Below is a snip from the kmd debug log for the VPN in question. All the other IPsec VPNs are fine and work well.
Dec 10 16:39:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 1 references
Dec 10 16:39:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c37000
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / c1e984ab, remote = 189.XXX.XXX.XXX:500
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 5, max 6
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_qm_negotiation: Start, initiator = 0, message_id = c1e984ab
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c37000
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_new_connection_phase_qm: Accepting new Quick-Mode negotiation: local=<none>:500, remote=189.XXX.XXX.XXX:500 (neg c37000)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / c1e984ab, nego = 5
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Found 1 proposals
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_t: Start, # trans = 1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_1: Start, hash[0..20] = a5e40d6f f6678572 ...
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_nonce: Nonce[0..20] = 04a441ae 33576d31 ...
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x4ccf2559, protocol=0) entry to the spi table
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0xd218ce6d, protocol=0) entry to the spi table
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Selecting IPSec SA payload for local:198.XXX.XXX.XXX remote:@IKEv8358944
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed IPSec SA payload is SA()
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed traffic selectors is his local: ipv4(icmp,10.200.0.0-10.200.255.255) his remote: ipv4(icmp,172.16.61.0-172.16.61.255)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured traffic selectors is local: ipv4(172.16.61.0-172.16.61.255) Remote: ipv4(10.200.0.0-10.200.255.255)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX by ip address for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX for phase 2 for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured IPSec SA payload is SA()
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing 1 protocol(s)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing transforms of protocol 3
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Transform id 3 matches, comparing attributes
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing 4 input attributes against 4 policy attributes
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 0 is life type/duration, ignoring
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 1 is life type/duration, ignoring
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 2
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 3
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input and policy attributes of type 5 match
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Attributes matched successfully
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Setting life in seconds to 3600 from policy
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Attributes match; selected input transform 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Protocols match
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected transform id 3 for protocol 3
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Proposals match
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 2 references
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 5
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/5, exchange = 32, auth_method = any, Responder
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_hash_2: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_sa_values: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_nonce: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_nonce_data_len: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ke: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ids: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_local_id: Using ipv4_subnet(icmp:0,[0..7]=172.16.61.0/24) as local QM identity
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_local_id: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_remote_id: Using ipv4_subnet(icmp:0,[0..7]=10.200.0.0/16) as remote QM identity
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_remote_id: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_responder_lifetime_n: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_private: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Construction NHTB payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 P1 SA index 7451223 sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_private_payload_out: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_encrypt: Marking encryption for packet
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM HASH SA R (17)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / c1e984ab, nego = 5
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 156
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 5, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_allocate: Allocated packet bd4c00 from freelist
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / c1e984ab, remote = 189.XXX.XXX.XXX:500
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / c1e984ab, nego = 5
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM HASH SA R (17)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_3: Start, hash[0..20] = e95fd493 3e296ae3 ...
