7 0ebf93b3 2e1bc8f5 d5978df7
21:03:09 ipsec adding notify: NAT_DETECTION_SOURCE_IP
21:03:09 ipsec,debug => (size 0x1c)
21:03:09 ipsec,debug 0000001c 00004004 481c674d 1e267c30 b8f72f1d 923dd2a4 40257a92
21:03:09 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
21:03:09 ipsec,debug => (size 0x1c)
21:03:09 ipsec,debug 0000001c 00004005 658479f3 64c3b726 d7c5a07a f30f5aeb 66bb12c5
21:03:09 ipsec adding payload: CERTREQ
21:03:09 ipsec,debug => (size 0x5)
21:03:09 ipsec,debug 00000005 04
21:03:09 ipsec ← ike2 reply, exchange: SA_INIT:0 ClientIP[500]
21:03:09 ipsec,debug ===== sending 297 bytes from MyWanIP[500] to ClientIP[500]
21:03:09 ipsec,debug 1 times of 297 bytes message will be sent to ClientIP[500]
21:03:09 ipsec,debug,packet 358e5b6c fbadba7b d114dfd0 aac8bb12 21202220 00000000 00000129 2200002c
21:03:09 ipsec,debug,packet 00000028 01010004 03000008 01000003 03000008 02000002 03000008 03000002
21:03:09 ipsec,debug,packet 00000008 04000002 28000088 00020000 1f7c144e b0a8f5d7 3d111c99 41552e19
21:03:09 ipsec,debug,packet 3d90ecff d1513d47 fa677ffb e1b79aa7 a31f3381 6e202c17 f9f9eafc 877921f5
21:03:09 ipsec,debug,packet 5cdebfb0 d5043628 92c71941 737667d0 aa3632af f5f84e06 f5d2e49b 71cb2f2d
21:03:09 ipsec,debug,packet c3ba969b 9043f59d 48c8dcc4 130dba69 99147cfb a00a49ce 73c7be99 0cf4210c
21:03:09 ipsec,debug,packet b4a91148 ff2ac53b 7ca41a22 ae666d98 2900001c d1ceb6ad e2f4b215 97e313d7
21:03:09 ipsec,debug,packet 0ebf93b3 2e1bc8f5 d5978df7 2900001c 00004004 481c674d 1e267c30 b8f72f1d
21:03:09 ipsec,debug,packet 923dd2a4 40257a92 2600001c 00004005 658479f3 64c3b726 d7c5a07a f30f5aeb
21:03:09 ipsec,debug,packet 66bb12c5 00000005 04
21:03:09 ipsec,debug => skeyseed (size 0x14)
21:03:09 ipsec,debug 1ed0a59a 044d85dd a002daff fb3f9d32 4fbaa362
21:03:09 ipsec,debug => keymat (size 0x14)
21:03:09 ipsec,debug 8fda53cf 4a2052ba 3216c671 306fe799 82ff85f0
21:03:09 ipsec,debug => SK_ai (size 0x14)
21:03:09 ipsec,debug fab3bcac 622931e6 907dc672 2e4ac9a2 d243ecc6
21:03:09 ipsec,debug => SK_ar (size 0x14)
21:03:09 ipsec,debug 1d1a7e7d 8e601d62 710acca0 1901f248 aca61cb9
21:03:09 ipsec,debug => SK_ei (size 0x18)
21:03:09 ipsec,debug 481335ef f737f85c 4bad6d5c 3b7530e1 51d494ff 6617cf26
21:03:09 ipsec,debug => SK_er (size 0x18)
21:03:09 ipsec,debug b3c6aa6f 3b2305ef 2e20f0bd 95fde753 a89acaec e52ed05d
21:03:09 ipsec,debug => SK_pi (size 0x14)
21:03:09 ipsec,debug 3309b24c efa8d4a9 3919af4d 78557cd5 6fbd3527
21:03:09 ipsec,debug => SK_pr (size 0x14)
21:03:09 ipsec,debug 84262c75 c9ff4989 d2026ecc 07ffe012 14a2585e
21:03:09 ipsec,info new ike2 SA (R): MyWanIP[500]-ClientIP[500] spi:d114dfd0aac8bb12:358e5b6cfbadba7b
21:03:09 ipsec processing payloads: VID
21:03:09 ipsec peer is MS Windows (ISAKMPOAKLEY 9)
21:03:09 ipsec processing payloads: NOTIFY
21:03:09 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
21:03:09 ipsec notify: NAT_DETECTION_SOURCE_IP
21:03:09 ipsec notify: NAT_DETECTION_DESTINATION_IP
