Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

Re: Replacing a SSG5 with SRX100H2 in branch office

$
0
0

Praying someone can help me overnite so i can get this tunnel up by tomorrow morning. Due to the syntax error, i created a new PSK and it was entered on both sides. Now the KMD Log shows this:

May 22 21:47:24  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0
May 22 21:47:27  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0
May 22 21:47:59  Dallas_SRX kmd[1458]: IKE negotiation failed with error: Authentication failed. IKE Version: 1, VPN: Colo_VPN Gateway: gw_Colo_VPN, Local: 2.2.2.2/500, Remote: 1.1.1.1/500, Local IKE-ID: 2.2.2.2, Remote IKE-ID: Maverick_Colo, VR-ID: 0
May 22 21:50:08  Dallas_SRX last message repeated 5 times
May 22 22:00:04  Dallas_SRX last message repeated 21 times
May 22 22:10:01  Dallas_SRX last message repeated 21 times
May 22 22:18:25  Dallas_SRX last message repeated 20 times
May 22 22:21:29  Dallas_SRX last message repeated 8 times
May 22 22:31:29  Dallas_SRX last message repeated 24 times
May 22 22:32:25  Dallas_SRX last message repeated 2 times
May 22 22:39:25  Dallas_SRX last message repeated 16 times
May 22 22:46:08  Dallas_SRX last message repeated 14 times
May 22 22:56:08  Dallas_SRX last message repeated 24 times

And the KMD shows this:

[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847059 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847059 stop timer. timer duration 0, reason 0.
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847059 reference count is not zero (1). Delaying deletion of SA
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847059 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847059 from peer entry 0xee3800
[May 22 22:44:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { cf4da94b b93e62f9 - 9cf2b89e 7cd6ef99 }
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 start timer. timer duration 30, reason 1.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  00000000: 9cf2 b89e 7cd6 ef99                      ....|...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  00000000: 53d9 52e5 bdb6 b296                      S.R.....
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e8f000 from freelist
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, remote = 1.1.1.1:500
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = fde3d46a fb7208f6 ...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f3c2fd74 15163f50 ...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6230]
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5327]
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e8f400 from freelist
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, remote = 1.1.1.1:500
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296} / 00000000, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 0605a938 e33b5cb2 ...
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xcf4da94b b93e62f9 - 0x53d952e5 bdb6b296 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xcf4da94b b93e62f9 - 53d952e5 bdb6b296 } / 00000000, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 stop timer. timer duration 30, reason 1.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 start timer. timer duration 0, reason 3.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847060 delete. curr ref count 1, del flags 0x3
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847060, ref cnt 1, status: Error ok
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296}, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { cf4da94b b93e62f9 - 53d952e5 bdb6b296 }
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847060 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847060 stop timer. timer duration 0, reason 0.
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847060 (ref cnt 0), waiting_for_del 0x0
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:44:53][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 start timer. timer duration 30, reason 1.
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847061 in peer entry 0xee3800
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 818584bb 9f18c607 - 00000000 00000000 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 818584bb 9f18c607 - 00000000 00000000}, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 818584bb 9f18c607 - 00000000 00000000 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 818584bb 9f18c607 - 00000000 00000000 } -> { ... - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6234]
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 2e2b9712 2dd2f689 ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = a8227fae 70a6125b ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5204]
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 00000000, remote = 1.1.1.1:500
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3} / 00000000, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = e2e23316 2cfe5285 ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x818584bb 9f18c607 - 0x88cd8380 7a82a2b3 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 stop timer. timer duration 30, reason 1.
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 start timer. timer duration 0, reason 3.
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x9717324a, protocol=0) entry to the spi table
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xa1beaa78, protocol=0) entry to the spi table
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = eb93cb25
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6345]
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847061 sa-cfg Colo_VPN
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / eb93cb25, nego = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = a58b8216 44920fa1 ...
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847061 delete. curr ref count 2, del flags 0x2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847061, ref cnt 2, status: Error ok
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 6f007396
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x818584bb 9f18c607 - 88cd8380 7a82a2b3 } / 6f007396, nego = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3}, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 818584bb 9f18c607 - 88cd8380 7a82a2b3 }
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847061 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 stop timer. timer duration 0, reason 0.
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847061 reference count is not zero (1). Delaying deletion of SA
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847061 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847061 from peer entry 0xee3800
[May 22 22:45:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { aeb6c4e1 b1e71435 - 61ac912e f417a271 }
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 start timer. timer duration 30, reason 1.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  00000000: 61ac 912e f417 a271                      a......q
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  00000000: 44f3 63e6 10f4 6dbe                      D.c...m.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e90800 from freelist
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, remote = 1.1.1.1:500
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 10e7aee9 4a9dc393 ...
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 3f82eeab 996ffd9b ...
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6361]
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5791]
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e90c00 from freelist
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, remote = 1.1.1.1:500
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe} / 00000000, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = a1c24978 1b399ff0 ...
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xaeb6c4e1 b1e71435 - 0x44f363e6 10f46dbe } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xaeb6c4e1 b1e71435 - 44f363e6 10f46dbe } / 00000000, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 stop timer. timer duration 30, reason 1.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 start timer. timer duration 0, reason 3.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847062 delete. curr ref count 1, del flags 0x3
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847062, ref cnt 1, status: Error ok
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe}, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { aeb6c4e1 b1e71435 - 44f363e6 10f46dbe }
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847062 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847062 stop timer. timer duration 0, reason 0.
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847062 (ref cnt 0), waiting_for_del 0x0
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:46:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 start timer. timer duration 30, reason 1.
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847063 in peer entry 0xee3800
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 9c7b8610 962a1303 - 00000000 00000000 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 9c7b8610 962a1303 - 00000000 00000000}, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 9c7b8610 962a1303 - 00000000 00000000 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 9c7b8610 962a1303 - 00000000 00000000 } -> { ... - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5836]
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = fca967c7 1ccd44ae ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 6a63391d 720e4760 ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5248]
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 } / 00000000, remote = 1.1.1.1:500
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7} / 00000000, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = c94d79bd a55af41e ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x9c7b8610 962a1303 - 0xdd01a3be ff2083a7 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 stop timer. timer duration 30, reason 1.
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 start timer. timer duration 0, reason 3.
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x88b74904, protocol=0) entry to the spi table
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x90f61701, protocol=0) entry to the spi table
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = b890e099
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7685]
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847063 sa-cfg Colo_VPN
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / b890e099, nego = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = f6a02527 b99bd880 ...
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847063 delete. curr ref count 2, del flags 0x2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847063, ref cnt 2, status: Error ok
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 6f8d4bee
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x9c7b8610 962a1303 - dd01a3be ff2083a7 } / 6f8d4bee, nego = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7}, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 9c7b8610 962a1303 - dd01a3be ff2083a7 }
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847063 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 stop timer. timer duration 0, reason 0.
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847063 reference count is not zero (1). Delaying deletion of SA
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847063 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847063 from peer entry 0xee3800
[May 22 22:46:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 422949f3 2defc72e - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 422949f3 2defc72e - 44e538d7 a7586ffd }
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 start timer. timer duration 30, reason 1.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  00000000: 44e5 38d7 a758 6ffd                      D.8..Xo.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  00000000: 0829 6c78 32f3 7c40                      .)lx2.|@
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e92000 from freelist
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 8b7fee50 03eb5e48 ...
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 0e8941be c673c7ac ...
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6217]
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5458]
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e92400 from freelist
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40} / 00000000, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 71d3cbc4 261fd48c ...
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x422949f3 2defc72e - 0x08296c78 32f37c40 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x422949f3 2defc72e - 08296c78 32f37c40 } / 00000000, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 stop timer. timer duration 30, reason 1.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 start timer. timer duration 0, reason 3.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847064 delete. curr ref count 1, del flags 0x3
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847064, ref cnt 1, status: Error ok
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40}, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 422949f3 2defc72e - 08296c78 32f37c40 }
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847064 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847064 stop timer. timer duration 0, reason 0.
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847064 (ref cnt 0), waiting_for_del 0x0
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:47:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 start timer. timer duration 30, reason 1.
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847065 in peer entry 0xee3800
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { f6ef71f7 685cb743 - 00000000 00000000 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { f6ef71f7 685cb743 - 00000000 00000000}, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { f6ef71f7 685cb743 - 00000000 00000000 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { f6ef71f7 685cb743 - 00000000 00000000 } -> { ... - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6523]
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 49b04963 a199ad3e ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = d4801177 d2c0e8a9 ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5412]
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960} / 00000000, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 58ba04fb 4108819f ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xf6ef71f7 685cb743 - 0xc4c202df e3368960 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 stop timer. timer duration 30, reason 1.
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 start timer. timer duration 0, reason 3.
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x58d5ddb1, protocol=0) entry to the spi table
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x57f8f0d3, protocol=0) entry to the spi table
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 64ec45d6
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7194]
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847065 sa-cfg Colo_VPN
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 64ec45d6, nego = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 420ade6e 9606c1f6 ...
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847065 delete. curr ref count 2, del flags 0x2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847065, ref cnt 2, status: Error ok
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 4ee8f295
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf6ef71f7 685cb743 - c4c202df e3368960 } / 4ee8f295, nego = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960}, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { f6ef71f7 685cb743 - c4c202df e3368960 }
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847065 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 stop timer. timer duration 0, reason 0.
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847065 reference count is not zero (1). Delaying deletion of SA
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847065 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847065 from peer entry 0xee3800
[May 22 22:47:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 6897300a 37c0ec81 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 6897300a 37c0ec81 - f226f596 30af1f67 }
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 start timer. timer duration 30, reason 1.
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  00000000: f226 f596 30af 1f67                      .&..0..g
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  00000000: eb98 3e13 ac08 2e57                      ..>....W
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:47:41][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e93800 from freelist
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 337a8d18 1ff5ac1d ...
