Hi! I enable the ipsec log in mikoritk B. The phase 1 connects successfully, but phase not.
10:08:16 ipsec respond new phase 2 negotiation: 192.168.188.10[4500]<=>187.115.194.X[4500]
10:08:16 ipsec,debug,packet encryption(3des)
10:08:16 ipsec,debug,packet IV was saved for next processing:
10:08:16 ipsec,debug,packet 8e86c07d a92967d1
10:08:16 ipsec,debug,packet encryption(3des)
10:08:16 ipsec,debug,packet with key:
10:08:16 ipsec,debug,packet bce4092e d613c2ed 93e296f8 e1a33e4d 490d57f7 e370c149
10:08:16 ipsec,debug,packet decrypted payload by IV:
10:08:16 ipsec,debug,packet 824db843 8ba136f5
10:08:16 ipsec,debug,packet decrypted payload, but not trimed.
10:08:16 ipsec,debug,packet 01000018 70ee54d5 16e57bed ee500617 f0e782df eebe956f 0a000034 00000001
10:08:16 ipsec,debug,packet 00000001 00000028 01030401 031d504e 0000001c 01030000 80010001 80020708
10:08:16 ipsec,debug,packet 80040003 80050002 80030002 0400001c d8ac2be2 4d4e655c 17e4a53b e74ba01e
10:08:16 ipsec,debug,packet fe4f6e6a 28078296 05000084 9b7ba8a4 d3b090b2 726c7cb7 e5205a79 8436ed65
10:08:16 ipsec,debug,packet d92ab522 952a0dfc a1ce6a88 3b4cbe71 4679d830 fa892591 5d96efc0 3ac8fa35
10:08:16 ipsec,debug,packet 83d2e1b0 ddae0674 4d0518ec ab40aa9a 8cec2ab8 6cea908d b528af4d 1b3a5151
10:08:16 ipsec,debug,packet 0bb6acdd 8d66a755 68c475eb f2ff34b9 7fb7845f f2bd3615 1a8e56bc dc94af44
10:08:16 ipsec,debug,packet 27a24c57 0ab69c6e 65e99c4c 05000010 04000000 c0a85000 ffffff00 00000010
10:08:16 ipsec,debug,packet 04000000 c0a81300 ffffff00 b3159d03
10:08:16 ipsec,debug,packet padding len=4
10:08:16 ipsec,debug,packet skip to trim padding.
10:08:16 ipsec,debug,packet decrypted.
10:08:16 ipsec,debug,packet dc9b44fb 11c31df1 271857bf 38bbbfc1 08102001 fc7a26a7 0000012c 01000018
10:08:16 ipsec,debug,packet 70ee54d5 16e57bed ee500617 f0e782df eebe956f 0a000034 00000001 00000001
10:08:16 ipsec,debug,packet 00000028 01030401 031d504e 0000001c 01030000 80010001 80020708 80040003
10:08:16 ipsec,debug,packet 80050002 80030002 0400001c d8ac2be2 4d4e655c 17e4a53b e74ba01e fe4f6e6a
10:08:16 ipsec,debug,packet 28078296 05000084 9b7ba8a4 d3b090b2 726c7cb7 e5205a79 8436ed65 d92ab522
10:08:16 ipsec,debug,packet 952a0dfc a1ce6a88 3b4cbe71 4679d830 fa892591 5d96efc0 3ac8fa35 83d2e1b0
10:08:16 ipsec,debug,packet ddae0674 4d0518ec ab40aa9a 8cec2ab8 6cea908d b528af4d 1b3a5151 0bb6acdd
10:08:16 ipsec,debug,packet 8d66a755 68c475eb f2ff34b9 7fb7845f f2bd3615 1a8e56bc dc94af44 27a24c57
10:08:16 ipsec,debug,packet 0ab69c6e 65e99c4c 05000010 04000000 c0a85000 ffffff00 00000010 04000000
10:08:16 ipsec,debug,packet c0a81300 ffffff00 b3159d03
10:08:16 ipsec,debug begin.
10:08:16 ipsec,debug seen nptype=8(hash) len=24
10:08:16 ipsec,debug seen nptype=1(sa) len=52
10:08:16 ipsec,debug seen nptype=10(nonce) len=28
10:08:16 ipsec,debug seen nptype=4(ke) len=132
10:08:16 ipsec,debug seen nptype=5(id) len=16
10:08:16 ipsec,debug seen nptype=5(id) len=16
10:08:16 ipsec,debug succeed.
