Hi, I'm currently facing a problem establishing IKEv2 site-to-site VPN between OpenBSD and a Juniper SRX firewall. The tunnel can be sucessfully established if it is initiated by the Juniper SRX firewall. If I configure OpenIKED to actively initiate the tunnel, the SRX firewall complains about a syntax error.
OpenBSD version: **************** root@openbsd:~# uname -a OpenBSD openbsd.test.loc 5.8 GENERIC#1170 amd64 root@openbsd:~# Juniper SRX version: ******************** {primary:node0}[edit] superman@juniper_srx-node0# run show version node0: -------------------------------------------------------------------------- Hostname: juniper_srx-node0 Model: srx240h2 JUNOS Software Release [12.3X48-D20.4] node1: -------------------------------------------------------------------------- Hostname: juniper_srx-node1 Model: srx240h2 JUNOS Software Release [12.3X48-D20.4] {primary:node0}[edit] superman@juniper_srx-node0# OpenIKED acting as initiator: ***************************** OpenIKED configuration: ======================= ikev2 vpn_corp active esp \ from 172.16.0.0/16 to 172.17.0.0/16 \ local 1.1.1.1 peer 2.2.2.2 \ ikesa auth hmac-sha2-256 enc aes-256 group modp2048 \ childsa auth hmac-sha2-256 enc aes-256 group modp2048 \ srcid 1.1.1.1 dstid 2.2.2.2 \ ikelifetime 28800 lifetime 3600 \ psk ******** OpenIKED log: ============= ca_privkey_serialize: type RSA_KEY length 1190 ca_pubkey_serialize: type RSA_KEY length 270 /etc/iked.conf: loaded 1 configuration rules config_getpolicy: received policy ikev2 "vpn_corp" active esp inet from 172.16.0.0/16 to 172.17.0.0/16 local 1.1.1.1 peer 2.2.2.2 ikesa enc aes-256 prf hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256 group modp2048 childsa enc aes-256 auth hmac-sha2-256 group modp2048 srcid 1.1.1.1 dstid 2.2.2.2 ikelifetime 28800 lifetime 3600 bytes 536870912 psk 0x******************************************** config_getpfkey: received pfkey fd 3 config_getcompile: compilation done config_getsocket: received socket fd 4 config_getsocket: received socket fd 5 config_getsocket: received socket fd 7 config_getsocket: received socket fd 8 ca_reload: local cert type RSA_KEY config_getocsp: ocsp_url none ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0 ikev2_init_ike_sa: initiating "vpn_corp" ikev2_policy2id: srcid IPV4/1.1.1.1 length 8 ikev2_add_proposals: length 60 ikev2_next_payload: length 64 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x08e787c5d31f442f 0x0000000000000000 1.1.1.1:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x08e787c5d31f442f 0x0000000000000000 2.2.2.2:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_next_payload: length 14 nextpayload NONE ikev2_pld_parse: header ispi 0x08e787c5d31f442f rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 462 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 64 ikev2_pld_sa: more 0 reserved 0 length 60 proposal #1 protoid IKE spisize 0 xforms 6 spi 0 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id HMAC_MD5 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14 ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS ikev2_msg_send: IKE_SA_INIT request from 1.1.1.1:500 to 2.2.2.2:500 msgid 0, 462 bytes sa_state: INIT -> SA_INIT ikev2_recv: IKE_SA_INIT response from responder 2.2.2.2:500 to 1.1.1.1:500 policy 'vpn_corp' id 0, 474 bytes ikev2_recv: ispi 0x08e787c5d31f442f rspi 0x9d7d95f32328d0ac ikev2_recv: updated SA to peer 2.2.2.2:500 local 1.1.1.1:500 ikev2_pld_parse: header ispi 0x08e787c5d31f442f rspi 0x9d7d95f32328d0ac nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 474 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x08e787c5d31f442f 0x9d7d95f32328d0ac 2.2.2.2:500 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x08e787c5d31f442f 0x9d7d95f32328d0ac 1.1.1.1:500 ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 10 ikev2_pld_notify: protoid NONE spisize 0 type <UNKNOWN:40002> ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 32 ikev2_sa_negotiate: score 4 sa_stateok: SA_INIT flags 0x00, require 0x04 auth ikev2_sa_keys: SKEYSEED with 32 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: T5 with 32 bytes ikev2_prfplus: T6 with 32 bytes ikev2_prfplus: T7 with 32 bytes ikev2_prfplus: Tn with 224 bytes ikev2_sa_keys: SK_d with 32 bytes ikev2_sa_keys: SK_ai with 32 bytes ikev2_sa_keys: SK_ar with 32 bytes ikev2_sa_keys: SK_ei with 32 bytes ikev2_sa_keys: SK_er with 32 bytes ikev2_sa_keys: SK_pi with 32 bytes ikev2_sa_keys: SK_pr with 32 bytes ikev2_msg_auth: initiator auth data length 526 sa_stateok: SA_INIT flags 0x04, require 0x04 auth ikev2_next_payload: length 12 nextpayload AUTH ikev2_next_payload: length 40 nextpayload SA pfkey_sa_getspi: spi 0x54b417b8 pfkey_sa_init: new spi 0x54b417b8 ikev2_add_proposals: length 56 ikev2_next_payload: length 60 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 160 ikev2_msg_encrypt: padded length 176 ikev2_msg_encrypt: length 161, padding 15, output length 208 