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 74468d44 6e74a905 ...
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6254]
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5410]
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e93c00 from freelist
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, remote = 1.1.1.1:500
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57} / 00000000, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 08e8ece5 e501e626 ...
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x6897300a 37c0ec81 - 0xeb983e13 ac082e57 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x6897300a 37c0ec81 - eb983e13 ac082e57 } / 00000000, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 stop timer. timer duration 30, reason 1.
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 start timer. timer duration 0, reason 3.
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847066 delete. curr ref count 1, del flags 0x3
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847066, ref cnt 1, status: Error ok
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57}, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 6897300a 37c0ec81 - eb983e13 ac082e57 }
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847066 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847066 stop timer. timer duration 0, reason 0.
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847066 (ref cnt 0), waiting_for_del 0x0
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:47:42][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 2ad94000 1ab8d65b - 28a45037 3e261557 }
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 start timer. timer duration 30, reason 1.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  00000000: 28a4 5037 3e26 1557                      (.P7>&.W
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  00000000: a68b 03f6 c07d 8bf0                      .....}..
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e94400 from freelist
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, remote = 1.1.1.1:500
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = ec67bc3e f88dce7b ...
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 04b8fa98 a9b7aac0 ...
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6799]
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6766]
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e94800 from freelist
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, remote = 1.1.1.1:500
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0} / 00000000, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 920acfd6 1f7e9cdf ...
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x2ad94000 1ab8d65b - 0xa68b03f6 c07d8bf0 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2ad94000 1ab8d65b - a68b03f6 c07d8bf0 } / 00000000, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 stop timer. timer duration 30, reason 1.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 start timer. timer duration 0, reason 3.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847067 delete. curr ref count 1, del flags 0x3
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847067, ref cnt 1, status: Error ok
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0}, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 2ad94000 1ab8d65b - a68b03f6 c07d8bf0 }
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847067 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847067 stop timer. timer duration 0, reason 0.
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847067 (ref cnt 0), waiting_for_del 0x0
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:48:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 start timer. timer duration 30, reason 1.
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847068 in peer entry 0xee3800
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 8da66c58 e552ec99 - 00000000 00000000 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 8da66c58 e552ec99 - 00000000 00000000}, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 8da66c58 e552ec99 - 00000000 00000000 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 8da66c58 e552ec99 - 00000000 00000000 } -> { ... - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5975]
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = c424fbc1 26520783 ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 2f4ab914 9fcba3b7 ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5394]
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / 00000000, remote = 1.1.1.1:500
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469} / 00000000, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 417e0ac9 398f8291 ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x8da66c58 e552ec99 - 0x9d2c42a7 38ee8469 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 stop timer. timer duration 30, reason 1.
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 start timer. timer duration 0, reason 3.
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xbfd50b0a, protocol=0) entry to the spi table
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x6be3db97, protocol=0) entry to the spi table
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = f5a1a8f9
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6022]
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847068 sa-cfg Colo_VPN
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / f5a1a8f9, nego = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 32a0b90e e418caaa ...
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847068 delete. curr ref count 2, del flags 0x2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847068, ref cnt 2, status: Error ok
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = ad315233
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x8da66c58 e552ec99 - 9d2c42a7 38ee8469 } / ad315233, nego = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469}, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 8da66c58 e552ec99 - 9d2c42a7 38ee8469 }
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847068 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 stop timer. timer duration 0, reason 0.
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847068 reference count is not zero (1). Delaying deletion of SA
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847068 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847068 from peer entry 0xee3800
[May 22 22:48:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 75d251b7 a3c82220 - 90abe627 201be8d4 }
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 start timer. timer duration 30, reason 1.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  00000000: 90ab e627 201b e8d4                      ...' ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  00000000: 9718 9611 5d62 7d43                      ....]b}C
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e95c00 from freelist
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 05fc0842 1c9d002d ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 40f8db1f b921be9f ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6219]
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5561]
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e96000 from freelist
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43} / 00000000, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 17ead66e 5d6859e9 ...
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x75d251b7 a3c82220 - 0x97189611 5d627d43 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x75d251b7 a3c82220 - 97189611 5d627d43 } / 00000000, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 stop timer. timer duration 30, reason 1.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 start timer. timer duration 0, reason 3.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847069 delete. curr ref count 1, del flags 0x3
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847069, ref cnt 1, status: Error ok
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43}, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 75d251b7 a3c82220 - 97189611 5d627d43 }
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847069 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847069 stop timer. timer duration 0, reason 0.
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847069 (ref cnt 0), waiting_for_del 0x0
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:49:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 start timer. timer duration 30, reason 1.
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847070 in peer entry 0xee3800
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fbaaaede 9036f2e3 - 00000000 00000000 }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { fbaaaede 9036f2e3 - 00000000 00000000}, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { fbaaaede 9036f2e3 - 00000000 00000000 }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { fbaaaede 9036f2e3 - 00000000 00000000 } -> { ... - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6585]
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 961c3f05 1c2d9b01 ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 6410918e e0bc4d2b ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5449]
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df} / 00000000, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 2aa1c888 b580bad5 ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfbaaaede 9036f2e3 - 0x19a7df5f 7659c9df } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 stop timer. timer duration 30, reason 1.
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 start timer. timer duration 0, reason 3.
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xaaa42b91, protocol=0) entry to the spi table
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xfa27a941, protocol=0) entry to the spi table
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 8c92511a
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6335]
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847070 sa-cfg Colo_VPN
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 8c92511a, nego = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 30b3b60c 76c831bf ...
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847070 delete. curr ref count 2, del flags 0x2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847070, ref cnt 2, status: Error ok
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 23187776
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfbaaaede 9036f2e3 - 19a7df5f 7659c9df } / 23187776, nego = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df}, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fbaaaede 9036f2e3 - 19a7df5f 7659c9df }
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847070 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 stop timer. timer duration 0, reason 0.
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847070 reference count is not zero (1). Delaying deletion of SA
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847070 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847070 from peer entry 0xee3800
[May 22 22:49:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { ed0eb0da 22a80205 - abe0f18f c75e6152 }
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 start timer. timer duration 30, reason 1.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  00000000: abe0 f18f c75e 6152                      .....^aR
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  00000000: 9a71 fccc f899 d3f5                      .q......
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e97400 from freelist
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 77f44d34 13e46bea ...
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 299ce81e 9436984f ...
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6170]
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5362]
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e97800 from freelist
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, remote = 1.1.1.1:500
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5} / 00000000, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 47a312a3 1ad1f332 ...
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xed0eb0da 22a80205 - 0x9a71fccc f899d3f5 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xed0eb0da 22a80205 - 9a71fccc f899d3f5 } / 00000000, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 stop timer. timer duration 30, reason 1.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 start timer. timer duration 0, reason 3.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847071 delete. curr ref count 1, del flags 0x3
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847071, ref cnt 1, status: Error ok
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5}, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { ed0eb0da 22a80205 - 9a71fccc f899d3f5 }
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847071 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847071 stop timer. timer duration 0, reason 0.
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847071 (ref cnt 0), waiting_for_del 0x0
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:49:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 start timer. timer duration 30, reason 1.
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847072 in peer entry 0xee3800
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 1673a7ae 3ccb16a6 - 00000000 00000000}, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 1673a7ae 3ccb16a6 - 00000000 00000000 } -> { ... - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6306]
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = b83d9b9d 3b4ef0c2 ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 0127180b 2454acd1 ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5549]
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 00000000, remote = 1.1.1.1:500
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41} / 00000000, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = d32f50a5 4ac57ee9 ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x1673a7ae 3ccb16a6 - 0x22dadc26 76298e41 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 stop timer. timer duration 30, reason 1.
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 start timer. timer duration 0, reason 3.
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x4bd66a56, protocol=0) entry to the spi table
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x7fc54c2c, protocol=0) entry to the spi table
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = e18b2fef
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6368]
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847072 sa-cfg Colo_VPN
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / e18b2fef, nego = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = f3541bad b593dd50 ...
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847072 delete. curr ref count 2, del flags 0x2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847072, ref cnt 2, status: Error ok
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 1500d330
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1673a7ae 3ccb16a6 - 22dadc26 76298e41 } / 1500d330, nego = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41}, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 1673a7ae 3ccb16a6 - 22dadc26 76298e41 }
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847072 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 stop timer. timer duration 0, reason 0.
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847072 reference count is not zero (1). Delaying deletion of SA
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847072 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847072 from peer entry 0xee3800
[May 22 22:50:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { ac4e6e0f dd3ffdde - ae8efd44 4b583902 }
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 start timer. timer duration 30, reason 1.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  00000000: ae8e fd44 4b58 3902                      ...DKX9.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  00000000: ef9c f04b 588f ce8c                      ...KX...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e98c00 from freelist
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 0332d6e6 20ef1f4a ...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 24f47c20 73e9e227 ...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6207]
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5334]
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e99000 from freelist
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c} / 00000000, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 1141997e 992da1b7 ...
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xac4e6e0f dd3ffdde - 0xef9cf04b 588fce8c } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xac4e6e0f dd3ffdde - ef9cf04b 588fce8c } / 00000000, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 stop timer. timer duration 30, reason 1.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 start timer. timer duration 0, reason 3.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847073 delete. curr ref count 1, del flags 0x3
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847073, ref cnt 1, status: Error ok
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c}, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { ac4e6e0f dd3ffdde - ef9cf04b 588fce8c }
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847073 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847073 stop timer. timer duration 0, reason 0.
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847073 (ref cnt 0), waiting_for_del 0x0
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:51:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 start timer. timer duration 30, reason 1.