10:08:16 ipsec,debug received IDci2:
10:08:16 ipsec,debug 04000000 c0a85000 ffffff00
10:08:16 ipsec,debug received IDcr2:
10:08:16 ipsec,debug 04000000 c0a81300 ffffff00
10:08:16 ipsec,debug HASH(1) validate:
10:08:16 ipsec,debug 70ee54d5 16e57bed ee500617 f0e782df eebe956f
10:08:16 ipsec,debug,packet HASH with:
10:08:16 ipsec,debug,packet fc7a26a7 0a000034 00000001 00000001 00000028 01030401 031d504e 0000001c
10:08:16 ipsec,debug,packet 01030000 80010001 80020708 80040003 80050002 80030002 0400001c d8ac2be2
10:08:16 ipsec,debug,packet 4d4e655c 17e4a53b e74ba01e fe4f6e6a 28078296 05000084 9b7ba8a4 d3b090b2
10:08:16 ipsec,debug,packet 726c7cb7 e5205a79 8436ed65 d92ab522 952a0dfc a1ce6a88 3b4cbe71 4679d830
10:08:16 ipsec,debug,packet fa892591 5d96efc0 3ac8fa35 83d2e1b0 ddae0674 4d0518ec ab40aa9a 8cec2ab8
10:08:16 ipsec,debug,packet 6cea908d b528af4d 1b3a5151 0bb6acdd 8d66a755 68c475eb f2ff34b9 7fb7845f
10:08:16 ipsec,debug,packet f2bd3615 1a8e56bc dc94af44 27a24c57 0ab69c6e 65e99c4c 05000010 04000000
10:08:16 ipsec,debug,packet c0a85000 ffffff00 00000010 04000000 c0a81300 ffffff00
10:08:16 ipsec,debug,packet hmac(hmac_sha1)
10:08:16 ipsec,debug,packet HASH computed:
10:08:16 ipsec,debug,packet 70ee54d5 16e57bed ee500617 f0e782df eebe956f
10:08:16 ipsec,debug total SA len=48
10:08:16 ipsec,debug 00000001 00000001 00000028 01030401 031d504e 0000001c 01030000 80010001
10:08:16 ipsec,debug 80020708 80040003 80050002 80030002
10:08:16 ipsec,debug begin.
10:08:16 ipsec,debug seen nptype=2(prop) len=40
10:08:16 ipsec,debug succeed.
10:08:16 ipsec,debug proposal #1 len=40
10:08:16 ipsec,debug begin.
10:08:16 ipsec,debug seen nptype=3(trns) len=28
10:08:16 ipsec,debug succeed.
10:08:16 ipsec,debug transform #1 len=28
10:08:16 ipsec,debug type=SA Life Type, flag=0x8000, lorv=seconds
10:08:16 ipsec,debug type=SA Life Duration, flag=0x8000, lorv=1800
10:08:16 ipsec,debug life duration was in TLV.
10:08:16 ipsec,debug type=Encryption Mode, flag=0x8000, lorv=UDP-Tunnel
10:08:16 ipsec,debug UDP encapsulation requested
10:08:16 ipsec,debug type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha1
10:08:16 ipsec,debug type=Group Description, flag=0x8000, lorv=2
10:08:16 ipsec,debug dh(modp1024)
10:08:16 ipsec,debug pair 1:
10:08:16 ipsec,debug 0x4ac770: next=(nil) tnext=(nil)
10:08:16 ipsec,debug proposal #1: 1 transform
10:08:16 ipsec,debug got the local address from ID payload 192.168.19.0[0] prefixlen=24 ul_proto=255
10:08:16 ipsec,debug got the peer address from ID payload 192.168.80.0[0] prefixlen=24 ul_proto=255
10:08:16 ipsec searching for policy for selector: 192.168.19.0/24 <=> 192.168.80.0/24
10:08:16 ipsec policy not found
10:08:16 ipsec failed to get proposal for responder.
10:08:16 ipsec,error 187.115.194.X failed to pre-process ph2 packet.
I see the error "ipsec policy not found", but i don't understand the reasons of this error.