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, No PFS, group = 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 0, tunnel, hmac-sha1-96, Extended seq not used, key len = 0, key rounds = 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_sa_install: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 for SA-CFG ipsec-XXXXX-XXXXX
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x4ccf2559, proto=ESP pair_index = 3
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_nhtb_update_on_sa_create: Interface st0.15 is P2P for sa_cfg ipsec-XXXXX-XXXXX. Thus ignoring NHTB notification message
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x4ccf2559, protocol=ESP dst=198.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x7201f5d4, proto=ESP pair_index = 3
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x7201f5d4, protocol=ESP dst=189.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Hardlife timer started for inbound ipsec-XXXXX-XXXXX with 3600 seconds/0 kilobytes
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Softlife timer started for inbound ipsec-XXXXX-XXXXX with 3035 seconds/0 kilobytes
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] The SA queue in the ipsec-XXXXX-XXXXX SA config block is more than max queue size. Deleting the old 2 SAs from the queue
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x63e88397, proto=ESP
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x63e88397, protocol=ESP dst=198.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c40000
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Start, remote_name = :500, flags = 00010000
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: Start, remote_name = :500, flags = 00010000
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find_ip_port: Remote = all:500, Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 6, max 7
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Created random message id = 7930b517
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 6
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 7930b517, nego = 6
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 68
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Sending delete to (null)null)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 6, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 6
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_info: Start, nego = 6
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 6
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ike_info_done_callback: P1 SA 7451223 (ref 3). pending req? 0, status: Error ok
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c40000
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_send_ipsec_delete_notification: Sent delete notification for spi=63e88397, proto=ESP
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131078;SPI-In = 0x63e88397
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted SA pair for tunnel = 131078 with SPI-In = 0x63e88397 to kernel
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x63e88397, protocol=ESP) entry from the inbound sa spi hash table
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x43053c51, proto=ESP
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Out bound SA. Not sending notification
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x43053c51, protocol=ESP dst=189.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_sa_bundle
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ipsec-XXXXX-XXXXX : VPN Monitor Interval=0(0) Optimized=0(0)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle remote gateway: IP 189.XXX.XXX.XXX chosen
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle local gateway: IP 198.XXX.XXX.XXX chosen
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipsec_ipc_sa_pair
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Voyager ipsec SA BUNDLE-------------------
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA pair update request for:
Tunnel index: 131078
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Local Gateway address: 198.XXX.XXX.XXX
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Primary remote Gateway address: 189.XXX.XXX.XXX
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Backup remote Gateway State: Active
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Anti replay: counter-based enabled
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Window_size: 64
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Server Time: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer : Static
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Mode : Tunnel
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] VPN Type : route-based
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DF bit: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] local-if ifl idx: 79
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] tunnel-if ifl idx: 77
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DPD interval: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] policy id: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] NATT enabled: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Idle time: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Outbound install delay time: 1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IKED ID: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DIST ID: 0
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Incoming SA -------------------
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x4ccf2559 Protocol: 2
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Outgoing SA -------------------
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x7201f5d4 Protocol: 2
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131078;SPI-In = 0x4ccf2559
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added dependency on SA config blob with tunnelid = 131078
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Successfully added ipsec SA PAIR
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_is_anchoring_instance sa_dist_id=0, self_dist_id=255
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_wait_done: Marking for waiting for done
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM done R (19)
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 5
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IPSec negotiation done successfully for SA-CFG ipsec-XXXXX-XXXXX for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 1 references
Dec 10 16:39:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c37000
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 0
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM done R (19)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_done: Quick Mode negotiation done
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = Done (30)
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Connected, sending notify
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 0
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 0
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_qm: Start, nego = 0
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 0
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:40:57 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM done R (19)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_done: Quick Mode negotiation done
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = Done (30)
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Connected, sending notify
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_qm: Start, nego = 1
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 1
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:03 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM done R (19)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_done: Quick Mode negotiation done
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = Done (30)
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Connected, sending notify
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_qm: Start, nego = 2
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 2
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:41:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_allocate: Allocated packet bda000 from freelist
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 3
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM done R (19)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_done: Quick Mode negotiation done
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = Done (30)
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Connected, sending notify
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 3
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 3
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_qm: Start, nego = 3
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 3
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:05 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:06 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Triggering all tunnels
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM done R (19)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_done: Quick Mode negotiation done
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = Done (30)
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Connected, sending notify
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_qm: Start, nego = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:40 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 5
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM done R (19)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_done: Quick Mode negotiation done
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = Done (30)
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Connected, sending notify
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 5
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 5
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_qm: Start, nego = 5
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 5
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:42:43 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_id_payload: Start, id type = 4
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 9571cd43, remote = 189.XXX.XXX.XXX:500
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 0, max 6
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_qm_negotiation: Start, initiator = 0, message_id = 9571cd43
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c37000
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_new_connection_phase_qm: Accepting new Quick-Mode negotiation: local=<none>:500, remote=189.XXX.XXX.XXX:500 (neg c37000)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / 9571cd43, nego = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Found 1 proposals
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_t: Start, # trans = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_1: Start, hash[0..20] = 38944193 9654a90f ...
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_nonce: Nonce[0..20] = 94396c33 42d2017a ...