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847074 in peer entry 0xee3800
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { c88db471 ce438b29 - 00000000 00000000 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { c88db471 ce438b29 - 00000000 00000000}, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { c88db471 ce438b29 - 00000000 00000000 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { c88db471 ce438b29 - 00000000 00000000 } -> { ... - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5976]
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = e2a696c7 6733cdac ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = dd668c8a f12c0431 ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5353]
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06} / 00000000, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 161b61e3 73973175 ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xc88db471 ce438b29 - 0xf46c7b96 c56fdf06 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 stop timer. timer duration 30, reason 1.
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 start timer. timer duration 0, reason 3.
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x381aa335, protocol=0) entry to the spi table
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xe39eb454, protocol=0) entry to the spi table
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 05f58094
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6229]
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847074 sa-cfg Colo_VPN
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / 05f58094, nego = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = d2e93f05 0e349dc7 ...
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847074 delete. curr ref count 2, del flags 0x2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847074, ref cnt 2, status: Error ok
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = c737bf2b
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc88db471 ce438b29 - f46c7b96 c56fdf06 } / c737bf2b, nego = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06}, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { c88db471 ce438b29 - f46c7b96 c56fdf06 }
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847074 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 stop timer. timer duration 0, reason 0.
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847074 reference count is not zero (1). Delaying deletion of SA
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847074 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847074 from peer entry 0xee3800
[May 22 22:51:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb33d81b fe098510 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { bb33d81b fe098510 - 42e4b074 65a22c29 }
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 start timer. timer duration 30, reason 1.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  00000000: 42e4 b074 65a2 2c29                      B..te.,)
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  00000000: 740d 409b 38b2 734c                      t.@.8.sL
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9a400 from freelist
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 62db8133 55e24423 ...
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 69fb3828 4f46f3c0 ...
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6096]
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5375]
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9a800 from freelist
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c } / 00000000, remote = 1.1.1.1:500
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb33d81b fe098510 - 740d409b 38b2734c }
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c} / 00000000, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = d55a8705 59a1aacc ...
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xbb33d81b fe098510 - 0x740d409b 38b2734c } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb33d81b fe098510 - 740d409b 38b2734c } / 00000000, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 stop timer. timer duration 30, reason 1.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 start timer. timer duration 0, reason 3.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847075 delete. curr ref count 1, del flags 0x3
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847075, ref cnt 1, status: Error ok
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c}, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { bb33d81b fe098510 - 740d409b 38b2734c }
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847075 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847075 stop timer. timer duration 0, reason 0.
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847075 (ref cnt 0), waiting_for_del 0x0
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:51:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { e3077ddb 73c320d0 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { e3077ddb 73c320d0 - 99c2e6ab 8ee4f746 }
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 start timer. timer duration 30, reason 1.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  00000000: 99c2 e6ab 8ee4 f746                      .......F
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  00000000: b5ef 57a2 a26a ae62                      ..W..j.b
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9b000 from freelist
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d2e5e151 6001093a ...
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 4d8ae88d 1fa02f3d ...
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6190]
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5372]
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9b400 from freelist
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62} / 00000000, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 20910f01 df2d4a50 ...
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xe3077ddb 73c320d0 - 0xb5ef57a2 a26aae62 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xe3077ddb 73c320d0 - b5ef57a2 a26aae62 } / 00000000, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 stop timer. timer duration 30, reason 1.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 start timer. timer duration 0, reason 3.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847076 delete. curr ref count 1, del flags 0x3
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847076, ref cnt 1, status: Error ok
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62}, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { e3077ddb 73c320d0 - b5ef57a2 a26aae62 }
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847076 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847076 stop timer. timer duration 0, reason 0.
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847076 (ref cnt 0), waiting_for_del 0x0
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:52:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 start timer. timer duration 30, reason 1.
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847077 in peer entry 0xee3800
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 84fd2fdb 7f94abe5 - 00000000 00000000}, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 84fd2fdb 7f94abe5 - 00000000 00000000 } -> { ... - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6027]
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 7d2d3cbb e76b26b8 ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 4ba3f4dd 3106d2e7 ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5380]
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b} / 00000000, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 261e6412 fba8b505 ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x84fd2fdb 7f94abe5 - 0xd222cb2e 8271747b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 stop timer. timer duration 30, reason 1.
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 start timer. timer duration 0, reason 3.
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xd10e271a, protocol=0) entry to the spi table
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x7fa74d51, protocol=0) entry to the spi table
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 0bde4c60
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5963]
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847077 sa-cfg Colo_VPN
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 0bde4c60, nego = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = f6a66bb9 f2722499 ...
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847077 delete. curr ref count 2, del flags 0x2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847077, ref cnt 2, status: Error ok
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 5f506d70
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x84fd2fdb 7f94abe5 - d222cb2e 8271747b } / 5f506d70, nego = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b}, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 84fd2fdb 7f94abe5 - d222cb2e 8271747b }
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847077 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 stop timer. timer duration 0, reason 0.
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847077 reference count is not zero (1). Delaying deletion of SA
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847077 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847077 from peer entry 0xee3800
[May 22 22:52:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 04e2c2bf 184be017 - b0f43429 a5fc9501 }
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 start timer. timer duration 30, reason 1.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  00000000: b0f4 3429 a5fc 9501                      ..4)....
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  00000000: 4ebb 4b31 f962 a288                      N.K1.b..
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9c800 from freelist
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 0420dad6 bd84acfe ...
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = af2f202d cbb95594 ...
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6347]
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5630]
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9cc00 from freelist
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, remote = 1.1.1.1:500
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288} / 00000000, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 7d11e8c5 40a24829 ...
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x04e2c2bf 184be017 - 0x4ebb4b31 f962a288 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x04e2c2bf 184be017 - 4ebb4b31 f962a288 } / 00000000, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 stop timer. timer duration 30, reason 1.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 start timer. timer duration 0, reason 3.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847078 delete. curr ref count 1, del flags 0x3
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847078, ref cnt 1, status: Error ok
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288}, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 04e2c2bf 184be017 - 4ebb4b31 f962a288 }
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847078 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847078 stop timer. timer duration 0, reason 0.
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847078 (ref cnt 0), waiting_for_del 0x0
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:52:55][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 start timer. timer duration 30, reason 1.
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847079 in peer entry 0xee3800
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fe14b406 242a6e97 - 00000000 00000000 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { fe14b406 242a6e97 - 00000000 00000000}, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { fe14b406 242a6e97 - 00000000 00000000 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { fe14b406 242a6e97 - 00000000 00000000 } -> { ... - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6359]
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 06dc5ea2 c24dd8bf ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = eedc6114 830b1e9e ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5334]
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 } / 00000000, remote = 1.1.1.1:500
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049} / 00000000, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = bc410a88 b43e8086 ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfe14b406 242a6e97 - 0x12948fb8 1b7cb049 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 stop timer. timer duration 30, reason 1.
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 start timer. timer duration 0, reason 3.
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x756ba779, protocol=0) entry to the spi table
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xcf9787da, protocol=0) entry to the spi table
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = a5b050e0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6007]
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847079 sa-cfg Colo_VPN
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / a5b050e0, nego = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = cff5149b 1e941545 ...
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847079 delete. curr ref count 2, del flags 0x2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847079, ref cnt 2, status: Error ok
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 89de6d15
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe14b406 242a6e97 - 12948fb8 1b7cb049 } / 89de6d15, nego = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049}, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fe14b406 242a6e97 - 12948fb8 1b7cb049 }
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847079 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 stop timer. timer duration 0, reason 0.
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847079 reference count is not zero (1). Delaying deletion of SA
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847079 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847079 from peer entry 0xee3800
[May 22 22:53:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 1c6b3ef1 962d02eb - c4b81806 cd6f7f46 }
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 start timer. timer duration 30, reason 1.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  00000000: c4b8 1806 cd6f 7f46                      .....o.F
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  00000000: c2de 5453 3554 d88e                      ..TS5T..
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9e000 from freelist
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, remote = 1.1.1.1:500
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = a901aefa d06f8c41 ...
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 16ca6f52 e903682d ...
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [11175]
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [10523]
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9e400 from freelist
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, remote = 1.1.1.1:500
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e} / 00000000, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = bb917032 685b6920 ...
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x1c6b3ef1 962d02eb - 0xc2de5453 3554d88e } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1c6b3ef1 962d02eb - c2de5453 3554d88e } / 00000000, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 stop timer. timer duration 30, reason 1.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 start timer. timer duration 0, reason 3.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847080 delete. curr ref count 1, del flags 0x3
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847080, ref cnt 1, status: Error ok
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e}, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 1c6b3ef1 962d02eb - c2de5453 3554d88e }
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847080 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847080 stop timer. timer duration 0, reason 0.
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847080 (ref cnt 0), waiting_for_del 0x0
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:53:29][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { d81d3616 787ee65c - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { d81d3616 787ee65c - db4e581d 1489a577 }
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 start timer. timer duration 30, reason 1.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  00000000: db4e 581d 1489 a577                      .NX....w
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  00000000: db5d 9b8f f057 4d06                      .]...WM.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9ec00 from freelist
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 39a71fb3 b2bf155d ...
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = ad6a1c38 a5c14fb8 ...
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6545]
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5346]
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e9f000 from freelist
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06} / 00000000, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 6366f5a1 d17ff7f7 ...
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xd81d3616 787ee65c - 0xdb5d9b8f f0574d06 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xd81d3616 787ee65c - db5d9b8f f0574d06 } / 00000000, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 stop timer. timer duration 30, reason 1.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 start timer. timer duration 0, reason 3.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847081 delete. curr ref count 1, del flags 0x3
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847081, ref cnt 1, status: Error ok
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06}, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { d81d3616 787ee65c - db5d9b8f f0574d06 }
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847081 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847081 stop timer. timer duration 0, reason 0.
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847081 (ref cnt 0), waiting_for_del 0x0
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:54:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 start timer. timer duration 30, reason 1.