ikev2_next_payload: length 212 nextpayload IDi ikev2_msg_integr: message length 240 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x08e787c5d31f442f rspi 0x9d7d95f32328d0ac nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 240 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 212 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 176 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 176/176 padding 15 ikev2_pld_payloads: decrypted payload IDi nextpayload AUTH critical 0x00 length 12 ikev2_pld_id: id IPV4/1.1.1.1 length 8 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 60 ikev2_pld_sa: more 0 reserved 0 length 56 proposal #2 protoid ESP spisize 4 xforms 5 spi 0x54b417b8 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 172.16.0.0 end 172.16.255.255 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 172.17.0.0 end 172.17.255.255 ikev2_msg_send: IKE_AUTH request from 1.1.1.1:500 to 2.2.2.2:500 msgid 1, 240 bytes config_free_proposals: free 0x16b5efa61e80 Juniper SRX configuration: ========================== {primary:node0}[edit] superman@juniper_srx-node0# show security ike proposal ike-aes265-sha256-dh14-psk-28800 { authentication-method pre-shared-keys; dh-group group14; authentication-algorithm sha-256; encryption-algorithm aes-256-cbc; lifetime-seconds 28800; } policy ikepol-vpn-corp { mode main; proposals ike-aes265-sha256-dh14-psk-28800; pre-shared-key hexadecimal "*******************************************"; ## SECRET-DATA } gateway gw-corp { ike-policy ikepol-vpn-corp; address 1.1.1.1; external-interface reth0.1051; local-address 2.2.2.2; version v2-only; } {primary:node0}[edit] superman@juniper_srx-node0# show security ipsec proposal ipsec-aes256-sha256-3600 { protocol esp; authentication-algorithm hmac-sha-256-128; encryption-algorithm aes-256-cbc; lifetime-seconds 3600; } policy ipsecpol-vpn-corp { perfect-forward-secrecy { keys group14; } proposals ipsec-aes256-sha256-3600; } vpn ipsec-vpn-corp { bind-interface st0.0; ike { gateway gw-corp; proxy-identity { local 172.17.0.0/16; remote 172.16.0.0/16; } ipsec-policy ipsecpol-vpn-corp; } establish-tunnels on-traffic; } {primary:node0}[edit] superman@juniper_srx-node0# Juniper SRX log: ================ [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] P1 SA 8381945 start timer. timer duration 30, reason 1. [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward: [104a400/10b1800] R: IKE SA REFCNT: 1 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_decode_packet: [104a400/10b1800] Setting ed pkt ctx from VR id 65535 to VR id 0) [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381945 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381945 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload unknown from local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381945 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16431 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_pm_phase1_sa_cfg_lookup_by_addr: Found SA-CFG ipsec-vpn-corp by ip address for local:2.2.2.2, remote:1.1.1.1 IKEv2 remote_port:500 ksa_cfg_remote_port=0 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Peer's proposed IKE SA payload is SA([0](id = 1) protocol = IKE (1), HMAC-SHA256-128, AES CBC key len = 256, 2048 bit MODP, HMAC-SHA256 PRF, HMAC-SHA1 PRF, HMAC-MD5 PRF; ) [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] Configured proposal is SA([0](id = 1) protocol = IKE (1), AES CBC key len = 256, HMAC-SHA256-128, 2048 bit MODP, HMAC-SHA256 PRF; ) [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Selecting IKEv2 proposal. [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_sa_select: SA_SELECT: Considering policy proposal 1 and input proposal 1. [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104a400/10b1800] Stored packet into window fb3c80 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet 104a800 from freelist [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104a800/10b1800] Stored packet into window fb3ce0 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 2048 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 14 [Mar 16 08:44:15][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 14 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 14 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [28061] [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16431 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request send NHTB_SUPPORTED [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_udp_send_packet: [104a800/0] Sending packet using VR id 0 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward: [104ac00/10b1800] R: IKE SA REFCNT: 1 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104a400/0] Destroyed already. Thread completed. Freeing now. [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104ac00/10b1800] Stored packet into window fb3c80 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_decode_sa: [104ac00/10b1800] Proposal