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x64996714, protocol=0) entry to the spi table
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x8d8ce6a1, protocol=0) entry to the spi table
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Selecting IPSec SA payload for local:198.XXX.XXX.XXX remote:@IKEv8358944
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed IPSec SA payload is SA()
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed traffic selectors is his local: ipv4(tcp,10.200.0.0-10.200.255.255) his remote: ipv4(tcp:2080,172.16.61.0-172.16.61.255)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured traffic selectors is local: ipv4(172.16.61.0-172.16.61.255) Remote: ipv4(10.200.0.0-10.200.255.255)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX by ip address for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX for phase 2 for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured IPSec SA payload is SA()
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing 1 protocol(s)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing transforms of protocol 3
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Transform id 3 matches, comparing attributes
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing 4 input attributes against 4 policy attributes
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 0 is life type/duration, ignoring
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 1 is life type/duration, ignoring
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 2
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 3
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input and policy attributes of type 5 match
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Attributes matched successfully
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Setting life in seconds to 3600 from policy
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Attributes match; selected input transform 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Protocols match
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected transform id 3 for protocol 3
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Proposals match
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 2 references
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/5, exchange = 32, auth_method = any, Responder
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_hash_2: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_sa_values: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_nonce: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_nonce_data_len: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ke: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ids: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_local_id: Using ipv4_subnet(tcp:2080,[0..7]=172.16.61.0/24) as local QM identity
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_local_id: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_remote_id: Using ipv4_subnet(tcp:0,[0..7]=10.200.0.0/16) as remote QM identity
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_remote_id: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_responder_lifetime_n: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_private: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Construction NHTB payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 P1 SA index 7451223 sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_private_payload_out: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_encrypt: Marking encryption for packet
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM HASH SA R (17)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 9571cd43, nego = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 156
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 0, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_allocate: Allocated packet bd0c00 from freelist
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 9571cd43, remote = 189.XXX.XXX.XXX:500
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / 9571cd43, nego = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM HASH SA R (17)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_3: Start, hash[0..20] = 905f4026 998ab793 ...
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, No PFS, group = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 0, tunnel, hmac-sha1-96, Extended seq not used, key len = 0, key rounds = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_sa_install: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 for SA-CFG ipsec-XXXXX-XXXXX
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x64996714, proto=ESP pair_index = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_nhtb_update_on_sa_create: Interface st0.15 is P2P for sa_cfg ipsec-XXXXX-XXXXX. Thus ignoring NHTB notification message
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x64996714, protocol=ESP dst=198.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x4ff8f55a, proto=ESP pair_index = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x4ff8f55a, protocol=ESP dst=189.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Hardlife timer started for inbound ipsec-XXXXX-XXXXX with 3600 seconds/0 kilobytes
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Softlife timer started for inbound ipsec-XXXXX-XXXXX with 3006 seconds/0 kilobytes
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] The SA queue in the ipsec-XXXXX-XXXXX SA config block is more than max queue size. Deleting the old 2 SAs from the queue
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x80ab2e64, proto=ESP
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x80ab2e64, protocol=ESP dst=198.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c40000
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Start, remote_name = :500, flags = 00010000
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: Start, remote_name = :500, flags = 00010000
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find_ip_port: Remote = all:500, Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 1, max 6
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Created random message id = 2c7612b8
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 2c7612b8, nego = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 68
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Sending delete to (null)null)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_info: Start, nego = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ike_info_done_callback: P1 SA 7451223 (ref 3). pending req? 0, status: Error ok
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c40000
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_send_ipsec_delete_notification: Sent delete notification for spi=80ab2e64, proto=ESP
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131078;SPI-In = 0x80ab2e64
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted SA pair for tunnel = 131078 with SPI-In = 0x80ab2e64 to kernel
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x80ab2e64, protocol=ESP) entry from the inbound sa spi hash table
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x9e18ed4b, proto=ESP
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Out bound SA. Not sending notification
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x9e18ed4b, protocol=ESP dst=189.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_sa_bundle
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ipsec-XXXXX-XXXXX : VPN Monitor Interval=0(0) Optimized=0(0)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle remote gateway: IP 189.XXX.XXX.XXX chosen
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle local gateway: IP 198.XXX.XXX.XXX chosen
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipsec_ipc_sa_pair