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847082 in peer entry 0xee3800
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { b15898c9 6650d8fa - 00000000 00000000 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { b15898c9 6650d8fa - 00000000 00000000}, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { b15898c9 6650d8fa - 00000000 00000000 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { b15898c9 6650d8fa - 00000000 00000000 } -> { ... - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6059]
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 82ac181e 0c1c5a28 ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = d346ed84 1922d17c ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5344]
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121} / 00000000, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 15405b7d 4af61969 ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xb15898c9 6650d8fa - 0x79ac07fd 14f4c121 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 stop timer. timer duration 30, reason 1.
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 start timer. timer duration 0, reason 3.
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x9d299e6d, protocol=0) entry to the spi table
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x4f6450dd, protocol=0) entry to the spi table
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 0ee3c060
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6224]
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847082 sa-cfg Colo_VPN
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 0ee3c060, nego = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = c1ff7fe6 440347db ...
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847082 delete. curr ref count 2, del flags 0x2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847082, ref cnt 2, status: Error ok
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 2828e9be
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb15898c9 6650d8fa - 79ac07fd 14f4c121 } / 2828e9be, nego = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121}, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { b15898c9 6650d8fa - 79ac07fd 14f4c121 }
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847082 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 stop timer. timer duration 0, reason 0.
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847082 reference count is not zero (1). Delaying deletion of SA
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847082 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847082 from peer entry 0xee3800
[May 22 22:54:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 24c24aa1 1e7e050c - 1fca010d e9380819 }
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 start timer. timer duration 30, reason 1.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  00000000: 1fca 010d e938 0819                      .....8..
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  00000000: 69c9 246c af89 f6d9                      i.$l....
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea0400 from freelist
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 606e413c e4ceb4c9 ...
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 0b08be7c 5312c024 ...
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6663]
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5407]
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea0800 from freelist
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, remote = 1.1.1.1:500
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9} / 00000000, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 1e30af57 6b851fb6 ...
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x24c24aa1 1e7e050c - 0x69c9246c af89f6d9 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x24c24aa1 1e7e050c - 69c9246c af89f6d9 } / 00000000, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 stop timer. timer duration 30, reason 1.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 start timer. timer duration 0, reason 3.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847083 delete. curr ref count 1, del flags 0x3
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847083, ref cnt 1, status: Error ok
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9}, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 24c24aa1 1e7e050c - 69c9246c af89f6d9 }
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847083 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847083 stop timer. timer duration 0, reason 0.
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847083 (ref cnt 0), waiting_for_del 0x0
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:54:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2d398a59 2f84efda - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 2d398a59 2f84efda - 4bb9e3a4 7b3e4adb }
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 start timer. timer duration 30, reason 1.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  00000000: 4bb9 e3a4 7b3e 4adb                      K...{>J.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  00000000: a414 8000 d2fe e73e                      .......>
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea1000 from freelist
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, remote = 1.1.1.1:500
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 027db0f8 38e092e2 ...
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = bc2ca1b1 a483f98a ...
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6082]
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5347]
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea1400 from freelist
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, remote = 1.1.1.1:500
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e} / 00000000, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = f3eb2b99 cebb759f ...
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x2d398a59 2f84efda - 0xa4148000 d2fee73e } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x2d398a59 2f84efda - a4148000 d2fee73e } / 00000000, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 stop timer. timer duration 30, reason 1.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 start timer. timer duration 0, reason 3.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847084 delete. curr ref count 1, del flags 0x3
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847084, ref cnt 1, status: Error ok
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e}, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 2d398a59 2f84efda - a4148000 d2fee73e }
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847084 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847084 stop timer. timer duration 0, reason 0.
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847084 (ref cnt 0), waiting_for_del 0x0
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:55:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 start timer. timer duration 30, reason 1.
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847085 in peer entry 0xee3800
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 81f8c0de 75c6e3e2 - 00000000 00000000}, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 81f8c0de 75c6e3e2 - 00000000 00000000 } -> { ... - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6059]
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 6dccffb2 dcb7e1a9 ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f2516c19 afe2c971 ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5569]
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / 00000000, remote = 1.1.1.1:500
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8} / 00000000, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = f8d86835 9df708e7 ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x81f8c0de 75c6e3e2 - 0xce4e235d 79f682e8 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 stop timer. timer duration 30, reason 1.
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 start timer. timer duration 0, reason 3.
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xcbb30636, protocol=0) entry to the spi table
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x66dbc7d6, protocol=0) entry to the spi table
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = e974772c
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6218]
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847085 sa-cfg Colo_VPN
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / e974772c, nego = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 64241253 e80f9d13 ...
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847085 delete. curr ref count 2, del flags 0x2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847085, ref cnt 2, status: Error ok
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = a29785b5
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x81f8c0de 75c6e3e2 - ce4e235d 79f682e8 } / a29785b5, nego = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8}, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 81f8c0de 75c6e3e2 - ce4e235d 79f682e8 }
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847085 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 stop timer. timer duration 0, reason 0.
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847085 reference count is not zero (1). Delaying deletion of SA
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847085 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847085 from peer entry 0xee3800
[May 22 22:55:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb74b286 586ead5d - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { bb74b286 586ead5d - 95d6ffa2 50ea3ea5 }
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 start timer. timer duration 30, reason 1.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  00000000: 95d6 ffa2 50ea 3ea5                      ....P.>.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  00000000: 33f3 35cd 0613 f177                      3.5....w
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea2800 from freelist
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 71a21605 d9f2599a ...
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = be9f4c32 e7ccca5e ...
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6285]
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5332]
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea2c00 from freelist
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177} / 00000000, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 729dcf4f ce066efc ...
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xbb74b286 586ead5d - 0x33f335cd 0613f177 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xbb74b286 586ead5d - 33f335cd 0613f177 } / 00000000, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 stop timer. timer duration 30, reason 1.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 start timer. timer duration 0, reason 3.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847086 delete. curr ref count 1, del flags 0x3
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847086, ref cnt 1, status: Error ok
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177}, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { bb74b286 586ead5d - 33f335cd 0613f177 }
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847086 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847086 stop timer. timer duration 0, reason 0.
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847086 (ref cnt 0), waiting_for_del 0x0
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:56:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 start timer. timer duration 30, reason 1.
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847087 in peer entry 0xee3800
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fad51adb 54984319 - 00000000 00000000 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { fad51adb 54984319 - 00000000 00000000}, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { fad51adb 54984319 - 00000000 00000000 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { fad51adb 54984319 - 00000000 00000000 } -> { ... - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6154]
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 73f77bb2 2e057b20 ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = ad2020a5 da46ed43 ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5502]
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7} / 00000000, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 03d60c73 49190e21 ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfad51adb 54984319 - 0xbb2f809f 7b8314d7 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 stop timer. timer duration 30, reason 1.
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 start timer. timer duration 0, reason 3.
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xc5137e6e, protocol=0) entry to the spi table
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x50fa962f, protocol=0) entry to the spi table
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 349a5ad9
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6291]
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847087 sa-cfg Colo_VPN
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / 349a5ad9, nego = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 1f20e801 3c15ddd6 ...
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847087 delete. curr ref count 2, del flags 0x2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847087, ref cnt 2, status: Error ok
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = bd255a4c
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfad51adb 54984319 - bb2f809f 7b8314d7 } / bd255a4c, nego = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7}, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fad51adb 54984319 - bb2f809f 7b8314d7 }
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847087 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 stop timer. timer duration 0, reason 0.
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847087 reference count is not zero (1). Delaying deletion of SA
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847087 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847087 from peer entry 0xee3800
[May 22 22:56:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 7462923a f0cccf69 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 7462923a f0cccf69 - a5e7b583 1f1f6699 }
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 start timer. timer duration 30, reason 1.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  00000000: a5e7 b583 1f1f 6699                      ......f.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  00000000: 3e85 169a 77cc 9b37                      >...w..7
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea4000 from freelist
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = a27459bf e3fe2818 ...
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = e77c92a2 385f386c ...
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6546]
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5390]
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea4400 from freelist
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, remote = 1.1.1.1:500
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37} / 00000000, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 90358891 0992d206 ...
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x7462923a f0cccf69 - 0x3e85169a 77cc9b37 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x7462923a f0cccf69 - 3e85169a 77cc9b37 } / 00000000, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 stop timer. timer duration 30, reason 1.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 start timer. timer duration 0, reason 3.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847088 delete. curr ref count 1, del flags 0x3
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847088, ref cnt 1, status: Error ok
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37}, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 7462923a f0cccf69 - 3e85169a 77cc9b37 }
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847088 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847088 stop timer. timer duration 0, reason 0.
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847088 (ref cnt 0), waiting_for_del 0x0
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:56:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c289ddf4 0572727e - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { c289ddf4 0572727e - 389e1bd0 253a1439 }
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 start timer. timer duration 30, reason 1.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  00000000: 389e 1bd0 253a 1439                      8...%:.9
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  00000000: 6a12 5469 f0ee 641d                      j.Ti..d.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea4c00 from freelist
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, remote = 1.1.1.1:500
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = b7f898d8 28d400d0 ...
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 8bdc80a3 77aafe71 ...
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6024]
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5403]
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea5000 from freelist
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, remote = 1.1.1.1:500
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d} / 00000000, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = abc36bf9 ac2a43d0 ...
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xc289ddf4 0572727e - 0x6a125469 f0ee641d } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xc289ddf4 0572727e - 6a125469 f0ee641d } / 00000000, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 stop timer. timer duration 30, reason 1.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 start timer. timer duration 0, reason 3.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847089 delete. curr ref count 1, del flags 0x3
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847089, ref cnt 1, status: Error ok
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d}, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { c289ddf4 0572727e - 6a125469 f0ee641d }
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847089 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847089 stop timer. timer duration 0, reason 0.