21:03:39 ipsec,info killing ike2 SA: MyWanIP[500]-ClientIP[500] spi:d114dfd0aac8bb12:358e5b6cfbadba7b
21:03:58 ipsec,debug ===== received 1104 bytes from ClientIP[500] to MyWanIP[500]
21:03:58 ipsec,debug,packet 08a7eb0b 496e515d 00000000 00000000 21202208 00000000 00000450 220002e0
21:03:58 ipsec,debug,packet 02000028 01010004 03000008 01000003 03000008 03000002 03000008 02000002
21:03:58 ipsec,debug,packet 00000008 04000002 02000028 02010004 03000008 01000003 03000008 0300000c
21:03:58 ipsec,debug,packet 03000008 02000005 00000008 04000002 02000028 03010004 03000008 01000003
21:03:58 ipsec,debug,packet 03000008 0300000d 03000008 02000006 00000008 04000002 0200002c 04010004
21:03:58 ipsec,debug,packet 0300000c 0100000c 800e0080 03000008 03000002 03000008 02000002 00000008
21:03:58 ipsec,debug,packet 04000002 0200002c 05010004 0300000c 0100000c 800e0080 03000008 0300000c
21:03:58 ipsec,debug,packet 03000008 02000005 00000008 04000002 0200002c 06010004 0300000c 0100000c
21:03:58 ipsec,debug,packet 800e0080 03000008 0300000d 03000008 02000006 00000008 04000002 0200002c
21:03:58 ipsec,debug,packet 07010004 0300000c 0100000c 800e00c0 03000008 03000002 03000008 02000002
21:03:58 ipsec,debug,packet 00000008 04000002 0200002c 08010004 0300000c 0100000c 800e00c0 03000008
21:03:58 ipsec,debug,packet 0300000c 03000008 02000005 00000008 04000002 0200002c 09010004 0300000c
21:03:58 ipsec,debug,packet 0100000c 800e00c0 03000008 0300000d 03000008 02000006 00000008 04000002
21:03:58 ipsec,debug,packet 0200002c 0a010004 0300000c 0100000c 800e0100 03000008 03000002 03000008
21:03:58 ipsec,debug,packet 02000002 00000008 04000002 0200002c 0b010004 0300000c 0100000c 800e0100
21:03:58 ipsec,debug,packet 03000008 0300000c 03000008 02000005 00000008 04000002 0200002c 0c010004
21:03:58 ipsec,debug,packet 0300000c 0100000c 800e0100 03000008 0300000d 03000008 02000006 00000008
21:03:58 ipsec,debug,packet 04000002 02000024 0d010003 0300000c 01000014 800e0080 03000008 02000002
21:03:58 ipsec,debug,packet 00000008 04000002 02000024 0e010003 0300000c 01000014 800e0080 03000008
21:03:58 ipsec,debug,packet 02000005 00000008 04000002 02000024 0f010003 0300000c 01000014 800e0080
21:03:58 ipsec,debug,packet 03000008 02000006 00000008 04000002 02000024 10010003 0300000c 01000014
21:03:58 ipsec,debug,packet 800e0100 03000008 02000002 00000008 04000002 02000024 11010003 0300000c
21:03:58 ipsec,debug,packet 01000014 800e0100 03000008 02000005 00000008 04000002 00000024 12010003
21:03:58 ipsec,debug,packet 0300000c 01000014 800e0100 03000008 02000006 00000008 04000002 28000088
21:03:58 ipsec,debug,packet 00020000 799d8c1b 4219bdfb eba9ee66 4cecfac8 e1dc022f 26552846 3833a822
21:03:58 ipsec,debug,packet 4b4da5bc c81abd2a 35e2154c 9f08e424 791df087 0765c01b be38f63b b9ebb09e
21:03:58 ipsec,debug,packet e3445287 5f337352 6c41a964 b85befb7 186d9a9d a44ccfe7 05835b31 be14c5e5
21:03:58 ipsec,debug,packet c2307c57 ed845b38 f6784d87 7320272b 078e9446 6d94f054 532295bf a50841b6