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Voyager ipsec SA BUNDLE-------------------
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA pair update request for:
Tunnel index: 131078
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Local Gateway address: 198.XXX.XXX.XXX
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Primary remote Gateway address: 189.XXX.XXX.XXX
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Backup remote Gateway State: Active
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Anti replay: counter-based enabled
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Window_size: 64
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Server Time: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer : Static
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Mode : Tunnel
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] VPN Type : route-based
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DF bit: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] local-if ifl idx: 79
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] tunnel-if ifl idx: 77
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DPD interval: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] policy id: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] NATT enabled: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Idle time: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Outbound install delay time: 1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IKED ID: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DIST ID: 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Incoming SA -------------------
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x64996714 Protocol: 2
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Outgoing SA -------------------
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x4ff8f55a Protocol: 2
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131078;SPI-In = 0x64996714
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added dependency on SA config blob with tunnelid = 131078
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Successfully added ipsec SA PAIR
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_is_anchoring_instance sa_dist_id=0, self_dist_id=255
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_wait_done: Marking for waiting for done
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM done R (19)
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 0
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IPSec negotiation done successfully for SA-CFG ipsec-XXXXX-XXXXX for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 1 references
Dec 10 16:45:20 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c37000
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / b3423b82, remote = 189.XXX.XXX.XXX:500
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 1, max 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_qm_negotiation: Start, initiator = 0, message_id = b3423b82
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c37000
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_new_connection_phase_qm: Accepting new Quick-Mode negotiation: local=<none>:500, remote=189.XXX.XXX.XXX:500 (neg c37000)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / b3423b82, nego = 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Found 1 proposals
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_t: Start, # trans = 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_1: Start, hash[0..20] = 8acce987 ce7aa566 ...
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_nonce: Nonce[0..20] = 3041a35f 693f7bde ...
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x73728613, protocol=0) entry to the spi table
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0xdd109cc4, protocol=0) entry to the spi table
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Selecting IPSec SA payload for local:198.XXX.XXX.XXX remote:@IKEv8358944
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed IPSec SA payload is SA()
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed traffic selectors is his local: ipv4(tcp,10.200.0.0-10.200.255.255) his remote: ipv4(tcp:80,172.16.61.0-172.16.61.255)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured traffic selectors is local: ipv4(172.16.61.0-172.16.61.255) Remote: ipv4(10.200.0.0-10.200.255.255)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX by ip address for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX for phase 2 for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured IPSec SA payload is SA()
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing 1 protocol(s)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing transforms of protocol 3
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Transform id 3 matches, comparing attributes
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing 4 input attributes against 4 policy attributes
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 0 is life type/duration, ignoring
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 1 is life type/duration, ignoring
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 3
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input and policy attributes of type 5 match
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Attributes matched successfully
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Setting life in seconds to 3600 from policy
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Attributes match; selected input transform 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Protocols match
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected transform id 3 for protocol 3
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Proposals match
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 2 references
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/5, exchange = 32, auth_method = any, Responder
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_hash_2: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_sa_values: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_nonce: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_nonce_data_len: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ke: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ids: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_local_id: Using ipv4_subnet(tcp:80,[0..7]=172.16.61.0/24) as local QM identity
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_local_id: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_remote_id: Using ipv4_subnet(tcp:0,[0..7]=10.200.0.0/16) as remote QM identity
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_remote_id: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_responder_lifetime_n: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_private: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Construction NHTB payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 P1 SA index 7451223 sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_private_payload_out: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_encrypt: Marking encryption for packet
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM HASH SA R (17)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / b3423b82, nego = 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 156
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_allocate: Allocated packet bd1c00 from freelist
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / b3423b82, remote = 189.XXX.XXX.XXX:500
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / b3423b82, nego = 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM HASH SA R (17)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_3: Start, hash[0..20] = 85298250 e4eaa9a7 ...