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847089 (ref cnt 0), waiting_for_del 0x0
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:57:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 start timer. timer duration 30, reason 1.
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847090 in peer entry 0xee3800
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { b9b72055 81c56ad8 - 00000000 00000000 }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { b9b72055 81c56ad8 - 00000000 00000000}, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { b9b72055 81c56ad8 - 00000000 00000000 }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { b9b72055 81c56ad8 - 00000000 00000000 } -> { ... - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [7076]
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 8f578eaf c54d8081 ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = c1f8f407 7c4ba979 ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6615]
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 00000000, remote = 1.1.1.1:500
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b} / 00000000, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = aaa9333b c90d5e12 ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xb9b72055 81c56ad8 - 0x029a6a3f d4bbaf2b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 stop timer. timer duration 30, reason 1.
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 start timer. timer duration 0, reason 3.
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x38db8fa0, protocol=0) entry to the spi table
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0xf17cb67b, protocol=0) entry to the spi table
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 5b4791a4
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [8013]
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847090 sa-cfg Colo_VPN
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 5b4791a4, nego = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 35395310 a0452caa ...
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847090 delete. curr ref count 2, del flags 0x2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847090, ref cnt 2, status: Error ok
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = 7e4f54d5
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xb9b72055 81c56ad8 - 029a6a3f d4bbaf2b } / 7e4f54d5, nego = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b}, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { b9b72055 81c56ad8 - 029a6a3f d4bbaf2b }
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847090 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 stop timer. timer duration 0, reason 0.
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847090 reference count is not zero (1). Delaying deletion of SA
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847090 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847090 from peer entry 0xee3800
[May 22 22:57:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 1a428c76 909ef9d5 - dbe0a93b e7380095 }
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 start timer. timer duration 30, reason 1.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  00000000: dbe0 a93b e738 0095                      ...;.8..
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  00000000: 259b 203f c6ee b6bc                      %. ?....
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea6400 from freelist
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d2e175e4 766b0798 ...
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f5858aa4 83bd6308 ...
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [5957]
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5544]
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea6800 from freelist
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc} / 00000000, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = a6d1dcdb 6a481409 ...
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x1a428c76 909ef9d5 - 0x259b203f c6eeb6bc } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x1a428c76 909ef9d5 - 259b203f c6eeb6bc } / 00000000, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 stop timer. timer duration 30, reason 1.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 start timer. timer duration 0, reason 3.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847091 delete. curr ref count 1, del flags 0x3
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847091, ref cnt 1, status: Error ok
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc}, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 1a428c76 909ef9d5 - 259b203f c6eeb6bc }
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847091 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847091 stop timer. timer duration 0, reason 0.
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847091 (ref cnt 0), waiting_for_del 0x0
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:58:08][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 start timer. timer duration 30, reason 1.
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847092 in peer entry 0xee3800
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 3c4c807d 175f179f - 00000000 00000000 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 3c4c807d 175f179f - 00000000 00000000}, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 3c4c807d 175f179f - 00000000 00000000 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 3c4c807d 175f179f - 00000000 00000000 } -> { ... - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6063]
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 00000000, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 9e5853f1 48ce3029 ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 61e8f992 e01287b7 ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5576]
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 00000000, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776} / 00000000, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 4e323f36 8865d60c ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x3c4c807d 175f179f - 0xab56939d 12017776 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 stop timer. timer duration 30, reason 1.
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 start timer. timer duration 0, reason 3.
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x2e0d60a8, protocol=0) entry to the spi table
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x53ec7bf3, protocol=0) entry to the spi table
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 023e3113
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6894]
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847092 sa-cfg Colo_VPN
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / 023e3113, nego = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 3f4319af 81c3d0f6 ...
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847092 delete. curr ref count 2, del flags 0x2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847092, ref cnt 2, status: Error ok
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = e7aa38e3
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x3c4c807d 175f179f - ab56939d 12017776 } / e7aa38e3, nego = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776}, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 3c4c807d 175f179f - ab56939d 12017776 }
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847092 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 stop timer. timer duration 0, reason 0.
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847092 reference count is not zero (1). Delaying deletion of SA
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847092 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847092 from peer entry 0xee3800
[May 22 22:58:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { fe5db3a0 71e58cc6 - 3120d7cb 3c34bf80 }
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 start timer. timer duration 30, reason 1.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  00000000: 3120 d7cb 3c34 bf80                      1 ..<4..
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  00000000: 5a16 ff94 5d40 4ed0                      Z...]@N.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea7c00 from freelist
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = e853c5de 9e4d3b58 ...
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = af85d0e3 16030f08 ...
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6240]
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5429]
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea8000 from freelist
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, remote = 1.1.1.1:500
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0} / 00000000, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 9f5f1678 87017e84 ...
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xfe5db3a0 71e58cc6 - 0x5a16ff94 5d404ed0 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xfe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 } / 00000000, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 stop timer. timer duration 30, reason 1.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 start timer. timer duration 0, reason 3.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847093 delete. curr ref count 1, del flags 0x3
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847093, ref cnt 1, status: Error ok
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0}, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { fe5db3a0 71e58cc6 - 5a16ff94 5d404ed0 }
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847093 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847093 stop timer. timer duration 0, reason 0.
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847093 (ref cnt 0), waiting_for_del 0x0
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:58:43][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { a889e18b 74ae2c03 - b104dfaa 8217b033 }
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 start timer. timer duration 30, reason 1.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  00000000: b104 dfaa 8217 b033                      .......3
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  00000000: 82c0 de52 dc99 913a                      ...R...:
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea8800 from freelist
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d402b224 063dd004 ...
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = e1a52b1e 8011ca17 ...
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6097]
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5408]
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet ea8c00 from freelist
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a} / 00000000, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = e63d08df e98ac025 ...
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xa889e18b 74ae2c03 - 0x82c0de52 dc99913a } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xa889e18b 74ae2c03 - 82c0de52 dc99913a } / 00000000, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 stop timer. timer duration 30, reason 1.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 start timer. timer duration 0, reason 3.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847094 delete. curr ref count 1, del flags 0x3
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847094, ref cnt 1, status: Error ok
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a}, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { a889e18b 74ae2c03 - 82c0de52 dc99913a }
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847094 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847094 stop timer. timer duration 0, reason 0.
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847094 (ref cnt 0), waiting_for_del 0x0
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:59:18][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 start timer. timer duration 30, reason 1.
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847095 in peer entry 0xee3800
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { f36de9a5 d88590f1 - 00000000 00000000 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { f36de9a5 d88590f1 - 00000000 00000000}, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - 00000000 00000000 } / 00000000, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { f36de9a5 d88590f1 - 00000000 00000000 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { f36de9a5 d88590f1 - 00000000 00000000 } -> { ... - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6168]
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d5ccd74a 3bfba150 ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 76d5342f a18be05b ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5612]
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067} / 00000000, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 56c0cf58 8896d889 ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xf36de9a5 d88590f1 - 0xd5aafd4e 2bca6067 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 stop timer. timer duration 30, reason 1.
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 start timer. timer duration 0, reason 3.
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x1d1269c0, protocol=0) entry to the spi table
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x65861acc, protocol=0) entry to the spi table
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 5b1c7068
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6182]
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847095 sa-cfg Colo_VPN
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / 5b1c7068, nego = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = b88262ee d20d034c ...
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847095 delete. curr ref count 2, del flags 0x2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847095, ref cnt 2, status: Error ok
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = c8b3accd
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf36de9a5 d88590f1 - d5aafd4e 2bca6067 } / c8b3accd, nego = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067}, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { f36de9a5 d88590f1 - d5aafd4e 2bca6067 }
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847095 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 stop timer. timer duration 0, reason 0.
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847095 reference count is not zero (1). Delaying deletion of SA
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847095 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847095 from peer entry 0xee3800
[May 22 22:59:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f56e1251 eaac6de2 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { f56e1251 eaac6de2 - ed89276d c90ccc71 }
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 start timer. timer duration 30, reason 1.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  00000000: ed89 276d c90c cc71                      ..'m...q
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  00000000: d861 4ce7 42f8 a970                      .aL.B..p
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2c000 from freelist
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 256356a7 f30c2c15 ...
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 8ecdfba8 90f847ba ...
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6094]
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [6196]
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2c400 from freelist
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, remote = 1.1.1.1:500
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970} / 00000000, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 75f9b052 2f895a0a ...
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0xf56e1251 eaac6de2 - 0xd8614ce7 42f8a970 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0xf56e1251 eaac6de2 - d8614ce7 42f8a970 } / 00000000, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 stop timer. timer duration 30, reason 1.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 start timer. timer duration 0, reason 3.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847096 delete. curr ref count 1, del flags 0x3
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847096, ref cnt 1, status: Error ok
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970}, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { f56e1251 eaac6de2 - d8614ce7 42f8a970 }
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847096 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847096 stop timer. timer duration 0, reason 0.
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847096 (ref cnt 0), waiting_for_del 0x0
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 22:59:55][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 start timer. timer duration 30, reason 1.
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847097 in peer entry 0xee3800
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 19c1e16d dd74b9b9 - 00000000 00000000 }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 19c1e16d dd74b9b9 - 00000000 00000000}, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 00000000 00000000 } / 00000000, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 19c1e16d dd74b9b9 - 00000000 00000000 }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 19c1e16d dd74b9b9 - 00000000 00000000 } -> { ... - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6139]
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = b77596f3 8643257b ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = 034b164f 1668e949 ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5324]
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 00000000, remote = 1.1.1.1:500
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b} / 00000000, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 9142fb83 28a809c7 ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x19c1e16d dd74b9b9 - 0x2e2a4137 81d10f2b } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 stop timer. timer duration 30, reason 1.
