Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey spi:8dbd2a00 opp-spi:cc656c00 src:85.XXX.XXX.XXX dst:10.140.35.2 initiator:NO out:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey spi:cc656c00 opp-spi:8dbd2a00 src:10.140.35.2 dst:85.XXX.XXX.XXX initiator:NO out:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IKE_useCert certchain:0x975f3c Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IPSEC_keyAddEx spdid:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IPSEC_newSa Added outbound-hash for pxSa 0x9805d4 IP:85.XXX.XXX.XXX status:0 inbound:0 hash:137848742 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| IPSEC_newSa SADB:0x9805d4 Proto:50 SPI:cc656c00 OppSPI:8dbd2a00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255.255.255.255 S Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| OutCp entered Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| OutTfm2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| OutTs : responder no:0 start:0.0.0.0 end:255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| OutTs : responder no:1 start:0.0.0.0 end:255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending no:1 fragment out of 7 fragments, size = 900 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending no:2 fragment out of 7 fragments, size = 900 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending no:3 fragment out of 7 fragments, size = 900 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending no:4 fragment out of 7 fragments, size = 900 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending no:5 fragment out of 7 fragments, size = 900 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending no:6 fragment out of 7 fragments, size = 900 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| Sending last fragment, size = 260 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:cc656c00 ispi:8dbd2a00 auth:2 len:20 enc:4 len:32 add:1 out:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| authR_out Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| cleanup_and_free_context delete ctx memory Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after close sock:48 with ip:192.168.237.11 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after ioctl sock:48 with ip:192.168.237.11 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after socket:48 with ip:192.168.237.11 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify entered with ip:192.168.237.11/255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify socket:48 request:35083 dev:tsgw rtflags:1 with ip:192.168.237.11 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| get_ikev2_internal_ip Inner-ip from AAA 192.168.237.11, DNS1:0.0.0.0, DNS2:0.0.0.0, WINS1:0.0.0.0, WINS2:0.0.0.0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet calling client_auth_ip_up for InnerIP 192.168.237.11, c0a8ed0b, extip 85.XXX.XXX.XXX Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet cookie:3678223884 innerip 0.0.0.0 inneripv6 :: Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet removing ctx 994c24 from auth-list. auth-cookie 3678223884 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet rsa signature pending, skipping outstanding send Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet rsp.cluster_rap_innerip 192.168.237.11 rsp.cluster_rap_inneripv6 0.0.0.0 rsp.inner_ip 0.0.0.0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet:4890 sa cert-type 1, db cert-type 1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| xlp_rcv_response: Nothing to be read from cryptolib fd Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IP4_ADDRESS IP4_NETMASK TSi: 0.0.0.0~255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_keyDelete(raddr=85.XXX.XXX.XXX) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Proposal #1: ESP(5) spi=cc656c00 Peer:ENCR_AES_GCM_16 256-BITS unsupported Expected:ENCR_AES Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> HASH_i ed bf 58 32 cc 1d ad 8a 1c bb e7 ad 13 a7 e0 89 43 f2 f2 92 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> TSr: 0.0.0.0~255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Notify: INITIAL_CONTACT CFG_REQUEST Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 320 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 526 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 320, dwBodyLen = 292 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 526, dwBodyLen = 498 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1664 pxSa = 0xbec3e4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> INITIAL _CONTACT received delete child SA's for ip = 85.XXX.XXX.XXX port = 58360 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Peer:ENCR_AES 256-BITS Peer:ENCR_3DES unsupported Expected:ENCR_AES 256-BITS Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=2272 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=320 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=526 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={6d02aee0924140ce a7d079572871a240} np=E{IDi} Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={6d02aee0924140ce a7d079572871a240} np=FGMT Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 2276 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936480.194) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 324 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936480.192) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936480.182) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936480.188) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936480.190) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936480.191) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 256-BITS Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> DoSa2_R : detected VPN client Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv:2018: IKE2_msgRecv Called Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv_resume auth pending, skipping outstanding send Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:35 bReq:0 dwMsgId:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 320 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 526 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert trying device cert cert for RAP Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: found valid Server-Cert:Aruba-Factory-Server-Cert-Chain Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: got 4 certs Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:324 numSkts:56 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:530 numSkts:56 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certAssign natt port:58360 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : ARUBA cert MAC:20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : cert CN:20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey num-certs:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey: Aruba AP cert validated successfully against device ca cert Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:0 cert-len:733 cert:0x8ee4f4 key:0x8ff4bc keylen:2019 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:1 cert-len:1711 cert:0x8f32dc key:(nil) keylen:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:2 cert-len:1079 cert:0x8f4b8c key:(nil) keylen:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:3 cert-len:1333 cert:0x8f919c key:(nil) keylen:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain num:4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain status:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_fragRecv Rcvd all 0 fragments Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:4500 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:55700 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56726 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56978 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58128 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58197 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58360 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:63223 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:64146 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:500 peer-natt:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId NATT peer-port:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId status:0 peer-port:0 peer-natt:58360 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: calling mac_hash_tbl_entry_add for username 20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: isarubaCampusAP 0 isarubaAP 1 isMasterLocal 0 isBOC 0 peeruplinkfailover 0 username 20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_useCert certchain:(nil) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InAuthSig certNum:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp : detected VPN client Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa0: calling IKE2_newIPsecSa Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: InTfmX_R status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Responder SPI:8dbd2a00 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Successfully added Responder SPI:8dbd2a00 to SPI hash table Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after initIPsecKey status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: before initIPsecKey status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: dwSpi[I Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 authAlgo:2 len:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 encrAlgo:12 len:32 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : dstip:0.0.0.0 srcip:0.0.0.0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : Initialize ipsecKeyEx Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R Accepting map:default-rap-ipsecmap transform:default-rap-transform Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R setting IPSEC_SA map lifetime:7200 in seconds Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying ipsec-xf:default-rap-transform Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying map:default-rap-ipsecmap numxf:3 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 auth algo 2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 encr TfmId 12 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: status=0 merror:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs # of TS:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs entered Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:0 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:1 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs responder: the remote switch ip is :: pxIPsecSa->dwIP 0.0.0.0 pxIPsecSa->dwIPEnd 255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RAP Dynamic Map found Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [3 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [5 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> UseCustomCert: certNum:4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_serialNumber_string Cert-len:1713 Serial Number: 74:3D:96:8E:00:02:01:31:6E:85 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_subj_string Cert-len:1713 Subject: /CN=CNL2K2T1LL::20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in: status:0 authmtd:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth_tried:1 auth_supported:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> dh_tried:0 dh_supported:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> enc_tried:1 enc_supported:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> get the vlan 1435 from ip in pxSa Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ike2.c (953): errorCode = ERR_FRAGMENTATION_REQUIRED Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: adding IPSEC spi 0x8dbd2a00 to SPI hash table Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: successfully added IPSEC spi 0x8dbd2a00 to SPI hash table Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: Cookies : Initiator cookie:6d02aee0924140ce Responder cookie:a7d079572871a240 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: added sa entry to an existing mac entry Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: adding mac hash table entry for user 20:4c:03:d0:9e:94 version 2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: converted mac : 20:4c:3:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: found an existing mac entry salist numOfNodes 0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:1, idx:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:2, idx:2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:3, idx:3 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:4, idx:4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:5, idx:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests ip:85.XXX.XXX.XXX cookie:3678223884 auth:3 vpn:2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests username: 20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Current cert index being considered: 0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Last cert has n parent in chain Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Size of certificate chain to be sorted: 1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:324 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:530 Mar 29 22:33:29 isakmpd[3475]: <103076> <3475> |ike| IKEv2 IPSEC Tunnel created for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:29 isakmpd[3475]: <103077> <3475> |ike| IKEv2 IKE_SA succeeded for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:29 isakmpd[3475]: <103078> <3475> |ike| IKEv2 CHILD_SA successful for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:29 isakmpd[3475]: <103082> <3475> |ike| IKEv2 Client-Authentication succeeded for 192.168.237.11 (External 85.XXX.XXX.XXX) for default-vpn-role Mar 29 22:33:29 localdb[3578]: <133005> <3578> |localdb| User 20:4c:03:d0:9e:94 Successfully Authenticated Mar 29 22:33:29 localdb[3578]: <133028> <3578> |localdb| executeUSERDBMethod(127.0.0.1:8214 ==> 127.0.0.1:8344 PktType:0x402 SeqNum:40021 MsgCode:62): Received udb_msg with msgtype:62 id:95 reqtype:6 dbtype:13 Mar 29 22:33:29 localdb[3578]: <133108> <3578> |localdb| executeUSERDBMethod: Query for mac:20:4c:03:d0:9e:94 is successful locally with msgtype:62 id:95 reqtype:6 dbtype:13 Mar 29 22:33:29 localdb[3578]: <133122> <3578> |localdb| make_response: Sending response to 127.0.0.1:8214 with msgtype:79 id:95 reqtype:6 dbtype:13 Mar 29 22:33:29 snmp[3669]: <399816> <3669> |snmp| ../unix/../shared/notifyv3.c:304 Host's 10.141.99.60 engine ID not discovered. Traps do not get queued up. (Aruba-01) #show log all 200 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IP4_ADDRESS IP4_NETMASK TSi: 0.0.0.0~255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_keyDelete(raddr=85.XXX.XXX.XXX) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Proposal #1: ESP(5) spi=c436ea00 Peer:ENCR_AES_GCM_16 256-BITS unsupported Expected:ENCR_AES Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> HASH_i 3b 89 ea 97 1c e1 f5 d6 fb d0 dc 9d 98 87 90 3d 05 d5 89 c8 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> TSr: 0.0.0.0~255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Notify: INITIAL_CONTACT CFG_REQUEST Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 320 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 526 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 320, dwBodyLen = 292 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 526, dwBodyLen = 498 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1664 pxSa = 0xbede1c Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> INITIAL _CONTACT received delete child SA's for ip = 85.XXX.XXX.XXX port = 58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Peer:ENCR_AES 256-BITS Peer:ENCR_3DES unsupported Expected:ENCR_AES 256-BITS Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=2272 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=320 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=526 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 6e77f8ec06012db5} np=E{IDi} Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 6e77f8ec06012db5} np=FGMT Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 2276 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.967) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 324 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.966) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.952) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.958) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.960) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.964) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 256-BITS Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> DoSa2_R : detected VPN client Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv:2018: IKE2_msgRecv Called Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv_resume auth pending, skipping outstanding send Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:35 bReq:0 dwMsgId:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 320 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 526 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert trying device cert cert for RAP Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: found valid Server-Cert:Aruba-Factory-Server-Cert-Chain Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: got 4 certs Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:324 numSkts:56 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:530 numSkts:56 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certAssign natt port:58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : ARUBA cert MAC:20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : cert CN:20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey num-certs:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey: Aruba AP cert validated successfully against device ca cert Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:0 cert-len:733 cert:0x8ee4f4 key:0x8ff4bc keylen:2019 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:1 cert-len:1711 cert:0x8f32dc key:(nil) keylen:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:2 cert-len:1079 cert:0x8f4b8c key:(nil) keylen:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:3 cert-len:1333 cert:0x8f919c key:(nil) keylen:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain num:4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain status:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_fragRecv Rcvd all 0 fragments Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:4500 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:55700 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56726 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56978 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58128 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58197 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:63223 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:64146 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:500 peer-natt:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId NATT peer-port:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId status:0 peer-port:0 peer-natt:58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: calling mac_hash_tbl_entry_add for username 20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: isarubaCampusAP 0 isarubaAP 1 isMasterLocal 0 isBOC 0 peeruplinkfailover 0 username 20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_useCert certchain:(nil) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InAuthSig certNum:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp : detected VPN client Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa0: calling IKE2_newIPsecSa Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: InTfmX_R status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Responder SPI:3f97bf00 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Successfully added Responder SPI:3f97bf00 to SPI hash table Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after initIPsecKey status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: before initIPsecKey status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: dwSpi[I Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 authAlgo:2 len:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 encrAlgo:12 len:32 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : dstip:0.0.0.0 srcip:0.0.0.0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : Initialize ipsecKeyEx Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R Accepting map:default-rap-ipsecmap transform:default-rap-transform Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R setting IPSEC_SA map lifetime:7200 in seconds Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying ipsec-xf:default-rap-transform Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying map:default-rap-ipsecmap numxf:3 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 auth algo 2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 encr TfmId 12 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: status=0 merror:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs # of TS:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs entered Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:0 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:1 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs responder: the remote switch ip is :: pxIPsecSa->dwIP 0.0.0.0 pxIPsecSa->dwIPEnd 255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RAP Dynamic Map found Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [3 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [5 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> UseCustomCert: certNum:4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_serialNumber_string Cert-len:1713 Serial Number: 74:3D:96:8E:00:02:01:31:6E:85 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_subj_string Cert-len:1713 Subject: /CN=CNL2K2T1LL::20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in: status:0 authmtd:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth_tried:1 auth_supported:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> dh_tried:0 dh_supported:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> enc_tried:1 enc_supported:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> get the vlan 1435 from ip in pxSa Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ike2.c (953): errorCode = ERR_FRAGMENTATION_REQUIRED Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: adding IPSEC spi 0x3f97bf00 to SPI hash table Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: successfully added IPSEC spi 0x3f97bf00 to SPI hash table Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: Cookies : Initiator cookie:50a6726b71a5a65f Responder cookie:6e77f8ec06012db5 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: added sa entry to an existing mac entry Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: adding mac hash table entry for user 20:4c:03:d0:9e:94 version 2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: converted mac : 20:4c:3:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: found an existing mac entry salist numOfNodes 0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:1, idx:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:2, idx:2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:3, idx:3 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:4, idx:4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:5, idx:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests ip:85.XXX.XXX.XXX cookie:3678223885 auth:3 vpn:2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests username: 20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Current cert index being considered: 0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Last cert has n parent in chain Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Size of certificate chain to be sorted: 1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:324 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:530 Mar 29 22:34:36 isakmpd[3475]: <103076> <3475> |ike| IKEv2 IPSEC Tunnel created for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:36 isakmpd[3475]: <103077> <3475> |ike| IKEv2 IKE_SA succeeded for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:36 isakmpd[3475]: <103078> <3475> |ike| IKEv2 CHILD_SA successful for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:36 isakmpd[3475]: <103082> <3475> |ike| IKEv2 Client-Authentication succeeded for 192.168.237.11 (External 85.XXX.XXX.XXX) for default-vpn-role Mar 29 22:34:36 localdb[3578]: <133005> <3578> |localdb| User 20:4c:03:d0:9e:94 Successfully Authenticated Mar 29 22:34:36 localdb[3578]: <133028> <3578> |localdb| executeUSERDBMethod(127.0.0.1:8214 ==> 127.0.0.1:8344 PktType:0x402 SeqNum:40110 MsgCode:62): Received udb_msg with msgtype:62 id:96 reqtype:6 dbtype:13 Mar 29 22:34:36 localdb[3578]: <133108> <3578> |localdb| executeUSERDBMethod: Query for mac:20:4c:03:d0:9e:94 is successful locally with msgtype:62 id:96 reqtype:6 dbtype:13 Mar 29 22:34:36 localdb[3578]: <133122> <3578> |localdb| make_response: Sending response to 127.0.0.1:8214 with msgtype:79 id:96 reqtype:6 dbtype:13 Mar 29 22:34:36 snmp[3669]: <399816> <3669> |snmp| ../unix/../shared/notifyv3.c:304 Host's 10.141.99.60 engine ID not discovered. Traps do not get queued up. Mar 29 22:34:39 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4134 Auth ip down message.ip=192.168.237.11. flags 4 Mar 29 22:34:39 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4172 sa_xauth_downreturned ok for IP192.168.237.11: flag 4 Mar 29 22:34:39 isakmpd[3475]: <103060> <3475> |ike| sa.c:sa_xauth_down:2727 ikev2_sa_xauth_down success ip 192.168.237.11 flag 4 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| Deleted the IPSEC SA --- DONE !! Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing spi 0x3f97bf00 from hash table Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| DP SA out:0 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:3f97bf00 oppspi:c436ea00 esrc:85.XXX.XXX.XXX edst:10.140.35.2 dstnet:0.0.0.0 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 family: Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| DP SA out:1 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:c436ea00 oppspi:3f97bf00 esrc:10.140.35.2 edst:85.XXX.XXX.XXX dstnet:192.168.237.11 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 f Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IKE_resetInnerIP: Reset innerip:192.168.237.11 in IKESA Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa (RESPONDER) Outgoing=1 SADB Proto:50 SPI:c436ea00 OppSPI:3f97bf00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa freeing pxsa 0x9805d4 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing entry from m_hashTableOutbnd. RAP: 1 Innerip: 192.168.237.11 Dst: 85.XXX.XXX.XXX Src: 10.140.35.2 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: freeing innerip:192.168.237.11 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_deleteSaByInnerIPExtIP delete IPSEC SA 85.XXX.XXX.XXX:(inner:192.168.237.11) Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:c436ea00 ispi:3f97bf00 auth:2 len:20 enc:4 len:32 add:0 out:1 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| freeL2TPIP freeing IP 192.168.237.11 from pool Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| ipsec_spi_hash_tbl_entry_remove: Successfully removed IPSEC spi 0x3f97bf00 from SPI hash table Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Delete: 0 IKE_ SA's Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> <-- R#SEND 84 bytes to 85.XXX.XXX.XXX(58360) (936550.329) Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth=sha1 encr=aes Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=INFORMATIONAL msgid=2 len=80 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 6e77f8ec06012db5} np=E{D} Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 84 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936550.328) Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:37 bReq:0 dwMsgId:2 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:84 numSkts:56 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> cleanup_and_free_context delete ctx memory Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:84 Mar 29 22:34:39 isakmpd[3475]: <103069> <3475> |ike| IKE received AP DOWN for 192.168.237.11 (External 85.XXX.XXX.XXX) Mar 29 22:34:39 isakmpd[3475]: <103101> <3475> |ike| IPSEC SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:34:39 isakmpd[3475]: <103103> <3475> |ike| IPSec SA Deletion: IPSEC_delSa SPI:c436ea00 OppSPI:3f97bf00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 flags:1001 dstPort:0 srcPort:0 Mar 29 22:34:40 localdb[3578]: <133108> <4385> |localdb| udb_gsm_handle_cluster_aac_delete_event: whitelist_entry name 20:4c:03:d0:9e:94 is not auto-generated, don't delete Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| Cookies : Initiator cookie:50a6726b71a5a65f new sa Initiator cookie:50a6726b71a5a65f Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| Cookies : Responder cookie:6e77f8ec06012db5 new sa Responder cookie:6e77f8ec06012db5 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE_SA (id=0xdb3d3e0d) deleted Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| , status = -8972 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before 2nd IKE2_delXchg Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before IKE2_delXchg Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa sa:0xbede1c peer:85.XXX.XXX.XXX:58360 id:3678223885 err:0 saflags:30100059 arflags:5 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: deleting IPSEC SA 85.XXX.XXX.XXX:58360 due to deletion of un-rekeyed IKE_SA Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: isarubaAp 1 isarubaCampusAp 0 isMasterLocal 0 isBOC 0 ispeeruplinkfailover 0 username 20:4c:03:d0:9e:94 before calling mac_hash_tbl_delete_sa_entry Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delXchg Deleting exchange Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE_deleteHW_state cookies:55de5b2e:e3f8 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| ikev2_same_sa: LB :0 Entry Tag: Host: 10.140.35.2 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| mac_hash_tbl_delete_sa_entry: deleting for mac 20:4c:03:d0:9e:94 Mar 29 22:34:41 isakmpd[3475]: <103102> <3475> |ike| IKE SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:34:41 isakmpd[3475]: <103103> <3475> |ike| IKE SA Deletion: IKE2_delSa peer:85.XXX.XXX.XXX:58360 id:3678223885 errcode:OK saflags:0x30100059 arflags:0x5 Mar 29 22:34:57 isakmpd[3475]: <103063> <3475> |ike| exchange_start_ikev2 pre-connect check duplicate mapname:default-local-master-ipsecmap (Aruba-01) # (Aruba-01) #show log all 1000 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56978 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58128 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58197 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58360 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:63223 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:64146 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:500 peer-natt:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId NATT peer-port:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId status:0 peer-port:0 peer-natt:58360 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: calling mac_hash_tbl_entry_add for username 20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: isarubaCampusAP 0 isarubaAP 1 isMasterLocal 0 isBOC 0 peeruplinkfailover 0 username 20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_useCert certchain:(nil) Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InAuthSig certNum:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp : detected VPN client Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa0: calling IKE2_newIPsecSa Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: InTfmX_R status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Responder SPI:8dbd2a00 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Successfully added Responder SPI:8dbd2a00 to SPI hash table Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after initIPsecKey status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: before initIPsecKey status:0 bMatch:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: dwSpi[I Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 authAlgo:2 len:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 encrAlgo:12 len:32 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : dstip:0.0.0.0 srcip:0.0.0.0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : Initialize ipsecKeyEx Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R Accepting map:default-rap-ipsecmap transform:default-rap-transform Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R setting IPSEC_SA map lifetime:7200 in seconds Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying ipsec-xf:default-rap-transform Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying map:default-rap-ipsecmap numxf:3 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 auth algo 2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 encr TfmId 12 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: status=0 merror:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs # of TS:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs entered Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:0 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:1 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs responder: the remote switch ip is :: pxIPsecSa->dwIP 0.0.0.0 pxIPsecSa->dwIPEnd 255.255.255.255 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RAP Dynamic Map found Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [3 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [5 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> UseCustomCert: certNum:4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_serialNumber_string Cert-len:1713 Serial Number: 74:3D:96:8E:00:02:01:31:6E:85 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_subj_string Cert-len:1713 Subject: /CN=CNL2K2T1LL::20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in: status:0 authmtd:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth_tried:1 auth_supported:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> dh_tried:0 dh_supported:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> enc_tried:1 enc_supported:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> get the vlan 1435 from ip in pxSa Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ike2.c (953): errorCode = ERR_FRAGMENTATION_REQUIRED Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: adding IPSEC spi 0x8dbd2a00 to SPI hash table Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: successfully added IPSEC spi 0x8dbd2a00 to SPI hash table Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: Cookies : Initiator cookie:6d02aee0924140ce Responder cookie:a7d079572871a240 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: added sa entry to an existing mac entry Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: adding mac hash table entry for user 20:4c:03:d0:9e:94 version 2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: converted mac : 20:4c:3:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: found an existing mac entry salist numOfNodes 0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:1, idx:1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:2, idx:2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:3, idx:3 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:4, idx:4 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:5, idx:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests ip:85.XXX.XXX.XXX cookie:3678223884 auth:3 vpn:2 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests username: 20:4c:03:d0:9e:94 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Current cert index being considered: 0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Last cert has n parent in chain Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Size of certificate chain to be sorted: 1 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:324 Mar 29 22:33:29 