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, No PFS, group = 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 0, tunnel, hmac-sha1-96, Extended seq not used, key len = 0, key rounds = 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_sa_install: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 for SA-CFG ipsec-XXXXX-XXXXX
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x73728613, proto=ESP pair_index = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_nhtb_update_on_sa_create: Interface st0.15 is P2P for sa_cfg ipsec-XXXXX-XXXXX. Thus ignoring NHTB notification message
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x73728613, protocol=ESP dst=198.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x24888dbd, proto=ESP pair_index = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x24888dbd, protocol=ESP dst=189.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Hardlife timer started for inbound ipsec-XXXXX-XXXXX with 3600 seconds/0 kilobytes
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Softlife timer started for inbound ipsec-XXXXX-XXXXX with 3004 seconds/0 kilobytes
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] The SA queue in the ipsec-XXXXX-XXXXX SA config block is more than max queue size. Deleting the old 2 SAs from the queue
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x4ccf2559, proto=ESP
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x4ccf2559, protocol=ESP dst=198.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c40000
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Start, remote_name = :500, flags = 00010000
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: Start, remote_name = :500, flags = 00010000
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find_ip_port: Remote = all:500, Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 2, max 3
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Created random message id = 3038cd82
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 3038cd82, nego = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 68
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Sending delete to (null)null)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_info: Start, nego = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ike_info_done_callback: P1 SA 7451223 (ref 3). pending req? 0, status: Error ok
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c40000
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_send_ipsec_delete_notification: Sent delete notification for spi=4ccf2559, proto=ESP
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131078;SPI-In = 0x4ccf2559
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted SA pair for tunnel = 131078 with SPI-In = 0x4ccf2559 to kernel
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x4ccf2559, protocol=ESP) entry from the inbound sa spi hash table
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x7201f5d4, proto=ESP
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Out bound SA. Not sending notification
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x7201f5d4, protocol=ESP dst=189.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_sa_bundle
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ipsec-XXXXX-XXXXX : VPN Monitor Interval=0(0) Optimized=0(0)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle remote gateway: IP 189.XXX.XXX.XXX chosen
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle local gateway: IP 198.XXX.XXX.XXX chosen
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipsec_ipc_sa_pair
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Voyager ipsec SA BUNDLE-------------------
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA pair update request for:
Tunnel index: 131078
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Local Gateway address: 198.XXX.XXX.XXX
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Primary remote Gateway address: 189.XXX.XXX.XXX
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Backup remote Gateway State: Active
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Anti replay: counter-based enabled
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Window_size: 64
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Server Time: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer : Static
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Mode : Tunnel
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] VPN Type : route-based
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DF bit: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] local-if ifl idx: 79
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] tunnel-if ifl idx: 77
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DPD interval: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] policy id: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] NATT enabled: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Idle time: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Outbound install delay time: 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IKED ID: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DIST ID: 0
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Incoming SA -------------------
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x73728613 Protocol: 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Outgoing SA -------------------
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x24888dbd Protocol: 2
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131078;SPI-In = 0x73728613
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added dependency on SA config blob with tunnelid = 131078
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Successfully added ipsec SA PAIR
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_is_anchoring_instance sa_dist_id=0, self_dist_id=255
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_wait_done: Marking for waiting for done
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM done R (19)
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IPSec negotiation done successfully for SA-CFG ipsec-XXXXX-XXXXX for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 1 references
Dec 10 16:45:26 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c37000
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 44823d8c, remote = 189.XXX.XXX.XXX:500
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 2, max 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_qm_negotiation: Start, initiator = 0, message_id = 44823d8c
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c37000
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_new_connection_phase_qm: Accepting new Quick-Mode negotiation: local=<none>:500, remote=189.XXX.XXX.XXX:500 (neg c37000)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / 44823d8c, nego = 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_sa: Found 1 proposals
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_payload_t: Start, # trans = 1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_1: Start, hash[0..20] = f4293e88 17b1a98d ...
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_nonce: Nonce[0..20] = 2c4c9d80 360b797a ...