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 start timer. timer duration 0, reason 3.
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x70c0b0f, protocol=0) entry to the spi table
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x2df946a1, protocol=0) entry to the spi table
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = 2b93b101
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6096]
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847097 sa-cfg Colo_VPN
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / 2b93b101, nego = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 35d70b37 750ff2dd ...
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847097 delete. curr ref count 2, del flags 0x2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847097, ref cnt 2, status: Error ok
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = c923872a
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x19c1e16d dd74b9b9 - 2e2a4137 81d10f2b } / c923872a, nego = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b}, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 19c1e16d dd74b9b9 - 2e2a4137 81d10f2b }
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847097 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 stop timer. timer duration 0, reason 0.
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847097 reference count is not zero (1). Delaying deletion of SA
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847097 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847097 from peer entry 0xee3800
[May 22 23:00:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 4e75e70a c12ab1c7 - 04633986 1808f5be }
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 start timer. timer duration 30, reason 1.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  00000000: 0463 3986 1808 f5be                      .c9.....
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  00000000: cf42 f52c 16ee 1c42                      .B.,...B
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2d800 from freelist
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, remote = 1.1.1.1:500
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 9126ec06 fee45e46 ...
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = f5319a54 17803b8e ...
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6284]
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5465]
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2dc00 from freelist
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, remote = 1.1.1.1:500
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42} / 00000000, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 10028f66 729ba0ee ...
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x4e75e70a c12ab1c7 - 0xcf42f52c 16ee1c42 } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x4e75e70a c12ab1c7 - cf42f52c 16ee1c42 } / 00000000, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 stop timer. timer duration 30, reason 1.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 start timer. timer duration 0, reason 3.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847098 delete. curr ref count 1, del flags 0x3
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847098, ref cnt 1, status: Error ok
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42}, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 4e75e70a c12ab1c7 - cf42f52c 16ee1c42 }
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847098 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847098 stop timer. timer duration 0, reason 0.
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847098 (ref cnt 0), waiting_for_del 0x0
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 23:00:28][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 88245fff 590c6db7 - 00000000 00000000 } / 00000000, remote = 1.1.1.1:500
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are responder and this is initiators first packet
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 88245fff 590c6db7 - a3322cd8 e6a3cd37 }
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_udp_callback_common: New SA
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 start timer. timer duration 30, reason 1.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Updating responder IKE cookie
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: Original IKE cookie
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  00000000: a332 2cd8 e6a3 cd37                      .2,....7
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_isakmp_update_responder_cookie: New IKE cookie
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  00000000: 62be 219e 2528 677d                      b.!.%(g}
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_st_new_p1_connection_local_addresses: Accepting new Phase-1 negotiation: local=2.2.2.2:500, remote=1.1.1.1:500 (neg ee5800)
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/-1, exchange = 2, auth_method = any, Responder
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing 1 protocol(s)
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Comparing transforms of protocol 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Transform id 1 matches, comparing attributes
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing 6 input attributes against 6 policy attributes
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 0 against policy attribute 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 1 match
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 1 against policy attribute 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 2 match
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 4 match
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 3
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 4
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 5
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input and policy attributes of type 3 match
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 4 is life type/duration, ignoring
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Input attribute 5 is life type/duration, ignoring
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Attributes matched successfully
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_ikev1_attribute_check: Setting life in seconds to 28800 from policy
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_transform: Attributes match; selected input transform 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Protocols match
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_choose_v1_proposal: Selected transform id 1 for protocol 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ikev2_sav1_select: Proposals match
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Diffie-Hellman group number 2 selected
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_spd_select_sa_cb: Authentication method number 1 selected
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_isakmp_sa_reply: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation R (2)/1, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_proposal: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_values: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA R (4)
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 132
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2e400 from freelist
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } / 00000000, remote = 1.1.1.1:500
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = 09810e38 6b3e5ed6 ...
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = e6f84c2a 2fe6fb6e ...
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6144]
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG Colo_VPN by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv1  remote_port:500 ksa_cfg_remote_port=0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA R (4)/258, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_calc_skeyid: Calculating skeyid
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5397]
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = No Id -> 1.1.1.1:500, id = No Id
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE R (6)
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_allocate: Allocated packet e2e800 from freelist
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d } / 00000000, remote = 1.1.1.1:500
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 88245fff 590c6db7 - 62be219e 2528677d }
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d} / 00000000, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/-1, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = 18dc6279 ffe68499 ...
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = false
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_id: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_restart_packet: Start, restart packet SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE R (6)/256, exchange = 2, auth_method = pre shared key, Responder
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = false, local = true
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x88245fff 590c6db7 - 0x62be219e 2528677d } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Responder, cipher = 3de
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final R (8)
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x88245fff 590c6db7 - 62be219e 2528677d } / 00000000, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 68
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 stop timer. timer duration 30, reason 1.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 start timer. timer duration 0, reason 3.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 timer expiry. ref cnt 1, timer reason Defer delete timer expired (3), flags 0x230.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847099 delete. curr ref count 1, del flags 0x3
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_done_cb: For p1 sa index 7847099, ref cnt 1, status: Error ok
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d}, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 88245fff 590c6db7 - 62be219e 2528677d }
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847099 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847099 stop timer. timer duration 0, reason 0.
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847099 (ref cnt 0), waiting_for_del 0x0
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 23:01:06][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Triggering negotiation for Colo_VPN config block
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: lookup peer entry for gateway gw_Colo_VPN, local_port=500, remote_port=500
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_create_peer_entry: Created peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_fetch_or_create_peer_entry: Create peer entry 0xee3800 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw_Colo_VPN, VR id 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_callback: FOUND peer entry for gateway gw_Colo_VPN
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Initiating new P1 SA for gateway gw_Colo_VPN
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 start timer. timer duration 30, reason 1.
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Set p2_ed in sa_cfg=Colo_VPN
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_insert_p1sa_entry: Insert p1 sa 7847100 in peer entry 0xee3800
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors

[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_alloc: Allocated fallback negotiation ee5800
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_spd_notify_request: Sending Initial contact
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: Start, remote_name = 1.1.1.1:500, xchg = 2, flags = 00090000
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_allocate: Start, SA = { 216909ba 442354e5 - 00000000 00000000 }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_isakmp_sa: Start, remote = 1.1.1.1:500, initiator = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect: SA = { 216909ba 442354e5 - 00000000 00000000}, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start sa negotiation I (1)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_sa_proposal: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_vendor_ids: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM SA I (3)
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - 00000000 00000000 } / 00000000, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 144
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - 00000000 00000000}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Not found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find_half: Found half SA = { 216909ba 442354e5 - 00000000 00000000 }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: We are intiator, first response packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_upgrade: Start, SA = { 216909ba 442354e5 - 00000000 00000000 } -> { ... - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_sa: Found 1 proposals
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_payload_t: Start, # trans = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM SA I (3)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_sa_value: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..28] = 9436e8d6 7174ef9a ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..16] = afcad713 68a1f1c9 ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_vid: VID[0..20] = 48656172 74426561 ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_ke: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6320]
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_nonce: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_isakmp_nonce_data_len: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM KE I (5)
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 180
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM KE I (5)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_nonce: Start, nonce[0..32] = d95abcf9 e5a2fd76 ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_ke: Ke[0..128] = a1afbbf0 bdd582d9 ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cr: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_id: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_hash: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_compute_synch: Requested DH group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Peer public key has length 128

[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [5308]
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_final_async: Computed DH using hardware
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_find_pre_shared_key: Find pre shared key key for 2.2.2.2:500, id = ipv4(any:0,[0..3]=2.2.2.2) -> 1.1.1.1:500, id = No Id
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_find_pre_shared_key: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = true
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_status_n: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM final I (7)
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 92
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_get_sa: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f } / 00000000, remote = 1.1.1.1:500
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_find: Found SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f} / 00000000, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_decode_packet: Decrypting packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = MM final I (7)/-1, exchange = 2, auth_method = pre shared key, Initiator
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_encrypt: Check that packet was encrypted succeeded
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_id: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_hash: Start, hash[0..20] = a68929d1 35cb922f ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_calc_mac: Start, initiator = true, local = false
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_cert: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_i_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_wait_done: Marking for waiting for done
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_all_done: MESSAGE: Phase 1 { 0x216909ba 442354e5 - 0xe6ff0043 1ad96c6f } / 00000000, version = 1.0, xchg = Identity protect, auth_method = Pre shared keys, Initiator, cipher = 3de
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = MM done I (9)
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_notify: Connected, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_process_packet: No output packet, returning
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  kmd_ipaddr2ikeid: ipaddr = 1.1.1.1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_id_validate id NOT matched.
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 stop timer. timer duration 30, reason 1.
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 start timer. timer duration 0, reason 3.
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x3c87e713, protocol=0) entry to the spi table
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Added (spi=0x3fe4d380, protocol=0) entry to the spi table
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv1 
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: Start, remote_name = :500, flags = 00010000
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 0, max 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_connect_ipsec: SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_qm_negotiation: Start, initiator = 1, message_id = baca2511
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: Current state = Start QM I (14)/-1, exchange = 32, auth_method = phase1, Initiator
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_hash_1: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_sa_proposals: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_nonce: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_qm_nonce_data_len: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ke: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group type dl-modp
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group size 1024
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_get_group: DH Group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate_sync: Requested DH group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_dh_generate: Generated DH keys using hardware for DH group 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [6363]
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_qm_optional_ids: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_qm_optional_id: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_private: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Construction NHTB payload for  local:2.2.2.2, remote:1.1.1.1 IKEv1 P1 SA index 7847100 sa-cfg Colo_VPN
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Inside iked_get_primary_addr_by_intf_name... AF = 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  No address found for interface  st0.0 family inet

[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_get_interface_primary_ip_by_family:Can Not find family for tunnel interface st0.0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_nhtb_get_tunnel_ip:Can Not get primary IP for tunnel interface st0.0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Could not get local tunnel ip address. Not sending NHTB notify payload for sa-cfg Colo_VPN
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_policy_reply_private_payload_out: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_st_o_encrypt: Marking encryption for packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_state_step: All done, new state = QM HASH SA I (16)
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / baca2511, nego = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_finalize_qm_hash_1: Hash[0..20] = 878a16d9 8112bb55 ...