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:530 Mar 29 22:33:29 isakmpd[3475]: <103076> <3475> |ike| IKEv2 IPSEC Tunnel created for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:29 isakmpd[3475]: <103077> <3475> |ike| IKEv2 IKE_SA succeeded for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:29 isakmpd[3475]: <103078> <3475> |ike| IKEv2 CHILD_SA successful for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:29 isakmpd[3475]: <103082> <3475> |ike| IKEv2 Client-Authentication succeeded for 192.168.237.11 (External 85.XXX.XXX.XXX) for default-vpn-role Mar 29 22:33:29 localdb[3578]: <133005> <3578> |localdb| User 20:4c:03:d0:9e:94 Successfully Authenticated Mar 29 22:33:29 localdb[3578]: <133028> <3578> |localdb| executeUSERDBMethod(127.0.0.1:8214 ==> 127.0.0.1:8344 PktType:0x402 SeqNum:40021 MsgCode:62): Received udb_msg with msgtype:62 id:95 reqtype:6 dbtype:13 Mar 29 22:33:29 localdb[3578]: <133108> <3578> |localdb| executeUSERDBMethod: Query for mac:20:4c:03:d0:9e:94 is successful locally with msgtype:62 id:95 reqtype:6 dbtype:13 Mar 29 22:33:29 localdb[3578]: <133122> <3578> |localdb| make_response: Sending response to 127.0.0.1:8214 with msgtype:79 id:95 reqtype:6 dbtype:13 Mar 29 22:33:29 snmp[3669]: <399816> <3669> |snmp| ../unix/../shared/notifyv3.c:304 Host's 10.141.99.60 engine ID not discovered. Traps do not get queued up. Mar 29 22:33:30 localdb[3578]: <133108> <4385> |localdb| udb_gsm_handle_cluster_aac_delete_event: whitelist_entry name 20:4c:03:d0:9e:94 is not auto-generated, don't delete Mar 29 22:33:33 isakmpd[3475]: <103063> <3475> |ike| exchange_start_ikev2 pre-connect check duplicate mapname:default-local-master-ipsecmap Mar 29 22:33:42 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4134 Auth ip down message.ip=192.168.237.11. flags 4 Mar 29 22:33:42 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4172 sa_xauth_downreturned ok for IP192.168.237.11: flag 4 Mar 29 22:33:42 isakmpd[3475]: <103060> <3475> |ike| sa.c:sa_xauth_down:2727 ikev2_sa_xauth_down success ip 192.168.237.11 flag 4 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| Deleted the IPSEC SA --- DONE !! Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing spi 0x8dbd2a00 from hash table Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| DP SA out:0 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:8dbd2a00 oppspi:cc656c00 esrc:85.XXX.XXX.XXX edst:10.140.35.2 dstnet:0.0.0.0 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 family: Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| DP SA out:1 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:cc656c00 oppspi:8dbd2a00 esrc:10.140.35.2 edst:85.XXX.XXX.XXX dstnet:192.168.237.11 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 f Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IKE_resetInnerIP: Reset innerip:192.168.237.11 in IKESA Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa (RESPONDER) Outgoing=1 SADB Proto:50 SPI:cc656c00 OppSPI:8dbd2a00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa freeing pxsa 0x9805d4 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing entry from m_hashTableOutbnd. RAP: 1 Innerip: 192.168.237.11 Dst: 85.XXX.XXX.XXX Src: 10.140.35.2 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: freeing innerip:192.168.237.11 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| IPSEC_deleteSaByInnerIPExtIP delete IPSEC SA 85.XXX.XXX.XXX:(inner:192.168.237.11) Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:cc656c00 ispi:8dbd2a00 auth:2 len:20 enc:4 len:32 add:0 out:1 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| freeL2TPIP freeing IP 192.168.237.11 from pool Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| ipsec_spi_hash_tbl_entry_remove: Successfully removed IPSEC spi 0x8dbd2a00 from SPI hash table Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Delete: 0 IKE_ SA's Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> <-- R#SEND 84 bytes to 85.XXX.XXX.XXX(58360) (936493.559) Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth=sha1 encr=aes Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=INFORMATIONAL msgid=2 len=80 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={6d02aee0924140ce a7d079572871a240} np=E{D} Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 84 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936493.558) Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:37 bReq:0 dwMsgId:2 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:84 numSkts:56 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> cleanup_and_free_context delete ctx memory Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:33:42 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:84 Mar 29 22:33:42 isakmpd[3475]: <103069> <3475> |ike| IKE received AP DOWN for 192.168.237.11 (External 85.XXX.XXX.XXX) Mar 29 22:33:42 isakmpd[3475]: <103101> <3475> |ike| IPSEC SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:33:42 isakmpd[3475]: <103103> <3475> |ike| IPSec SA Deletion: IPSEC_delSa SPI:cc656c00 OppSPI:8dbd2a00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 flags:1001 dstPort:0 srcPort:0 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| Cookies : Initiator cookie:6d02aee0924140ce new sa Initiator cookie:6d02aee0924140ce Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| Cookies : Responder cookie:a7d079572871a240 new sa Responder cookie:a7d079572871a240 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE_SA (id=0xdb3d3e0c) deleted Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| , status = -8972 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before 2nd IKE2_delXchg Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before IKE2_delXchg Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa sa:0xbec3e4 peer:85.XXX.XXX.XXX:58360 id:3678223884 err:0 saflags:30100059 arflags:5 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: deleting IPSEC SA 85.XXX.XXX.XXX:58360 due to deletion of un-rekeyed IKE_SA Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: isarubaAp 1 isarubaCampusAp 0 isMasterLocal 0 isBOC 0 ispeeruplinkfailover 0 username 20:4c:03:d0:9e:94 before calling mac_hash_tbl_delete_sa_entry Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_delXchg Deleting exchange Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA for peer 85.XXX.XXX.XXX:58360 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| IKE_deleteHW_state cookies:55de5b2e:e3f8 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| ikev2_same_sa: LB :0 Entry Tag: Host: 10.140.35.2 Mar 29 22:33:44 isakmpd[3475]: <103063> <3475> |ike| mac_hash_tbl_delete_sa_entry: deleting for mac 20:4c:03:d0:9e:94 Mar 29 22:33:44 isakmpd[3475]: <103102> <3475> |ike| IKE SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:33:44 isakmpd[3475]: <103103> <3475> |ike| IKE SA Deletion: IKE2_delSa peer:85.XXX.XXX.XXX:58360 id:3678223884 errcode:OK saflags:0x30100059 arflags:0x5 Mar 29 22:33:54 isakmpd[3475]: <103063> <3475> |ike| exchange_start_ikev2 pre-connect check duplicate mapname:default-local-master-ipsecmap Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:482 Obtained DH1 response from SAE Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:488 pxSa obtained fine Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:496 pDGctx obtained fine Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:509 DH1 response: peer 85.XXX.XXX.XXX sos_pending 0 grouplen 256 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:527 Initiating DH2 request to SAE Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:544 Got a DH2 response from SAE Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:550 pxSa obtained correctly Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:557 pDHctx obtained fine Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:569 DH2 response: peer 85.XXX.XXX.XXX sos_pending 0 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:585 DH2 completed successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:662 Obtained result from SAE response Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:668 param struct obtained correctly from SAE response Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:674 rsa arg obtained correctly Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:692 Peer:85.XXX.XXX.XXX obtained result frm param struct correctly from SAE response. Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:731 obtained context struct correctly from dh hw tbl Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:311 rsa param allocated successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:318 rsa result allocated successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:327 rsa arg allocated successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:372 plen = 24 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:431 nlm_crypto_do_op returned success, success code = 0 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:444 DH2 request: peer: 85.XXX.XXX.XXX dhflags:4 sos_pending:1 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipc.c:controlplaneRouteModify:8256 Failed to Delete Route in Kernel: error:No such process Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:311 rsa param allocated successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:318 rsa result allocated successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:327 rsa arg allocated successfully Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:372 plen = 24 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:431 nlm_crypto_do_op returned success, success code = 0 Mar 29 22:34:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:441 DH1 request: peer: 85.XXX.XXX.XXX dhflags:1 sos_pending:1 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| NAT_D (peer): dd 45 97 d1 59 6a 95 64 5a c4 f9 be 4a 4b a4 f6 24 77 25 f6 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| <-- R NAT_D (us): ee 6e d9 81 dd 7e 39 73 9d bb de c4 6d 5b 72 5d 54 1c 2b 8b Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| #SEND 653 bytes to 85.XXX.XXX.XXX(58360) (936544.278) Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| OutKe Responder grp:ike 14 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| OutTfm_R Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| OutVid: added Fragmentation vendor-id Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| cleanup_and_free_context delete ctx memory Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| group_get entered id:14 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| group_get group:0x9931b4 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| group_get ike_group:0x5e71b0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| initR_in_Continued: IKE2_msgRecv_resume status:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| modp_free entered Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| modp_init entered Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| xlp_rcv_response: Nothing to be read from cryptolib fd Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 4: At Mon Mar 29 22:27:06: ap cookie ffffff8bffffff983b51ffffffafffffffe35f6f ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Notify: NAT_DETECTION_DESTINATION_IP NAT_D (us/NAT): f5 62 57 d9 56 01 9a 6a 96 d7 bd 77 48 c9 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: 17 25 f0 89 27 42 ea 52 3b 79 ec 84 8c 97 20 1a 30 94 d6 c5 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: 46 a2 59 57 34 2a e8 09 8e ec e5 b9 f9 9f 0c 8c d4 f1 3d ba 1b e2 63 f2 93 99 88 90 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: bb 4f ff d1 8f 6e c5 b1 be ee 5e e1 11 38 4d 8f 69 37 28 bb 20 4c 03 d0 9e 94 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: ca 3e 2b 85 4b a8 03 00 17 dc 10 23 a4 fd e2 04 1f 9f 74 63 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Notify: COOKIE (IKE) Proposal #1: IKE(4) 256-BITS 256-BITS 256-BITS 256-BITS 256-BITS Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 10: At Mon Mar 29 22:28:13: ap cookie 5fffffff81ffffff904bffffffeeffffffd5ffffff83ffffffef ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 16: At Mon