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x54477855, protocol=0) entry to the spi table
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_spi_allocate: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x3636740c, protocol=0) entry to the spi table
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Selecting IPSec SA payload for local:198.XXX.XXX.XXX remote:@IKEv8358944
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed IPSec SA payload is SA()
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer's proposed traffic selectors is his local: ipv4(icmp,10.200.0.0-10.200.255.255) his remote: ipv4(icmp,172.16.61.0-172.16.61.255)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured traffic selectors is local: ipv4(172.16.61.0-172.16.61.255) Remote: ipv4(10.200.0.0-10.200.255.255)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX by ip address for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Found SA-CFG ipsec-XXXXX-XXXXX for phase 2 for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Configured IPSec SA payload is SA()
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv1 proposal.
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing 1 input proposals against 1 policy proposals
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Comparing input proposal #1 against policy proposal #1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing 1 protocol(s)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Comparing transforms of protocol 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing 1 input transforms against 1 policy transforms
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Comparing input transform #1 against policy transform #0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Transform id 3 matches, comparing attributes
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing 4 input attributes against 4 policy attributes
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 0 is life type/duration, ignoring
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input attribute 1 is life type/duration, ignoring
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 2 against policy attribute 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Comparing input attribute 3 against policy attribute 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Input and policy attributes of type 5 match
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Attributes matched successfully
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_ikev1_attribute_check: Setting life in seconds to 3600 from policy
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_transform: Attributes match; selected input transform 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Protocols match
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected proposal number 1 and transforms for 1 protocols
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_choose_v1_proposal: Selected transform id 3 for protocol 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ikev2_sav1_select: Proposals match
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_sa_reply: Selected proposal 0, and transform 0 for protocol 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 2 references
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_restart_packet: Start, restart packet SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = Start QM R (15)/5, exchange = 32, auth_method = any, Responder
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_sa_proposals: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_hash_2: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_sa_values: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_nonce: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_nonce_data_len: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ke: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_ids: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_local_id: Using ipv4_subnet(icmp:0,[0..7]=172.16.61.0/24) as local QM identity
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_local_id: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fb_qm_remote_id: Using ipv4_subnet(icmp:0,[0..7]=10.200.0.0/16) as remote QM identity
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_qm_remote_id: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_qm_optional_id: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_optional_responder_lifetime_n: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_private: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Construction NHTB payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 P1 SA index 7451223 sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg ipsec-XXXXX-XXXXX
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_policy_reply_private_payload_out: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_encrypt: Marking encryption for packet
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM HASH SA R (17)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 44823d8c, nego = 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 156
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_allocate: Allocated packet bd2400 from freelist
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_get_sa: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / 44823d8c, remote = 189.XXX.XXX.XXX:500
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find: Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d }
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d} / 44823d8c, nego = 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_decode_packet: Decrypting packet
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: Current state = QM HASH SA R (17)/-1, exchange = 32, auth_method = any, Responder
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_encrypt: Check that packet was encrypted succeeded
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_qm_hash_3: Start, hash[0..20] = 236a0d4e 9695e926 ...