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 292
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 0, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 timer expiry. ref cnt 2, timer reason Defer delete timer expired (3), flags 0x30.
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  Initiate IKE P1 SA 7847100 delete. curr ref count 2, del flags 0x2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_ike_sa_delete_notify_done_cb: For p1 sa index 7847100, ref cnt 2, status: Error ok
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Start, expire SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_alloc_negotiation: Found slot 1, max 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Created random message id = cfbe3c7f
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Start, SA = { 0x216909ba 442354e5 - e6ff0043 1ad96c6f } / cfbe3c7f, nego = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Encrypting packet
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_encode_packet: Final length = 84
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_expire_callback: Sending notification to 1.1.1.1:500
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_send_packet: Start, send SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 1, dst = 1.1.1.1:500,  routing table id = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_info: Start, nego = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_remove_callback: Start, delete SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_delete_negotiation: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f}, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: Deleting tunnel_id: 0 from IKE tunnel table
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ssh_ike_tunnel_table_entry_delete: The tunnel id: 0 doesn't exist in IKE tunnel table
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_sa_delete: Start, SA = { 216909ba 442354e5 - e6ff0043 1ad96c6f }
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_qm: Start, nego = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = 0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Fallback negotiation ee5800 has still 1 references
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 4
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation_isakmp: Start, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_negotiation: Start, nego = -1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fb_isakmp_sa_freed: Received notification from the ISAKMP library that the IKE SA ee1400 is freed
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  IKE SA delete called for p1 sa 7847100 (ref cnt 2) local:2.2.2.2, remote:1.1.1.1, IKEv1 
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 stop timer. timer duration 0, reason 0.
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  P1 SA 7847100 reference count is not zero (1). Delaying deletion of SA
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 1
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_id_payload: Start, id type = 2
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ike_free_sa: Start
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  ikev2_fallback_negotiation_free: Freeing fallback negotiation ee5800
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_pm_p1_sa_destroy:  p1 sa 7847100 (ref cnt 0), waiting_for_del 0xe729c0
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_remove_p1sa_entry: Remove p1 sa 7847100 from peer entry 0xee3800
[May 22 23:01:25][2.2.2.2 <-> 1.1.1.1]  iked_peer_entry_patricia_delete:Peer entry 0xee3800 deleted for local 2.2.2.2:500 and remote 1.1.1.1:500

Finally, the iKE debug from the SSG

## 2016-05-22 22:00:18 : IKE<0.0.0.0        >   protocol matched expected<0>.
## 2016-05-22 22:00:18 : IKE<0.0.0.0        >   port matched expect l:<0>, r<0>.
## 2016-05-22 22:00:18 : ipvx = IPV4
## 2016-05-22 22:00:18 : rcv_local_addr = 172.16.10.0, rcv_local_mask = 255.255.255.0, p_rcv_local_real = 172.16.10.0 
## 2016-05-22 22:00:18 : rcv_remote_addr = 172.16.72.0, rcv_remote_mask = 255.255.255.0, p_rcv_remote_real = 172.16.72.0 
## 2016-05-22 22:00:18 : ike_p2_id->local_ip = 172.16.10.0, cfg_local_mask = 255.255.255.0, p_cfg_local_real = 172.16.10.0 
## 2016-05-22 22:00:18 : ike_p2_id->remote_ip = 172.16.72.0, cfg_remote_mask = 255.255.255.0, p_cfg_remote_real = 172.16.72.0 
## 2016-05-22 22:00:18 : IKE<2.2.2.2> Proxy ID match: Located matching Phase 2 SA <16>.
## 2016-05-22 22:00:18 : IKE<2.2.2.2> resolve concurrent session for peer. exist<3c623f10> drop new<2e5342cc>.
## 2016-05-22 22:00:18 : IKE<2.2.2.2> oakley_process_quick_mode():exit
## 2016-05-22 22:00:18 : IKE<2.2.2.2>   Delete conn entry...
## 2016-05-22 22:00:18 : IKE<2.2.2.2>  ...found conn entry(2e5342cc) 
## 2016-05-22 22:00:18 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> 
## 2016-05-22 22:00:18 : IKE<2.2.2.2> Catcher: received 84 bytes from socket.
## 2016-05-22 22:00:18 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
## 2016-05-22 22:00:18 : IKE<2.2.2.2> Catcher: get 84 bytes. src port 500
## 2016-05-22 22:00:18 : IKE<0.0.0.0        >   ISAKMP msg: len 84, nxp 8[HASH], exch 5[INFO], flag 01  E
## 2016-05-22 22:00:18 : IKE<2.2.2.2> Create conn entry...
## 2016-05-22 22:00:18 : IKE<2.2.2.2>   ...done(new 85f84bad)
## 2016-05-22 22:00:18 : IKE<2.2.2.2> Decrypting payload (length 56)
## 2016-05-22 22:00:18 : IKE<2.2.2.2   > Recv*: [HASH] [DELETE]
## 2016-05-22 22:00:18 : IKE<2.2.2.2> Process [DELETE]:
## 2016-05-22 22:00:18 : IKE<2.2.2.2> DELETE payload received, deleting Phase-1 SA
## 2016-05-22 22:00:18 : IKE<2.2.2.2>   Delete conn entry...
## 2016-05-22 22:00:18 : IKE<2.2.2.2>  ...found conn entry(85f84bad) 
## 2016-05-22 22:00:18 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f>
## 2016-05-22 22:00:21 : IKE<0.0.0.0        >   IKE: phase-2 packet re-trans timer expired
## 2016-05-22 22:00:21 : IKE<2.2.2.2> phase-2 packet re-trans timer expired.
## 2016-05-22 22:00:21 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
## 2016-05-22 22:00:21 : IKE<2.2.2.2> Send Phase 2 packet (len=340)
## 2016-05-22 22:00:25 : IKE<0.0.0.0        >   IKE: phase-2 packet re-trans timer expired
## 2016-05-22 22:00:25 : IKE<2.2.2.2> phase-2 packet re-trans timer expired.
## 2016-05-22 22:00:25 : IKE<2.2.2.2>   Delete conn entry...
## 2016-05-22 22:00:25 : IKE<2.2.2.2>  ...found conn entry(3c623f10) 
## 2016-05-22 22:00:25 : IKE<2.2.2.2> XAuth for peer deactivated due to P2 retry timeout.
## 2016-05-22 22:00:26 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN
## 2016-05-22 22:00:26 : IKE<2.2.2.2>   ** link ready return 8
## 2016-05-22 22:00:26 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8
## 2016-05-22 22:00:26 : IKE<2.2.2.2>   local_if is bgroup0/0
## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv kernel msg IDX-1, TYPE-5 ****** 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> sa orig index<1>, peer_id<3>.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> isadb_get_entry_by_peer_and_local_if_port_p2sa isadb get entry by peer/local ip and port
## 2016-05-22 22:00:33 : IKE<2.2.2.2>   create sa: 1.1.1.1->2.2.2.2
## 2016-05-22 22:00:33 : getProfileFromP1Proposal-> 
## 2016-05-22 22:00:33 : find profile[0]=<00000005 00000002 00000001 00000002> for p1 proposal (id 5), xauth(0) 
## 2016-05-22 22:00:33 : init p1sa, pidt = 0x0 
## 2016-05-22 22:00:33 : change peer identity for p1 sa, pidt = 0x0
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   peer_identity_create_with_uid: uid<0>
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   create peer identity 0x6990b54
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   peer_identity_add_to_peer: num entry before add <1>
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   peer_identity_add_to_peer: num entry after add <2>
## 2016-05-22 22:00:33 : peer identity 6990b54 created.
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   EDIPI disabled
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1: Initiated negotiation in main mode. <1.1.1.1 => 2.2.2.2> 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct ISAKMP header.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Msg header built (next payload #1) 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [SA] for ISAKMP 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> auth(1)<PRESHRD>, encr(5)<3DES>, hash(2)<SHA>, group(2) 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> xauth attribute: disabled 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> lifetime/lifesize (28800/0)
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   set_phase1_transform, dh_group(2).
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct NetScreen [VID] 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct custom [VID] 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct custom [VID]
## 2016-05-22 22:00:33 : IKE<2.2.2.2   > Xmit : [SA] [VID] [VID] [VID]
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Send Phase 1 packet (len=156) 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 2 task added 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> ike packet, len 160, action 0 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Catcher: received 132 bytes from socket.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Catcher: get 132 bytes. src port 500
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   ISAKMP msg: len 132, nxp 1[SA], exch 2[MM], flag 00
## 2016-05-22 22:00:33 : IKE<2.2.2.2   > Recv : [SA] [VID] [VID]
## 2016-05-22 22:00:33 : IKE<0.0.0.0        >   extract payload (104):
## 2016-05-22 22:00:33 : IKE<2.2.2.2> MM in state OAK_MM_NO_STATE.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [VID]:
## 2016-05-22 22:00:33 : IKE<2.2.2.2   >   Vendor ID:
## 2016-05-22 22:00:33 : af ca d7 13 68 a1 f1 c9  6b 86 96 fc 77 57 01 00 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [VID]:
## 2016-05-22 22:00:33 : IKE<2.2.2.2   >   Vendor ID:
## 2016-05-22 22:00:33 : 69 93 69 22 87 41 c6 d4  ca 09 4c 93 e2 42 c9 de 
## 2016-05-22 22:00:33 : 19 e7 b7 c6 00 00 00 05  00 00 05 00 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> peer is an NetScreen box, model=NetScreen-204, ver=5.00 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Process [SA]:
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Proposal received: xauthflag 0 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> auth(1)<PRESHRD>, encr(5)<3DES>, hash(2)<SHA>, group(2) 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> xauth attribute: disabled 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1 proposal [0] selected.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> SA Life Type = seconds 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> SA lifetime (TV) = 28800 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> DH_BG_consume OK. p1 resp 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Phase 1 MM Initiator constructing 3rd message.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct ISAKMP header.