number(2) should be 0 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pv_audit_callback: Empty SSH audit event [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_state_error: [104ac00/10b1800] Negotiation failed because of error Invalid syntax (7) [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] IKE negotiation fail for local:2.2.2.2, remote:1.1.1.1 IKEv2 with status: Invalid syntax [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] Inside iked_pm_ipsec_sa_done [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] IPSec negotiation failed for SA-CFG ipsec-vpn-corp for local:2.2.2.2, remote:1.1.1.1 IKEv2. status: Invalid syntax [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] P2 ed info: flags 0x800, P2 error: Error ok [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104ac00/10b1800] Not destroyed; running to end state and terminating there. [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104a800/0] Not destroyed; running to end state and terminating there. [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] IKE SA delete called for p1 sa 8381945 (ref cnt 1) local:2.2.2.2, remote:1.1.1.1, IKEv2 [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] P1 SA 8381945 stop timer. timer duration 30, reason 1. [Mar 16 08:44:16][2.2.2.2 <-> 1.1.1.1] iked_pm_p1_sa_destroy: p1 sa 8381945 (ref cnt 0), waiting_for_del 0x0 SRX acting as initiator: ************************ OpenIKED configuration: ======================= ikev2 vpn_corp passive esp \ from 172.16.0.0/16 to 172.17.0.0/16 \ local 1.1.1.1 peer 2.2.2.2 \ ikesa auth hmac-sha2-256 enc aes-256 group modp2048 \ childsa auth hmac-sha2-256 enc aes-256 group modp2048 \ srcid 1.1.1.1 dstid 2.2.2.2 \ ikelifetime 28800 lifetime 3600 \ psk ******** OpenIKED log: ============= ca_privkey_serialize: type RSA_KEY length 1190 ca_pubkey_serialize: type RSA_KEY length 270 /etc/iked.conf: loaded 1 configuration rules config_getpolicy: received policy ikev2 "vpn_corp" passive esp inet from 172.16.0.0/16 to 172.17.0.0/16 local 1.1.1.1 peer 2.2.2.2 ikesa enc aes-256 prf hmac-sha2-256,hmac-sha1,hmac-md5 auth hmac-sha2-256 group modp2048 childsa enc aes-256 auth hmac-sha2-256 group modp2048 srcid 1.1.1.1 dstid 2.2.2.2 ikelifetime 28800 lifetime 3600 bytes 536870912 psk 0x******************************************** config_getpfkey: received pfkey fd 3 config_getcompile: compilation done config_getsocket: received socket fd 4 config_getsocket: received socket fd 5 config_getsocket: received socket fd 7 config_getsocket: received socket fd 8 ca_reload: local cert type RSA_KEY config_getocsp: ocsp_url none ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0 ikev2_recv: IKE_SA_INIT request from initiator 2.2.2.2:500 to 1.1.1.1:500 policy 'vpn_corp' id 0, 474 bytes ikev2_recv: ispi 0x4f2c7380eaddd91b rspi 0x0000000000000000 ikev2_policy2id: srcid IPV4/1.1.1.1 length 8 ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 474 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 0 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x4f2c7380eaddd91b 0x0000000000000000 2.2.2.2:500 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x4f2c7380eaddd91b 0x0000000000000000 1.1.1.1:500 ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 10 ikev2_pld_notify: protoid NONE spisize 0 type <UNKNOWN:40002> ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 32 sa_state: INIT -> SA_INIT ikev2_sa_negotiate: score 4 sa_stateok: SA_INIT flags 0x00, require 0x00 sa_stateflags: 0x00 -> 0x10 sa (required 0x00 ) ikev2_sa_keys: SKEYSEED with 32 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: T5 with 32 bytes ikev2_prfplus: T6 with 32 bytes ikev2_prfplus: T7 with 32 bytes ikev2_prfplus: Tn with 224 bytes ikev2_sa_keys: SK_d with 32 bytes ikev2_sa_keys: SK_ai with 32 bytes ikev2_sa_keys: SK_ar with 32 bytes ikev2_sa_keys: SK_ei with 32 bytes ikev2_sa_keys: SK_er with 32 bytes ikev2_sa_keys: SK_pi with 32 bytes ikev2_sa_keys: SK_pr with 32 bytes ikev2_add_proposals: length 44 ikev2_next_payload: length 48 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x4f2c7380eaddd91b 0x3018825632b6f34b 1.1.1.1:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x4f2c7380eaddd91b 0x3018825632b6f34b 2.2.2.2:500 ikev2_next_payload: length 28 nextpayload NONE ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 432 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_msg_send: IKE_SA_INIT response from 1.1.1.1:500 to 2.2.2.2:500 msgid 0, 432 bytes config_free_proposals: free 0xd0bbfa23480 ikev2_recv: IKE_AUTH request from initiator 2.2.2.2:500 to 1.1.1.1:500 policy 'vpn_corp' id 1, 256 bytes ikev2_recv: ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b ikev2_recv: updated SA to peer 2.2.2.2:500 local 1.1.1.1:500 ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 256 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 228 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 192 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 