Mar 29 22:29:09: ap cookie ffffff936fffffffae13ffffff8effffff8afffffff54c ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 22: At Mon Mar 29 22:30:16: ap cookie 6cffffffb431ffffffaf152170ffffffbf ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 28: At Mon Mar 29 22:31:23: ap cookie ffffffefffffff93ffffff9f2afffffffb7f6cffffffa0 ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 34: At Mon Mar 29 22:32:20: ap cookie 6269ffffffb9ffffff9effffffd4ffffffb6ffffffe42e ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 40: At Mon Mar 29 22:33:26: ap cookie ffffff873076ffffff80ffffff9453ffffffbe7e ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> <-- R Notify: COOKIE#SEND 60 bytes to 85.XXX.XXX.XXX(58360) (936544.233) Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> check_aruba_ap_vid: aruba ap eth0 mac address 204c03d09e94 vidLen = 26 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> e7 fd 68 e5 30 78 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_SA_INIT msgid=0 len=547 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_SA_INIT msgid=0 len=575 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 0000000000000000} np=N Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 0000000000000000} np=SA Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 551 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936544.232) Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 579 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936544.258) Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 256-BITS 256-BITS Notify: NAT_DETECTION_SOURCE_IP NAT_D (peer/NAT): 5f d4 0c 68 7f ef 5b ed 67 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Aruba Fragmentation request is received Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Aruba RAP detected Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> DH_allocateServer: postponing further processing until DH H/w completes Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Detected peer using TPM Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Enabling Fragmentation for this SA Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_checkCookie finished with ipsecSa:(nil) status:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_checkCookie notify-cookie ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv_resume dh1 pending, skipping outstanding send Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:34 bReq:0 dwMsgId:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:551 numSkts:56 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:579 numSkts:56 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_allocSa sa:0xbede1c peer:85.XXX.XXX.XXX:58360 id:1530740237 timestart:936544258 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup DH group 14 matched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Mismatched DH group. Proposed group 14, expected group 19 from policy Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Mismatched DH group. Proposed group 14, expected group 2 from policy Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Mismatched DH group. Proposed group 14, expected group 20 from policy Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Proposed DH group 14 matched with policy Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_cipherSuite Encryption algorithm AES matched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_cipherSuite: TfmId:12 policy-enc:12 keylen:32 policy-keylen:16 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_cipherSuite: TfmId:12 policy-enc:12 keylen:32 policy-keylen:32 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_hashSuite PRF method HMAC_SHA2_256 matched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_hashSuite PRF method mismatched. Proposed HMAC_SHA2_256, expected HMAC_SHA1 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_hashSuite PRF method mismatched. Proposed HMAC_SHA2_256, expected HMAC_SHA2_384 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite integrity algorithm HMAC_SHA2_256_128 matched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite integrity algorithm mismatched. Proposed HMAC_SHA2_256_128, expected HMAC_SHA1_96 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite integrity algorithm mismatched. Proposed HMAC_SHA2_256_128, expected HMAC_SHA2_384_192 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10004 mac:2 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10006 mac:2 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10007 mac:2 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10008 mac:12 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10009 mac:13 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10012 mac:2 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10014 mac:12 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_findSaByIP addr:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_findSaByIP finished with pxSa:(nil) status:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_findSaByIP pxSa:(nil) status:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InKe initiator:NO Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InKe responder: grp:ike 14 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InNotify notify-cookie Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm DH group mismatched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Encryption algorithm AES mismatched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10004, merror -8963 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10006, merror -8963 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10007, merror -8963 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10008, merror -8963 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10009, merror -8963 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10012, merror -8961 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm PRF method HMAC_SHA2_256 mismatched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Using Policy 10014, setting IKE_SA lifetime to 28800 seconds Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm entered isakmp:0x87a52c Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm integrity algorithm HMAC_SHA2_256_128 mismatched Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10004 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10006 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10007 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10008 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10009 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10012 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10014 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm: status=0 merror:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InVid Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Logging AP Error Vendor ID in debug infra Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> OutInfo notify-cookie Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> check_aruba_vid: aruba ap eth0 mac address 204c03d09e94 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> check_aruba_vid: vlen 29 aruba ap cookie 1be263f293998890 ap err 4e Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> cleanup_and_free_context delete ctx memory Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify after close sock:48 with ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify after ioctl sock:48 with ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify after socket:48 with ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify entered with ip:85.XXX.XXX.XXX/255.255.255.255 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify socket:48 request:35084 dev:tsgw rtflags:0 with ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> d6 82 57 1c b9 73 69 65 30 e4 46 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> delete_cp_route entered with ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> delete_cp_route finished with ip:85.XXX.XXX.XXX Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> group_get entered id:14 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> group_get group:0x981a0c Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> group_get ike_group:0x5e71b0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> modp_init entered Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:551 Mar 29 22:34:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:579 Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| ipc.c:controlplaneRouteModify:8267 Add Route 192.168.237.11/255.255.255.255 to routing table Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| ipc.c:is_HA_crypto_map_present:3094 Looking for MAP default-ha-ipsecmap85.XXX.XXX.XXX Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_rsasign_response_ikev2:618 received response from RSA engine for rsa sign request Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:662 Obtained result from SAE response Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:668 param struct obtained correctly from SAE response Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:674 rsa arg obtained correctly Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:692 Peer:85.XXX.XXX.XXX obtained result frm param struct correctly from SAE response. Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:731 obtained context struct correctly from dh hw tbl Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1120 rsa param allocated successfully Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1127 rsa result allocated successfully Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1136 rsa arg allocated successfully Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1189 nlm_crypto_do_op returned success, success code = 0 Mar 29 22:34:36 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> mocana_interface.c:pap_ikev2_auth_requests:1701 user=20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| '16'([4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| '17'([4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| '18'([4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| <-- R CFG_REPLY IP4_ADDRESS(192.168.237.11) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| CHILD_SA [v2 R Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ESP spi=3f97bf00 10.140.35.2 << 85.XXX.XXX.XXX udp-enc(58360)* spd=0(0) exp=7200 secs auth=sha1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_SA [v2 R Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| encr=aes ESP spi=c436ea00 85.XXX.XXX.XXX << 10.140.35.2 udp-enc(58360)* spd=0(0) exp=7200 secs Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Added the IPSEC SA --- DONE !! Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey(ike=db3d3e0d) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Peer:AUTH_HMAC_SHA1_96 Peer:ESN_0 HASH_r 93 c5 9e 6c 67 59 a0 aa a3 65 25 ff fd 01 4f 4f c1 c5 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ragcfg IKECFG_SAMPLE_getAttrs innerip:c0a8ed0b g_switch_ip:a8c2302 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| #SEND 5412 bytes to 85.XXX.XXX.XXX(58360) (936547.8) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| *** ipc_auth_recv_packet user=20:4c:03:d0:9e:94, pass=******, result=0 ctx:0x98419c, ctx-innerip::: l2tp_pool:default-l2tp-pool Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 25 c8 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:16 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:17 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:18 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| DP SA out:0 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:3f97bf00 oppspi:c436ea00 esrc:85.XXX.XXX.XXX edst:10.140.35.2 dstnet:0.0.0.0 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 family: Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| DP SA out:1 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:c436ea00 oppspi:3f97bf00 esrc:10.140.35.2 edst:85.XXX.XXX.XXX dstnet:192.168.237.11 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 f Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| DoCfgReq Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey id:3678223885 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey k:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey k:0 swapping spi/dst/src Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey k:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey spi:3f97bf00 opp-spi:c436ea00 src:85.XXX.XXX.XXX dst:10.140.35.2 initiator:NO out:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey spi:c436ea00 opp-spi:3f97bf00 src:10.140.35.2 dst:85.XXX.XXX.XXX initiator:NO out:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IKE_useCert certchain:0x99fedc Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IPSEC_keyAddEx spdid:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IPSEC_newSa Added outbound-hash for pxSa 0x9805d4 IP:85.XXX.XXX.XXX status:0 inbound:0 hash:137848742 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| IPSEC_newSa SADB:0x9805d4 Proto:50 SPI:c436ea00 OppSPI:3f97bf00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255.255.255.255 S Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| OutCp entered Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| OutTfm2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| OutTs : responder no:0 start:0.0.0.0 end:255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| OutTs : responder no:1 start:0.0.0.0 end:255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending no:1 fragment out of 7 fragments, size = 900 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending no:2 fragment out of 7 fragments, size = 900 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending no:3 fragment out of 7 fragments, size = 900 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending no:4 fragment out of 7 fragments, size = 900 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending no:5 fragment out of 7 fragments, size = 900 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending no:6 fragment out of 7 fragments, size = 900 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| Sending last fragment, size = 260 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:c436ea00 ispi:3f97bf00 auth:2 len:20 enc:4 len:32 add:1 out:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| authR_out Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| cleanup_and_free_context delete ctx memory Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after close sock:48 with ip:192.168.237.11 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after ioctl sock:48 with ip:192.168.237.11 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after socket:48 with ip:192.168.237.11 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify entered with ip:192.168.237.11/255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify socket:48 request:35083 dev:tsgw rtflags:1 with ip:192.168.237.11 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| exchange_start_ikev2 pre-connect check duplicate mapname:default-local-master-ipsecmap Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| get_ikev2_internal_ip Inner-ip from AAA 192.168.237.11, DNS1:0.0.0.0, DNS2:0.0.0.0, WINS1:0.0.0.0, WINS2:0.0.0.0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet calling client_auth_ip_up for InnerIP 192.168.237.11, c0a8ed0b, extip 85.XXX.XXX.XXX Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet cookie:3678223885 innerip 0.0.0.0 inneripv6 :: Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet removing ctx 98419c from auth-list. auth-cookie 3678223885 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet rsa signature pending, skipping outstanding send Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet rsp.cluster_rap_innerip 192.168.237.11 rsp.cluster_rap_inneripv6 0.0.0.0 rsp.inner_ip 0.0.0.0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet:4890 sa cert-type 1, db cert-type 1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| xlp_rcv_response: Nothing to be read from cryptolib fd Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IP4_ADDRESS IP4_NETMASK TSi: 0.0.0.0~255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_keyDelete(raddr=85.XXX.XXX.XXX) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Proposal #1: ESP(5) spi=c436ea00 Peer:ENCR_AES_GCM_16 256-BITS unsupported Expected:ENCR_AES Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> HASH_i 3b 89 ea 97 1c e1 f5 d6 fb d0 dc 9d 98 87 90 3d 05 d5 89 c8 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> TSr: 0.0.0.0~255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Notify: INITIAL_CONTACT CFG_REQUEST Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 320 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 526 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 320, dwBodyLen = 292 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 526, dwBodyLen = 498 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1664 pxSa = 0xbede1c Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> INITIAL _CONTACT received delete child SA's for ip = 85.XXX.XXX.XXX port = 58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Peer:ENCR_AES 256-BITS Peer:ENCR_3DES unsupported Expected:ENCR_AES 256-BITS Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=2272 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=320 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=526 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 6e77f8ec06012db5} np=E{IDi} Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 6e77f8ec06012db5} np=FGMT Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 2276 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.967) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 324 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.966) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.952) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.958) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.960) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936546.964) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 256-BITS Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> DoSa2_R : detected VPN client Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv:2018: IKE2_msgRecv Called Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv_resume auth pending, skipping outstanding send Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:35 bReq:0 dwMsgId:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 320 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 526 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert trying device cert cert for RAP Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: found valid Server-Cert:Aruba-Factory-Server-Cert-Chain Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: got 4 certs Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:324 numSkts:56 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:530 numSkts:56 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certAssign natt port:58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : ARUBA cert MAC:20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : cert CN:20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey num-certs:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey: Aruba AP cert validated successfully against device ca cert Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:0 cert-len:733 cert:0x8ee4f4 key:0x8ff4bc keylen:2019 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:1 cert-len:1711 cert:0x8f32dc key:(nil) keylen:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:2 cert-len:1079 cert:0x8f4b8c key:(nil) keylen:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:3 cert-len:1333 cert:0x8f919c key:(nil) keylen:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain num:4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain status:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_fragRecv Rcvd all 0 fragments Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:4500 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:55700 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56726 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56978 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58128 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58197 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:63223 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:64146 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:500 peer-natt:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId NATT peer-port:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId status:0 peer-port:0 peer-natt:58360 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: calling mac_hash_tbl_entry_add for username 20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: isarubaCampusAP 0 isarubaAP 1 isMasterLocal 0 isBOC 0 peeruplinkfailover 0 username 20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_useCert certchain:(nil) Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InAuthSig certNum:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp : detected VPN client Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa0: calling IKE2_newIPsecSa Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: InTfmX_R status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Responder SPI:3f97bf00 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Successfully added Responder SPI:3f97bf00 to SPI hash table Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after initIPsecKey status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: before initIPsecKey status:0 bMatch:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: dwSpi[I Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 authAlgo:2 len:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 encrAlgo:12 len:32 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : dstip:0.0.0.0 srcip:0.0.0.0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : Initialize ipsecKeyEx Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R Accepting map:default-rap-ipsecmap transform:default-rap-transform Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R setting IPSEC_SA map lifetime:7200 in seconds Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying ipsec-xf:default-rap-transform Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying map:default-rap-ipsecmap numxf:3 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 auth algo 2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 encr TfmId 12 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: status=0 merror:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs # of TS:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs entered Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:0 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:1 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs responder: the remote switch ip is :: pxIPsecSa->dwIP 0.0.0.0 pxIPsecSa->dwIPEnd 255.255.255.255 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RAP Dynamic Map found Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [3 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [5 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> UseCustomCert: certNum:4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_serialNumber_string Cert-len:1713 Serial Number: 74:3D:96:8E:00:02:01:31:6E:85 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_subj_string Cert-len:1713 Subject: /CN=CNL2K2T1LL::20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in: status:0 authmtd:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth_tried:1 auth_supported:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> dh_tried:0 dh_supported:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> enc_tried:1 enc_supported:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> get the vlan 1435 from ip in pxSa Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ike2.c (953): errorCode = ERR_FRAGMENTATION_REQUIRED Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: adding IPSEC spi 0x3f97bf00 to SPI hash table Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: successfully added IPSEC spi 0x3f97bf00 to SPI hash table Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: Cookies : Initiator cookie:50a6726b71a5a65f Responder cookie:6e77f8ec06012db5 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: added sa entry to an existing mac entry Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: adding mac hash table entry for user 20:4c:03:d0:9e:94 version 2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: converted mac : 20:4c:3:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: found an existing mac entry salist numOfNodes 0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:1, idx:1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:2, idx:2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:3, idx:3 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:4, idx:4 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:5, idx:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests ip:85.XXX.XXX.XXX cookie:3678223885 auth:3 vpn:2 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests username: 20:4c:03:d0:9e:94 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Current cert index being considered: 0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Last cert has n parent in chain Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Size of certificate chain to be sorted: 1 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:324 Mar 29 22:34:36 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:530 Mar 29 22:34:36 isakmpd[3475]: <103076> <3475> |ike| IKEv2 IPSEC Tunnel created for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:36 isakmpd[3475]: <103077> <3475> |ike| IKEv2 IKE_SA succeeded for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:36 isakmpd[3475]: <103078> <3475> |ike| IKEv2 CHILD_SA successful for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:36 isakmpd[3475]: <103082> <3475> |ike| IKEv2 Client-Authentication succeeded for 192.168.237.11 (External 85.XXX.XXX.XXX) for default-vpn-role Mar 29 22:34:36 localdb[3578]: <133005> <3578> |localdb| User 20:4c:03:d0:9e:94 Successfully Authenticated Mar 29 22:34:36 localdb[3578]: <133028> <3578> |localdb| executeUSERDBMethod(127.0.0.1:8214 ==> 127.0.0.1:8344 PktType:0x402 SeqNum:40110 MsgCode:62): Received udb_msg with msgtype:62 id:96 reqtype:6 dbtype:13 Mar 29 22:34:36 localdb[3578]: <133108> <3578> |localdb| executeUSERDBMethod: Query for mac:20:4c:03:d0:9e:94 is successful locally with msgtype:62 id:96 reqtype:6 dbtype:13 Mar 29 22:34:36 localdb[3578]: <133122> <3578> |localdb| make_response: Sending response to 127.0.0.1:8214 with msgtype:79 id:96 reqtype:6 dbtype:13 Mar 29 22:34:36 snmp[3669]: <399816> <3669> |snmp| ../unix/../shared/notifyv3.c:304 Host's 10.141.99.60 engine ID not discovered. Traps do not get queued up. Mar 29 22:34:39 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4134 Auth ip down message.ip=192.168.237.11. flags 4 Mar 29 22:34:39 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4172 sa_xauth_downreturned ok for IP192.168.237.11: flag 4 Mar 29 22:34:39 isakmpd[3475]: <103060> <3475> |ike| sa.c:sa_xauth_down:2727 ikev2_sa_xauth_down success ip 192.168.237.11 flag 4 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| Deleted the IPSEC SA --- DONE !! Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing spi 0x3f97bf00 from hash table Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| DP SA out:0 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:3f97bf00 oppspi:c436ea00 esrc:85.XXX.XXX.XXX edst:10.140.35.2 dstnet:0.0.0.0 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 family: Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| DP SA out:1 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:c436ea00 oppspi:3f97bf00 esrc:10.140.35.2 edst:85.XXX.XXX.XXX dstnet:192.168.237.11 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 f Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IKE_resetInnerIP: Reset innerip:192.168.237.11 in IKESA Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa (RESPONDER) Outgoing=1 SADB Proto:50 SPI:c436ea00 OppSPI:3f97bf00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa freeing pxsa 0x9805d4 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing entry from m_hashTableOutbnd. RAP: 1 Innerip: 192.168.237.11 Dst: 85.XXX.XXX.XXX Src: 10.140.35.2 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: freeing innerip:192.168.237.11 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| IPSEC_deleteSaByInnerIPExtIP delete IPSEC SA 85.XXX.XXX.XXX:(inner:192.168.237.11) Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:c436ea00 ispi:3f97bf00 auth:2 len:20 enc:4 len:32 add:0 out:1 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| freeL2TPIP freeing IP 192.168.237.11 from pool Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| ipsec_spi_hash_tbl_entry_remove: Successfully removed IPSEC spi 0x3f97bf00 from SPI hash table Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Delete: 0 IKE_ SA's Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> <-- R#SEND 84 bytes to 85.XXX.XXX.XXX(58360) (936550.329) Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth=sha1 encr=aes Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=INFORMATIONAL msgid=2 len=80 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={50a6726b71a5a65f 6e77f8ec06012db5} np=E{D} Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 84 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936550.328) Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:37 bReq:0 dwMsgId:2 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:84 numSkts:56 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> cleanup_and_free_context delete ctx memory Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:34:39 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:84 Mar 29 22:34:39 isakmpd[3475]: <103069> <3475> |ike| IKE received AP DOWN for 192.168.237.11 (External 85.XXX.XXX.XXX) Mar 29 22:34:39 isakmpd[3475]: <103101> <3475> |ike| IPSEC SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:34:39 isakmpd[3475]: <103103> <3475> |ike| IPSec SA Deletion: IPSEC_delSa SPI:c436ea00 OppSPI:3f97bf00 Dst:85.XXX.XXX.XXX Src:10.140.35.2 flags:1001 dstPort:0 srcPort:0 Mar 29 22:34:40 localdb[3578]: <133108> <4385> |localdb| udb_gsm_handle_cluster_aac_delete_event: whitelist_entry name 20:4c:03:d0:9e:94 is not auto-generated, don't delete Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| Cookies : Initiator cookie:50a6726b71a5a65f new sa Initiator cookie:50a6726b71a5a65f Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| Cookies : Responder cookie:6e77f8ec06012db5 new sa Responder cookie:6e77f8ec06012db5 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE_SA (id=0xdb3d3e0d) deleted Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| , status = -8972 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before 2nd IKE2_delXchg Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before IKE2_delXchg Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa sa:0xbede1c peer:85.XXX.XXX.XXX:58360 id:3678223885 err:0 saflags:30100059 arflags:5 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: deleting IPSEC SA 85.XXX.XXX.XXX:58360 due to deletion of un-rekeyed IKE_SA Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: isarubaAp 1 isarubaCampusAp 0 isMasterLocal 0 isBOC 0 ispeeruplinkfailover 0 username 20:4c:03:d0:9e:94 before calling mac_hash_tbl_delete_sa_entry Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_delXchg Deleting exchange Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA for peer 85.XXX.XXX.XXX:58360 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| IKE_deleteHW_state cookies:55de5b2e:e3f8 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| ikev2_same_sa: LB :0 Entry Tag: Host: 10.140.35.2 Mar 29 22:34:41 isakmpd[3475]: <103063> <3475> |ike| mac_hash_tbl_delete_sa_entry: deleting for mac 20:4c:03:d0:9e:94 Mar 29 22:34:41 isakmpd[3475]: <103102> <3475> |ike| IKE SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:34:41 isakmpd[3475]: <103103> <3475> |ike| IKE SA Deletion: IKE2_delSa peer:85.XXX.XXX.XXX:58360 id:3678223885 errcode:OK saflags:0x30100059 arflags:0x5 Mar 29 22:34:57 isakmpd[3475]: <103063> <3475> |ike| exchange_start_ikev2 pre-connect check duplicate mapname:default-local-master-ipsecmap Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:482 Obtained DH1 response from SAE Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:488 pxSa obtained fine Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:496 pDGctx obtained fine Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:509 DH1 response: peer 85.XXX.XXX.XXX sos_pending 0 grouplen 256 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh1_response_ikev2:527 Initiating DH2 request to SAE Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:544 Got a DH2 response from SAE Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:550 pxSa obtained correctly Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:557 pDHctx obtained fine Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:569 DH2 response: peer 85.XXX.XXX.XXX sos_pending 0 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_dh2_response_ikev2:585 DH2 completed successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:662 Obtained result from SAE response Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:668 param struct obtained correctly from SAE response Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:674 rsa arg obtained correctly Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:692 Peer:85.XXX.XXX.XXX obtained result frm param struct correctly from SAE response. Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:731 obtained context struct correctly from dh hw tbl Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:311 rsa param allocated successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:318 rsa result allocated successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:327 rsa arg allocated successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:372 plen = 24 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:431 nlm_crypto_do_op returned success, success code = 0 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_dh_request_x_ikev2:444 DH2 request: peer: 85.XXX.XXX.XXX dhflags:4 sos_pending:1 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipc.c:controlplaneRouteModify:8256 Failed to Delete Route in Kernel: error:No such process Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:311 rsa param allocated successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:318 rsa result allocated successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:327 rsa arg allocated successfully Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:372 plen = 24 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:431 nlm_crypto_do_op returned success, success code = 0 Mar 29 22:35:30 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> xlp_lib.c:xlp_send_dh_request_x_ikev2:441 DH1 request: peer: 85.XXX.XXX.XXX dhflags:1 sos_pending:1 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| NAT_D (peer): 8e 30 96 21 31 6d e5 7b 99 62 c8 f4 1d 96 7f 49 dc dd 4c ee Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| <-- R NAT_D (us): b6 0c be 2e 99 d5 b5 7d 08 9e 7b c6 2d 4b ea 5d 1d 8b dd 09 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| #SEND 653 bytes to 85.XXX.XXX.XXX(58360) (936600.988) Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| OutKe Responder grp:ike 14 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| OutTfm_R Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| OutVid: added Fragmentation vendor-id Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| cleanup_and_free_context delete ctx memory Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| group_get entered id:14 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| group_get group:0x9921a4 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| group_get ike_group:0x5e71b0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| initR_in_Continued: IKE2_msgRecv_resume status:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| modp_free