21:03:58 ipsec,debug,packet 9dfd2ebf 29000034 e8d16d9d ad4afec0 1044f1dd 951ed762 ce8019da 82a041d1
21:03:58 ipsec,debug,packet ace2e344 75a334bd 867dbe42 041ce206 b51a1ec2 5428fea2 29000008 0000402e
21:03:58 ipsec,debug,packet 2900001c 00004004 3ad129b7 515d8858 f2c6fcff 087d8ee8 c0345256 2b00001c
21:03:58 ipsec,debug,packet 00004005 b6afdf97 62025dcc d75dbdca da7592c7 ac36a526 2b000018 1e2b5169
21:03:58 ipsec,debug,packet 05991c7d 7c96fcbf b587e461 00000009 2b000014 fb1de3cd f341b7ea 16b7e5be
21:03:58 ipsec,debug,packet 0855f120 2b000014 26244d38 eddb61b3 172a36e3 d0cfb819 00000018 01528bbb
21:03:58 ipsec,debug,packet c0069612 1849ab9a 1c5b2a51 00000002
21:03:58 ipsec → ike2 request, exchange: SA_INIT:0 ClientIP[500]
21:03:58 ipsec ike2 respond
21:03:58 ipsec payload seen: SA (736 bytes)
21:03:58 ipsec payload seen: KE (136 bytes)
21:03:58 ipsec payload seen: NONCE (52 bytes)
21:03:58 ipsec payload seen: NOTIFY (8 bytes)
21:03:58 ipsec payload seen: NOTIFY (28 bytes)
21:03:58 ipsec payload seen: NOTIFY (28 bytes)
21:03:58 ipsec payload seen: VID (24 bytes)
21:03:58 ipsec,debug 1e2b516905991c7d7c96fcbfb587e46100000009
21:03:58 ipsec payload seen: VID (20 bytes)
21:03:58 ipsec,debug fb1de3cdf341b7ea16b7e5be0855f120
21:03:58 ipsec payload seen: VID (20 bytes)
21:03:58 ipsec,debug 26244d38eddb61b3172a36e3d0cfb819
21:03:58 ipsec payload seen: VID (24 bytes)
21:03:58 ipsec,debug 01528bbbc00696121849ab9a1c5b2a5100000002
21:03:58 ipsec processing payload: NONCE
21:03:58 ipsec processing payload: SA
21:03:58 ipsec,debug unknown auth: #13
21:03:58 ipsec,debug unknown prf: #6
21:03:58 ipsec,debug unknown auth: #13
21:03:58 ipsec,debug unknown prf: #6
21:03:58 ipsec,debug unknown auth: #13
21:03:58 ipsec,debug unknown prf: #6
21:03:58 ipsec,debug unknown auth: #13
21:03:58 ipsec,debug unknown prf: #6
21:03:58 ipsec,debug unknown prf: #6
21:03:58 ipsec,debug unknown prf: #6
21:03:58 ipsec IKE Protocol: IKE
21:03:58 ipsec proposal #1
21:03:58 ipsec enc: 3des-cbc
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec auth: sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #2
21:03:58 ipsec enc: 3des-cbc
21:03:58 ipsec prf: hmac-sha256
21:03:58 ipsec auth: sha256
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #3
21:03:58 ipsec enc: 3des-cbc
21:03:58 ipsec prf: unknown
21:03:58 ipsec auth: unknown
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #4
21:03:58 ipsec enc: aes128-cbc
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec auth: sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #5
21:03:58 ipsec enc: aes128-cbc
21:03:58 ipsec prf: hmac-sha256
21:03:58 ipsec auth: sha256
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #6
21:03:58 ipsec enc: aes128-cbc
21:03:58 ipsec prf: unknown
21:03:58 ipsec auth: unknown
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #7
21:03:58 ipsec enc: aes192-cbc
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec auth: sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #8