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Msg header built (next payload #4) 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [KE] for ISAKMP 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Construct [NONCE]
## 2016-05-22 22:00:33 : IKE<2.2.2.2   > Xmit : [KE] [NONCE]
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> Send Phase 1 packet (len=196) 
## 2016-05-22 22:00:33 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<1/800207> 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> nhtb_list_update_status: vpn Dallas_VPN
## 2016-05-22 22:00:34 : IKE<2.2.2.2>   ** link ready return 8
## 2016-05-22 22:00:34 : IKE<2.2.2.2> sa_link_status_for_tunl_ifp: saidx 1, preliminary status 8
## 2016-05-22 22:00:34 : IKE<2.2.2.2>   local_if is bgroup0/0
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ike packet, len 208, action 0 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: received 180 bytes from socket.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: get 180 bytes. src port 500
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   ISAKMP msg: len 180, nxp 4[KE], exch 2[MM], flag 00
## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Recv : [KE] [NONCE]
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   extract payload (152):
## 2016-05-22 22:00:34 : IKE<2.2.2.2> MM in state OAK_MM_SA_SETUP.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [KE]:
## 2016-05-22 22:00:34 : IKE<2.2.2.2> processing ISA_KE in phase 1.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase1: his_DH_pub_len is 128 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [NONCE]:
## 2016-05-22 22:00:34 : IKE<2.2.2.2> processing NONCE in phase 1.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> gen_skeyid() 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> gen_skeyid: returning 0 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 1 MM Initiator constructing 5th message.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct ISAKMP header.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Msg header built (next payload #5) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for ISAKMP 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Use Maverick_Colo as IKE p1 ID.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [HASH] 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Use Maverick_Colo as IKE p1 ID.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID, len=17, type=2, pro=17, port=500, 
## 2016-05-22 22:00:34 : IKE<2.2.2.2>
## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Xmit*: [ID] [HASH]
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Encrypt P1 payload (len 73) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Send Phase 1 packet (len=76) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<2/80120f> 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ike packet, len 96, action 0 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: received 68 bytes from socket.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ****** Recv packet if <bgroup0/0> of vsys <Root> ****** 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Catcher: get 68 bytes. src port 500
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   ISAKMP msg: len 68, nxp 5[ID], exch 2[MM], flag 01  E
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Decrypting payload (length 40)
## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Recv*: [ID] [HASH]
## 2016-05-22 22:00:34 : valid id checking, id type:IP Address, len:12.
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   extract payload (40):
## 2016-05-22 22:00:34 : valid id checking, id type:IP Address, len:12.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> MM in state OAK_MM_KEY_EXCH.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [ID]:
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID received: type=ID_IPV4_ADDR, ip = 2.2.2.2, port=0, protocol=0 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer gateway entry has no peer id configured 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID processed. return 0. sa->p1_state = 2.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Process [HASH]:
## 2016-05-22 22:00:34 : IKE<2.2.2.2> ID, len=8, type=1, pro=0, port=0, 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> addr=2.2.2.2 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> completing Phase 1 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> sa_pidt = 6990b54 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> found existing peer identity 698ed98 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer_identity_unregister_p1_sa.
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   delete peer identity 0x6990b54
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   peer_identity_remove_from_peer: num entry before remove <2>
## 2016-05-22 22:00:34 : IKE<2.2.2.2> peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> phase 1 sa timeout value reduced <28784> to <30>.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 1: Completed Main mode negotiation with a <28800>-second lifetime.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase 2: Initiated Quick Mode negotiation.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase-2: start quick mode negotiation 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Phase-2: no change in Modecfg IPv4 address for tunnel ifp.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Create conn entry...
## 2016-05-22 22:00:34 : IKE<2.2.2.2>   ...done(new f3a04cd6)
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator not set commit bit on 1st QM.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> DH_BG_consume OK. p2 init
## 2016-05-22 22:00:34 : IKE<0.0.0.0        >   add sa list for msg id <f3a04cd6>
## 2016-05-22 22:00:34 : IKE<2.2.2.2> get_unique_spi 0, 2589482087, 9a585c67 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> 0,0/0(0)/spi(9a585c67)/keylen(0) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct ISAKMP header.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Msg header built (next payload #8) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [HASH] 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [SA] for IPSEC 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Set IPSEC SA attrs: lifetime(3600/0) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> atts<00000003 00000000 00000003 00000002 00000001 00000002> 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> proto(3)<ESP>, esp(3)<ESP_3DES>, auth(2)<SHA>, encap(1)<TUNNEL>, group(2) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Before NAT-T attr unmap: private tunnel = 1.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> After NAT-T attr unmap: private tunnel = 1.
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Policy have separate SA. Use P2 ID from policy sa (16).
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator P2 ID built: ....
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Responder P2 ID built: ....
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [NONCE] for IPSec 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [KE] for PFS 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for Phase 2 
## 2016-05-22 22:00:34 : id payload constructed. type(4),ip(172.16.10.0),mask(255.255.255.0), prot(0), port(0) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [ID] for Phase 2 
## 2016-05-22 22:00:34 : id payload constructed. type(4),ip(172.16.72.0),mask(255.255.255.0), prot(0), port(0) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> construct NOTIFY_NS_NHTB_INFORM: attr INTERNAL_IPx_ADDRESS, value 172.16.10.254, datalen 12 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Construct [NOTIF] (NOTIFY_NS_NHTB_INFORM) for IPSEC 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> construct QM HASH
## 2016-05-22 22:00:34 : IKE<2.2.2.2   > Xmit*: [HASH] [SA] [NONCE] [KE] [ID] [ID] [NOTIF]
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Encrypt P2 payload (len 332) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Initiator sending IPv4 IP 2.2.2.2/port 500 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> Send Phase 2 packet (len=340) 
## 2016-05-22 22:00:34 : IKE<2.2.2.2> IKE msg done: PKI state<0> IKE state<3/80122f> 
## 2016-05-22 22:00:35 : reap_db. deleting p1sa 6998424 
## 2016-05-22 22:00:35 : terminate_SA: trying to delete SA cause: 0 cond: c2 
## 2016-05-22 22:00:35 : IKE<2.2.2.2> xauth_cleanup() 
## 2016-05-22 22:00:35 : IKE<2.2.2.2> Done cleaning up IKE Phase 1 SA 
## 2016-05-22 22:00:35 : peer_identity_unregister_p1_sa.
## 2016-05-22 22:00:35 : reap_db. deleting p1sa 6998d6c 
## 2016-05-22 22:00:35 : terminate_SA: trying to delete SA cause: 0 cond: 2 
## 2016-05-22 22:00:35 : peer_identity_unregister_p1_sa.
## 2016-05-22 22:00:35 : IKE<0.0.0.0        >   delete peer identity 0x698fb1c
## 2016-05-22 22:00:35 : IKE<0.0.0.0        >   peer_identity_remove_from_peer: num entry before remove <2>
## 2016-05-22 22:00:35 : peer_idt.c peer_identity_unregister_p1_sa 686: pidt deleted.
## 2016-05-22 22:00:35 : X509_free <03dba0d8>.
## 2016-05-22 22:00:35 : X509_free: CN=0185042012000312,CN=system generated,CN=self-signed, 
## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
## 2016-05-22 22:00:35 : build_ike_pki_mail: key_type=0 
## 2016-05-22 22:00:35 : processPkiRequest cmd=0 
## 2016-05-22 22:00:35 : certReqHandler: req=7607d3c task=205e77c 
## 2016-05-22 22:00:35 : build_ike_pki_mail: key_type=0 
## 2016-05-22 22:00:35 : pki mail received.
## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
## 2016-05-22 22:00:35 : X509_PUBKEY_get key->pkey->reference 2 
## 2016-05-22 22:00:35 : EVP_PKEY_free reference 1, i 1 
## 2016-05-22 22:00:35 : cert into stack: CN=0185042012000312,CN=system generated,CN=self-signed, 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : buffer_write: <86> 
## 2016-05-22 22:00:35 : bio_write, after bwrite. <86> 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : buffer_write: <574> 
## 2016-05-22 22:00:35 : bio_write, after bwrite. <574> 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : buffer_write: <9> 
## 2016-05-22 22:00:35 : bio_write, after bwrite. <9> 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : bio_write, after bwrite. <669> 
## 2016-05-22 22:00:35 : BIO_copy_next_retry: b<02b2bb84> 
## 2016-05-22 22:00:35 : BIO_copy_next_retry: b next<02b29b1c> 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : buffer_write: <6> 
## 2016-05-22 22:00:35 : bio_write, after bwrite. <6> 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : buffer_write: <37> 
## 2016-05-22 22:00:35 : bio_write, after bwrite. <37> 
## 2016-05-22 22:00:35 : bio_write, before bwrite.
## 2016-05-22 22:00:35 : bio_write, after bwrite. <43> 
## 2016-05-22 22:00:35 : BIO_copy_next_retry: b<02b2bb84> 
## 2016-05-22 22:00:35 : BIO_copy_next_retry: b next<02b29b1c>

Show security IKE Security-assoc is blank


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>