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_i_private: Start
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: Phase 2 connection succeeded, No PFS, group = 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_qm_call_callback: MESSAGE: SA[0][0] = ESP 3des, life = 0 kB/3600 sec, group = 0, tunnel, hmac-sha1-96, Extended seq not used, key len = 0, key rounds = 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ipsec_sa_install: local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1 for SA-CFG ipsec-XXXXX-XXXXX
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Parsing notification payload for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x54477855, proto=ESP pair_index = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_nhtb_update_on_sa_create: Interface st0.15 is P2P for sa_cfg ipsec-XXXXX-XXXXX. Thus ignoring NHTB notification message
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x54477855, protocol=ESP dst=198.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Creating a SA spi=0x6e6d9bb7, proto=ESP pair_index = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added (spi=0x6e6d9bb7, protocol=ESP dst=189.XXX.XXX.XXX) entry to the peer hash table
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Hardlife timer started for inbound ipsec-XXXXX-XXXXX with 3600 seconds/0 kilobytes
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Softlife timer started for inbound ipsec-XXXXX-XXXXX with 3009 seconds/0 kilobytes
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] The SA queue in the ipsec-XXXXX-XXXXX SA config block is more than max queue size. Deleting the old 2 SAs from the queue
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x64996714, proto=ESP
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x64996714, protocol=ESP dst=198.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_alloc: Allocated fallback negotiation c40000
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Start, remote_name = :500, flags = 00010000
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: Start, remote_name = :500, flags = 00010000
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_sa_find_ip_port: Remote = all:500, Found SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_alloc_negotiation: Found slot 3, max 4
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Created random message id = d44828c4
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_init_info_exchange: Phase 1 done, use HASH and N or D payload
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_create_delete_internal: SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Start, SA = { 0x5f0d8b88 ecd4bdff - 87fe5a8b 7819243d } / d44828c4, nego = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Encrypting packet
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_encode_packet: Final length = 68
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ssh_ike_connect_delete: Sending delete to (null)null)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_packet: Start, send SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 3, dst = 189.XXX.XXX.XXX:500, routing table id = 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_delete_negotiation: Start, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation_info: Start, nego = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_free_negotiation: Start, nego = 3
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_ike_info_done_callback: P1 SA 7451223 (ref 3). pending req? 0, status: Error ok
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c40000
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_pm_send_ipsec_delete_notification: Sent delete notification for spi=64996714, proto=ESP
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_delete Deleting GENCFG msg with key; Tunnel = 131078;SPI-In = 0x64996714
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted SA pair for tunnel = 131078 with SPI-In = 0x64996714 to kernel
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x64996714, protocol=ESP) entry from the inbound sa spi hash table
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Freeing the SA spi=0x4ff8f55a, proto=ESP
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Out bound SA. Not sending notification
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Deleted (spi=0x4ff8f55a, protocol=ESP dst=189.XXX.XXX.XXX) entry from the peer hash table. Reason: More than two SA pairs
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_sa_bundle
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ipsec-XXXXX-XXXXX : VPN Monitor Interval=0(0) Optimized=0(0)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle remote gateway: IP 189.XXX.XXX.XXX chosen
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA bundle local gateway: IP 198.XXX.XXX.XXX chosen
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipsec_ipc_sa_pair
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_fill_ipc_sa_keys
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Voyager ipsec SA BUNDLE-------------------
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA pair update request for:
Tunnel index: 131078
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Local Gateway address: 198.XXX.XXX.XXX
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Primary remote Gateway address: 189.XXX.XXX.XXX
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Backup remote Gateway State: Active
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Anti replay: counter-based enabled
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Window_size: 64
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Server Time: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Peer : Static
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Mode : Tunnel
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] VPN Type : route-based
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DF bit: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] local-if ifl idx: 79
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] tunnel-if ifl idx: 77
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Tunnel mtu: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DPD interval: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] policy id: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] NATT enabled: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Idle time: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SA Outbound install delay time: 1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IKED ID: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] DIST ID: 0
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Incoming SA -------------------
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x54477855 Protocol: 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ----------------Outgoing SA -------------------
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] SPI: 0x6e6d9bb7 Protocol: 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Algorithm: 34 Auth key. length: 20
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Encr key. length; 24
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131078;SPI-In = 0x54477855
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Added dependency on SA config blob with tunnelid = 131078
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] Successfully added ipsec SA PAIR
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] iked_is_anchoring_instance sa_dist_id=0, self_dist_id=255
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_st_o_qm_wait_done: Marking for waiting for done
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_state_step: All done, new state = QM done R (19)
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_send_notify: Connected, SA = { 5f0d8b88 ecd4bdff - 87fe5a8b 7819243d}, nego = 2
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ike_process_packet: No output packet, returning
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] IPSec negotiation done successfully for SA-CFG ipsec-XXXXX-XXXXX for local:198.XXX.XXX.XXX, remote:189.XXX.XXX.XXX IKEv1
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Fallback negotiation c37000 has still 1 references
Dec 10 16:45:29 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_fallback_negotiation_free: Freeing fallback negotiation c37000
Dec 10 16:47:15 [198.XXX.XXX.XXX <-> 189.XXX.XXX.XXX] ikev2_packet_v1_start: Passing IKE v1.0 packet to IKEv1 library