21:03:58 ipsec enc: aes192-cbc
21:03:58 ipsec prf: hmac-sha256
21:03:58 ipsec auth: sha256
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #9
21:03:58 ipsec enc: aes192-cbc
21:03:58 ipsec prf: unknown
21:03:58 ipsec auth: unknown
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #10
21:03:58 ipsec enc: aes256-cbc
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec auth: sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #11
21:03:58 ipsec enc: aes256-cbc
21:03:58 ipsec prf: hmac-sha256
21:03:58 ipsec auth: sha256
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #12
21:03:58 ipsec enc: aes256-cbc
21:03:58 ipsec prf: unknown
21:03:58 ipsec auth: unknown
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #13
21:03:58 ipsec enc: aes128-gcm
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #14
21:03:58 ipsec enc: aes128-gcm
21:03:58 ipsec prf: hmac-sha256
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #15
21:03:58 ipsec enc: aes128-gcm
21:03:58 ipsec prf: unknown
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #16
21:03:58 ipsec enc: aes256-gcm
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #17
21:03:58 ipsec enc: aes256-gcm
21:03:58 ipsec prf: hmac-sha256
21:03:58 ipsec dh: modp1024
21:03:58 ipsec proposal #18
21:03:58 ipsec enc: aes256-gcm
21:03:58 ipsec prf: unknown
21:03:58 ipsec dh: modp1024
21:03:58 ipsec matched proposal:
21:03:58 ipsec proposal #1
21:03:58 ipsec enc: 3des-cbc
21:03:58 ipsec prf: hmac-sha1
21:03:58 ipsec auth: sha1
21:03:58 ipsec dh: modp1024
21:03:58 ipsec processing payload: KE
21:03:58 ipsec,debug => shared secret (size 0x80)
21:03:58 ipsec,debug d96e0fca ddfd0473 6192c271 74ac8748 1c8c19d8 159153be a919554d 5be8f249
21:03:58 ipsec,debug 7e8994f2 37ed2d15 f80d29c6 09e5672a 7ffcd400 99d93244 16a9ac53 917ff5eb
21:03:58 ipsec,debug 3cd93558 3c2da17b 6cd53eb8 cfd7ab00 cd1c0acf ff2b59f1 46a01b7a b814914b
21:03:58 ipsec,debug 1952f344 f5624363 d8a451a5 ddbab339 d827fc01 4e0781e6 a8010759 776559ae
21:03:58 ipsec adding payload: SA
21:03:58 ipsec,debug => (size 0x2c)
21:03:58 ipsec,debug 0000002c 00000028 01010004 03000008 01000003 03000008 02000002 03000008
21:03:58 ipsec,debug 03000002 00000008 04000002
21:03:58 ipsec adding payload: KE
21:03:58 ipsec,debug => (size 0x88)
21:03:58 ipsec,debug 00000088 00020000 4ebe990d 4b10d6aa 928e6ff9 920f043f e2f9a929 c54f0d5e
21:03:58 ipsec,debug bb9fe2b2 36e9571f 8a0e8152 7c14bc7e 243f7725 2a931455 c4d35336 4668371c
21:03:58 ipsec,debug c3614f08 e4cbe62e 36e82c6b bd10383e 1f872813 26dcd2e5 82051409 c488e6bc
21:03:58 ipsec,debug 44513c66 45ec39d6 f90851f2 6268707a 30cdc24f 5a9a4dfa 1f04d262 effa25a9
21:03:58 ipsec,debug 254266f5 0dd4d126
21:03:58 ipsec adding payload: NONCE
21:03:58 ipsec,debug => (size 0x1c)
21:03:58 ipsec,debug 0000001c 5a34d842 01a13a60 0d987e50 0aa0444e 176b9559 05c52be5
21:03:58 ipsec adding notify: NAT_DETECTION_SOURCE_IP
21:03:58 ipsec,debug => (size 0x1c)