192/192 padding 15 ikev2_pld_payloads: decrypted payload IDi nextpayload IDr critical 0x00 length 12 ikev2_pld_id: id IPV4/2.2.2.2 length 8 ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length 12 ikev2_pld_id: id IPV4/1.1.1.1 length 8 ikev2_pld_id: unexpected id payload ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 sa_state: SA_INIT -> AUTH_REQUEST ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0x436645cd ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 172.17.0.0 end 172.17.255.255 ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 172.16.0.0 end 172.16.255.255 ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY critical 0x00 length 8 ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE critical 0x00 length 12 ikev2_pld_notify: protoid NONE spisize 0 type SET_WINDOW_SIZE sa_stateok: SA_INIT flags 0x00, require 0x00 policy_lookup: peerid '2.2.2.2' ikev2_msg_auth: responder auth data length 496 ikev2_msg_auth: initiator auth data length 538 ikev2_msg_authverify: method SHARED_KEY_MIC keylen 32 type NONE ikev2_msg_authverify: authentication successful sa_state: AUTH_REQUEST -> AUTH_SUCCESS sa_stateflags: 0x14 -> 0x1c auth,authvalid,sa (required 0x1c auth,authvalid,sa) ikev2_sa_negotiate: score 4 sa_stateflags: 0x1c -> 0x1c auth,authvalid,sa (required 0x1c auth,authvalid,sa) sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa sa_state: AUTH_SUCCESS -> VALID sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa ikev2_sa_tag: (0) ikev2_childsa_negotiate: proposal 1 ikev2_childsa_negotiate: key material length 128 ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: Tn with 128 bytes pfkey_sa_getspi: spi 0xd67849f9 pfkey_sa_init: new spi 0xd67849f9 sa_stateok: VALID flags 0x1c, require 0x1c auth,authvalid,sa ikev2_next_payload: length 12 nextpayload AUTH ikev2_next_payload: length 40 nextpayload SA ikev2_add_proposals: length 40 ikev2_next_payload: length 44 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 144 ikev2_msg_encrypt: padded length 160 ikev2_msg_encrypt: length 145, padding 15, output length 192 ikev2_next_payload: length 196 nextpayload IDr ikev2_msg_integr: message length 224 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x4f2c7380eaddd91b rspi 0x3018825632b6f34b nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 224 response 1 ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 196 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 160 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 160/160 padding 15 ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical 0x00 length 12 ikev2_pld_id: id IPV4/1.1.1.1 length 8 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 44 ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP spisize 4 xforms 3 spi 0xd67849f9 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 172.17.0.0 end 172.17.255.255 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 172.16.0.0 end 172.16.255.255 ikev2_msg_send: IKE_AUTH response from 1.1.1.1:500 to 2.2.2.2:500 msgid 1, 224 bytes pfkey_sa_add: update spi 0xd67849f9 ikev2_childsa_enable: loaded CHILD SA spi 0xd67849f9 pfkey_sa_add: add spi 0x436645cd ikev2_childsa_enable: loaded CHILD SA spi 0x436645cd ikev2_childsa_enable: loaded flow 0xd0b2fd22800 ikev2_childsa_enable: loaded flow 0xd0b2fd22c00 sa_state: VALID -> ESTABLISHED from 2.2.2.2:500 to 1.1.1.1:500 policy 'vpn_corp' config_free_proposals: free 0xd0b17405c00 ca exiting, pid 32477 ikev1 exiting, pid 16823 ikev2 exiting, pid 30323 parent terminating Juniper SRX configuration: ========================== {primary:node0}[edit] superman@juniper_srx-node0# show security ike proposal ike-aes265-sha256-dh14-psk-28800 { authentication-method pre-shared-keys; dh-group group14; authentication-algorithm sha-256; encryption-algorithm aes-256-cbc; lifetime-seconds 28800; } policy ikepol-vpn-corp { mode main; proposals ike-aes265-sha256-dh14-psk-28800; pre-shared-key hexadecimal "*******************************************"; ## SECRET-DATA } gateway gw-corp { ike-policy ikepol-vpn-corp; address 1.1.1.1; external-interface reth0.1051; local-address 2.2.2.2; version v2-only; } {primary:node0}[edit] superman@juniper_srx-node0# show security ipsec proposal ipsec-aes256-sha256-3600 { protocol esp; authentication-algorithm hmac-sha-256-128; encryption-algorithm aes-256-cbc; lifetime-seconds 3600; } policy ipsecpol-vpn-corp { perfect-forward-secrecy { keys group14; } proposals ipsec-aes256-sha256-3600; } vpn ipsec-vpn-corp { bind-interface st0.0; ike { gateway gw-corp; proxy-identity { local 172.17.0.0/16; remote 172.16.0.0/16; } ipsec-policy ipsecpol-vpn-corp; } establish-tunnels immediately; } {primary:node0}[edit] superman@juniper_srx-node0# Juniper SRX log: ================ Mar 16 08:49:59 juniper_srx-node0 clear-log[18132]: logfile cleared [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_config_process_sa_cfg Find action on ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_config_process_sa_cfg action=1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Found existing config for SA ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] kmd_ipsec_apply_sacfg: Resetting VPN Monitoring parameters [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] sa_cfg = ipsec-vpn-corp and gateway = gw-corp are linked, sa_cfg local addrss is: 2.2.2.2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] S2S dist_id(0) gw_id(0) copied from gateway to sa_cfg [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_config_stage_update_and_activate update_required for sa_cfg = ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_sa_cfg_get_parent_sa_cfg_child_sas_count No parent for sa_cfg ipsec-vpn-corp count is 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_deactivate_bind_interface: No more NHTB entries are active for st0.0. Bringing down the interface [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] kmd_update_tunnel_interface: [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_update_tunnel_interface_by_ifname: update ifl st0.0 status DOWN [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_stop_vpnm_timer: processing SA ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Triggering negotiation for ipsec-vpn-corp config block [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: lookup peer entry for gateway gw-corp, local_port=500, remote_port=500 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_create_peer_entry: Created peer entry 0x10c5e00 for local 2.2.2.2:500 remote 1.1.1.1:500 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_fetch_or_create_peer_entry: Create peer entry 0x10c5e00 for local 2.2.2.2:500 remote 1.1.1.1:500. gw gw-corp, VR id 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_callback: FOUND peer entry for gateway gw-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Initiating new P1 SA for gateway gw-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] P1 SA 8381946 start timer. timer duration 30, reason 1. [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Set p2_ed in sa_cfg=ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_p1sa_entry: Insert p1 sa 8381946 in peer entry 0x10c5e00 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_trigger_negotiation Convert traffic selectors from V1 format to V2 format for narrowing/matching selectors [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet 104b000 from freelist [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104b000/10b1800] Stored packet into window fb3cc0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ssh_ikev2_ipsec_send: Started IPsec SA creation 1.1.1.1;500 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IKE SA fill called for negotiation of local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 2048 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 14 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate_sync: Requested DH group 14 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_generate: Generated DH keys using hardware for DH group 14 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: DH Generate Secs [0] USecs [44146] [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_generate_async: Generated DH using hardware [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request send NHTB_SUPPORTED [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_send_packet: [104b000/10b1800] Sending packet using VR id 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_send: Registering timeout at 10000 (10.0) [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward: [104b400/10b1800] R: IKE SA REFCNT: 3 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection source IP from local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381946 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received - START [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_received: Received Unauthenticated notification payload NAT detection destination IP from local:2.2.2.2 remote:1.1.1.1 IKEv2 for P1 SA 8381946 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_decode_packet: [104b400/10b1800] Updating responder IKE SPI to IKE SA 10b1800 I 4f2c7380 eaddd91b R 30188256 32b6f34b [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104b400/10b1800] STOP-RETRANSMIT: Response to request 104b000 with m-id 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104b400/10b1800] Stored packet into window fb3d20 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_allocate: Allocated packet 104b800 from freelist [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104b800/10b1800] Stored packet into window fb3cc0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group type dl-modp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group size 2048 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_get_group: DH Group 14 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_dh_compute_synch: Requested DH group 14 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Peer public key has length 256 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: DH Compute Secs [0] USecs [30689] [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] juniper_dlp_diffie_hellman_final_async: Computed DH using hardware [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_spi_allocate: local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added (spi=0x436645cd, protocol=0) entry to the spi table [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_conf_request: SA-CFG ipsec-vpn-corp not configured for config payload. Skipping... [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request Parse notification paylad in last received pkt [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_spd_notify_request: Sending Initial contact [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Sending IKE window size notification for IKE SA of size 1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Construction NHTB payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 P1 SA index 8381946 sa-cfg ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Peer router vendor is not Juniper. Not sending NHTB payload for sa-cfg ipsec-vpn-corp, p1_sa=8381946 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_send_packet: [104b800/10b1800] Sending packet using VR id 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_send: Registering timeout at 10000 (10.0) [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_st_forward: [104bc00/10b1800] R: IKE SA REFCNT: 3 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_done: [104b400/0] Destroyed already. Thread completed. Freeing now. [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104bc00/10b1800] STOP-RETRANSMIT: Response to request 104b800 with m-id 1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_udp_window_update: [104bc00/10b1800] Stored packet into window fb3d20 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_sa_install: local:2.2.2.2, remote:1.1.1.1 IKEv2 for SA-CFG ipsec-vpn-corp, rekey-ikev2:no [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_update_sa_cfg_port sa_cfg(ipsec-vpn-corp) local_port(0) and remote_port(500) [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Setting lifetime 3600 and lifesize 0 for IPSec SA [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_sa_create: encr key len 32, auth key len: 32, salt len: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Creating a SA spi=0x436645cd, proto=ESP pair_index = 1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added (spi=0x436645cd, protocol=ESP dst=2.2.2.2) entry to the peer hash table [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_peer_insert_sa_cfg_entry: insert sa_cfg tunnel_id entry 131073 into peer entry 0x10c5e00 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Creating a SA spi=0xd67849f9, proto=ESP pair_index = 1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added (spi=0xd67849f9, protocol=ESP dst=1.1.1.1) entry to the peer hash table [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_nhtb_update_on_sa_create: Interface st0.0 is P2P for sa_cfg ipsec-vpn-corp. Thus ignoring NHTB notification message [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ipsec_sa_install: NHTB add passed for sa-cfg ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Hardlife timer started for inbound ipsec-vpn-corp with 3600 seconds/0 kilobytes [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Softlife timer started for inbound ipsec-vpn-corp with 2967 seconds/0 kilobytes [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_sa_bundle [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ipsec-vpn-corp : VPN Monitor Interval=0(0) Optimized=0(0) [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_fill_sa_bundle : DPD Interval=0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA bundle remote gateway: IP 1.1.1.1 chosen [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA bundle local gateway: IP 2.2.2.2 chosen [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipsec_ipc_sa_pair [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_fill_ipc_sa_keys [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ----------------Voyager ipsec SA BUNDLE------------------- [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA pair update request for: Tunnel index: 131073 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Local Gateway address: 2.2.2.2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Primary remote Gateway address: 1.1.1.1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Backup remote Gateway State: Active [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Anti replay: counter-based enabled [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Window_size: 64 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Server Time: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Peer : Static [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Mode : Tunnel [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] VPN Type : route-based [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Tunnel mtu: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] DF bit: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] local-if ifl idx: 74 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] tunnel-if ifl idx: 92 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Tunnel mtu: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] DPD interval: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] policy id: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] NATT enabled: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] NATT version: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] NAT position: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA Idle time: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA Outbound install delay time: 1 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IKED ID: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] DIST ID: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Keepalive interval: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] VPN monitoring interval: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] VPN monitoring optimized: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Respond-bad-SPI: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] seq_out: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Local port: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Remote port: 500 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SA CFG name: ipsec-vpn-corp [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Dial-up IKE ID: [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] RG ID: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Group template tunnel ID: 0 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ----------------Incoming SA ------------------- [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SPI: 0x436645cd Protocol: 2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Algorithm: 516 Auth key. length: 32 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Encr key. length; 32 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ----------------Outgoing SA ------------------- [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] SPI: 0xd67849f9 Protocol: 2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Algorithm: 516 Auth key. length: 32 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Encr key. length; 32 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] In iked_ipsec_sa_pair_add Adding GENCFG msg with key; Tunnel = 131073;SPI-In = 0x436645cd [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Added dependency on SA config blob with tunnelid = 131073 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Successfully added ipsec SA PAIR [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Adding Phase2 Blob for Tunnel Id: 131073 SPI: 1130776013 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] kmd_update_tunnel_interface: [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_update_tunnel_interface_by_ifname: update ifl st0.0 status UP [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IKE negotiation done for local:2.2.2.2, remote:1.1.1.1 IKEv2 with status: Error ok [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Parsing notification payload for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16389 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Ignoring notification of type 16388 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_pm_ike_sa_done: Success to create or find peer_entry for local:2.2.2.2:500, remote:1.1.1.1:500 in ike sa done [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] P1 SA 8381946 stop timer. timer duration 30, reason 1. [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] P1 SA 8381946 start timer. timer duration 28800, reason 2. [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] lifetime timers started for p1_sa index 8381946 (hard 28800, soft 28221 secs) [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Preparing phase1 HA blob for p1-sa 8381946 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] iked_prepare_phase1_ha_blob: P1 SA 8381946, phase1_blob->lifetime 28800, p1_sa->lifetime 28800 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Adding Phase 1 HA blob for P1 SA 8381946 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] Inside iked_pm_ipsec_sa_done [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IPSec negotiation done successfully for SA-CFG ipsec-vpn-corp for local:2.2.2.2, remote:1.1.1.1 IKEv2 [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] IPSec SA done callback. ed 10c4028. status: Error ok [Mar 16 08:52:06][2.2.2.2 <-> 1.1.1.1] ikev2_packet_destroy: F: IKE SA REFCNT: 1 Regards, Bernd