21:03:58 ipsec,debug 0000001c 00004004 2610aac5 05a7abe8 cf0cfe1c 3b76349b 445ad7da
21:03:58 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
21:03:58 ipsec,debug => (size 0x1c)
21:03:58 ipsec,debug 0000001c 00004005 e5bbede4 9f5116a9 4dda8d38 f0522da6 0b4b537c
21:03:58 ipsec adding payload: CERTREQ
21:03:58 ipsec,debug => (size 0x5)
21:03:58 ipsec,debug 00000005 04
21:03:58 ipsec ← ike2 reply, exchange: SA_INIT:0 ClientIP[500]
21:03:58 ipsec,debug ===== sending 297 bytes from MyWanIP[500] to ClientIP[500]
21:03:58 ipsec,debug 1 times of 297 bytes message will be sent to ClientIP[500]
21:03:58 ipsec,debug,packet 08a7eb0b 496e515d 42d0fda2 f6ea70ba 21202220 00000000 00000129 2200002c
21:03:58 ipsec,debug,packet 00000028 01010004 03000008 01000003 03000008 02000002 03000008 03000002
21:03:58 ipsec,debug,packet 00000008 04000002 28000088 00020000 4ebe990d 4b10d6aa 928e6ff9 920f043f
21:03:58 ipsec,debug,packet e2f9a929 c54f0d5e bb9fe2b2 36e9571f 8a0e8152 7c14bc7e 243f7725 2a931455
21:03:58 ipsec,debug,packet c4d35336 4668371c c3614f08 e4cbe62e 36e82c6b bd10383e 1f872813 26dcd2e5
21:03:58 ipsec,debug,packet 82051409 c488e6bc 44513c66 45ec39d6 f90851f2 6268707a 30cdc24f 5a9a4dfa
21:03:58 ipsec,debug,packet 1f04d262 effa25a9 254266f5 0dd4d126 2900001c 5a34d842 01a13a60 0d987e50
21:03:58 ipsec,debug,packet 0aa0444e 176b9559 05c52be5 2900001c 00004004 2610aac5 05a7abe8 cf0cfe1c
21:03:58 ipsec,debug,packet 3b76349b 445ad7da 2600001c 00004005 e5bbede4 9f5116a9 4dda8d38 f0522da6
21:03:58 ipsec,debug,packet 0b4b537c 00000005 04
21:03:58 ipsec,debug => skeyseed (size 0x14)
21:03:58 ipsec,debug 519efec2 36615800 30c6b17d f2c93e0f 74d006bb
21:03:58 ipsec,debug => keymat (size 0x14)
21:03:58 ipsec,debug 8d35e247 45627fa8 5077668e 39c8ba0d 18d4b72c
21:03:58 ipsec,debug => SK_ai (size 0x14)
21:03:58 ipsec,debug 524424c9 8e5c4d08 d6cc9bf3 55b4f462 c7227093
21:03:58 ipsec,debug => SK_ar (size 0x14)
21:03:58 ipsec,debug 11a7963b 6d46e99d 5c9a6b98 86659133 a7330b86
21:03:58 ipsec,debug => SK_ei (size 0x18)
21:03:58 ipsec,debug 17fa9232 af4a1bef 724adb1b db5490d5 28d5f3ab c57db608
21:03:58 ipsec,debug => SK_er (size 0x18)
21:03:58 ipsec,debug 7f2e853e 4530948b 7d4635a7 1c87a74b 99ba5df2 bf961d32
21:03:58 ipsec,debug => SK_pi (size 0x14)
21:03:58 ipsec,debug 85782a3b 2b4ab2ba 984257fd 04d3f860 c38e9690
21:03:58 ipsec,debug => SK_pr (size 0x14)
21:03:58 ipsec,debug 081dd6af 8846e1ba be75ec4f ced9eb36 f0cd9f17
21:03:58 ipsec,info new ike2 SA (R): MyWanIP[500]-ClientIP[500] spi:42d0fda2f6ea70ba:08a7eb0b496e515d
21:03:58 ipsec processing payloads: VID
21:03:58 ipsec peer is MS Windows (ISAKMPOAKLEY 9)
21:03:58 ipsec processing payloads: NOTIFY
21:03:58 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
21:03:58 ipsec notify: NAT_DETECTION_SOURCE_IP
21:03:58 ipsec notify: NAT_DETECTION_DESTINATION_IP
21:04:28 ipsec child negitiation timeout in state 0
21:04:28 ipsec,info killing ike2 SA: MyWanIP[500]-ClientIP[500] spi:42d0fda2f6ea70ba:08a7eb0b496e515d