entered Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| modp_init entered Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| xlp_rcv_response: Nothing to be read from cryptolib fd Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 4: At Mon Mar 29 22:28:13: ap cookie 5fffffff81ffffff904bffffffeeffffffd5ffffff83ffffffef ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Notify: NAT_DETECTION_DESTINATION_IP NAT_D (us/NAT): 20 72 56 56 76 8a 62 0f 93 90 71 db 52 a4 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: 17 25 f0 89 27 42 ea 52 3b 79 ec 84 8c 97 20 1a 30 94 d6 c5 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: 46 a2 59 57 34 2a e8 09 8e ec e5 b9 f9 9f 0c 8c d4 f1 3d ba cf e2 30 31 bc 19 c7 1c 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: bb 4f ff d1 8f 6e c5 b1 be ee 5e e1 11 38 4d 8f 69 37 28 bb 20 4c 03 d0 9e 94 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> VID: ca 3e 2b 85 4b a8 03 00 17 dc 10 23 a4 fd e2 04 1f 9f 74 63 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Notify: COOKIE (IKE) Proposal #1: IKE(4) 256-BITS 256-BITS 256-BITS 256-BITS 256-BITS Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 10: At Mon Mar 29 22:29:09: ap cookie ffffff936fffffffae13ffffff8effffff8afffffff54c ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 16: At Mon Mar 29 22:30:16: ap cookie 6cffffffb431ffffffaf152170ffffffbf ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 22: At Mon Mar 29 22:31:23: ap cookie ffffffefffffff93ffffff9f2afffffffb7f6cffffffa0 ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 28: At Mon Mar 29 22:32:20: ap cookie 6269ffffffb9ffffff9effffffd4ffffffb6ffffffe42e ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 34: At Mon Mar 29 22:33:26: ap cookie ffffff873076ffffff80ffffff9453ffffffbe7e ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 40: At Mon Mar 29 22:34:33: ap cookie 1bffffffe263fffffff2ffffff93ffffff99ffffff88ffffff90 ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> <-- R Notify: COOKIE#SEND 60 bytes to 85.XXX.XXX.XXX(58360) (936600.940) Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> check_aruba_ap_vid: aruba ap eth0 mac address 204c03d09e94 vidLen = 26 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 13 6e 4c 87 26 36 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_SA_INIT msgid=0 len=547 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_SA_INIT msgid=0 len=575 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={58ade03142c91388 0000000000000000} np=N Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={58ade03142c91388 0000000000000000} np=SA Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 551 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936600.938) Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 579 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936600.964) Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 256-BITS 256-BITS Notify: NAT_DETECTION_SOURCE_IP NAT_D (peer/NAT): ea f8 a5 21 0c 3e 24 64 76 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 30 97 91 c6 d3 62 89 c3 cd 25 fb Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Aruba Fragmentation request is received Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Aruba RAP detected Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> DH_allocateServer: postponing further processing until DH H/w completes Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Detected peer using TPM Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Enabling Fragmentation for this SA Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_checkCookie finished with ipsecSa:(nil) status:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_checkCookie notify-cookie ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv_resume dh1 pending, skipping outstanding send Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:34 bReq:0 dwMsgId:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:551 numSkts:56 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:579 numSkts:56 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_allocSa sa:0xbef854 peer:85.XXX.XXX.XXX:58360 id:1530740238 timestart:936600965 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup DH group 14 matched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Mismatched DH group. Proposed group 14, expected group 19 from policy Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Mismatched DH group. Proposed group 14, expected group 2 from policy Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Mismatched DH group. Proposed group 14, expected group 20 from policy Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_checkGroup Proposed DH group 14 matched with policy Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_cipherSuite Encryption algorithm AES matched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_cipherSuite: TfmId:12 policy-enc:12 keylen:32 policy-keylen:16 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_cipherSuite: TfmId:12 policy-enc:12 keylen:32 policy-keylen:32 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_hashSuite PRF method HMAC_SHA2_256 matched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_hashSuite PRF method mismatched. Proposed HMAC_SHA2_256, expected HMAC_SHA1 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_hashSuite PRF method mismatched. Proposed HMAC_SHA2_256, expected HMAC_SHA2_384 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite integrity algorithm HMAC_SHA2_256_128 matched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite integrity algorithm mismatched. Proposed HMAC_SHA2_256_128, expected HMAC_SHA1_96 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite integrity algorithm mismatched. Proposed HMAC_SHA2_256_128, expected HMAC_SHA2_384_192 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10004 mac:2 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10006 mac:2 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10007 mac:2 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10008 mac:12 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10009 mac:13 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10012 mac:2 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_macSuite: TfmId:12 policy:10014 mac:12 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_findSaByIP addr:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_findSaByIP finished with pxSa:(nil) status:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_findSaByIP pxSa:(nil) status:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InKe initiator:NO Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InKe responder: grp:ike 14 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InNotify notify-cookie Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm DH group mismatched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Encryption algorithm AES mismatched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10004, merror -8963 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10006, merror -8963 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10007, merror -8963 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10008, merror -8963 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10009, merror -8963 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Ignoring policy 10012, merror -8961 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm PRF method HMAC_SHA2_256 mismatched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm Using Policy 10014, setting IKE_SA lifetime to 28800 seconds Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm entered isakmp:0x87a52c Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm integrity algorithm HMAC_SHA2_256_128 mismatched Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10004 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10006 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10007 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10008 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10009 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10012 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm trying policy: 10014 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm: status=0 merror:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InVid Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Logging AP Error Vendor ID in debug infra Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> OutInfo notify-cookie Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> check_aruba_vid: aruba ap eth0 mac address 204c03d09e94 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> check_aruba_vid: vlen 29 aruba ap cookie cfe23031bc19c71c ap err 4e Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> cleanup_and_free_context delete ctx memory Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify after close sock:48 with ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify after ioctl sock:48 with ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify after socket:48 with ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify entered with ip:85.XXX.XXX.XXX/255.255.255.255 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> controlplaneRouteModify socket:48 request:35084 dev:tsgw rtflags:0 with ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> delete_cp_route entered with ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> delete_cp_route finished with ip:85.XXX.XXX.XXX Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> group_get entered id:14 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> group_get group:0x9921a4 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> group_get ike_group:0x5e71b0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> modp_init entered Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:551 Mar 29 22:35:30 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:579 Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| ipc.c:controlplaneRouteModify:8267 Add Route 192.168.237.11/255.255.255.255 to routing table Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| ipc.c:is_HA_crypto_map_present:3094 Looking for MAP default-ha-ipsecmap85.XXX.XXX.XXX Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:process_xlp_rsasign_response_ikev2:618 received response from RSA engine for rsa sign request Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:662 Obtained result from SAE response Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:668 param struct obtained correctly from SAE response Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:674 rsa arg obtained correctly Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:692 Peer:85.XXX.XXX.XXX obtained result frm param struct correctly from SAE response. Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_rcv_response:731 obtained context struct correctly from dh hw tbl Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1120 rsa param allocated successfully Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1127 rsa result allocated successfully Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1136 rsa arg allocated successfully Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| xlp_lib.c:xlp_send_rsasign_request_ikev2:1189 nlm_crypto_do_op returned success, success code = 0 Mar 29 22:35:33 isakmpd[3475]: <103060> <3475> |ike| 85.XXX.XXX.XXX:58360-> mocana_interface.c:pap_ikev2_auth_requests:1701 user=20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| '16'([4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| '17'([4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| '18'([4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| <-- R CFG_REPLY IP4_ADDRESS(192.168.237.11) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| CHILD_SA [v2 R Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ESP spi=4b1e0300 10.140.35.2 << 85.XXX.XXX.XXX udp-enc(58360)* spd=0(0) exp=7200 secs auth=sha1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_SA [v2 R Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| encr=aes ESP spi=d9f68500 85.XXX.XXX.XXX << 10.140.35.2 udp-enc(58360)* spd=0(0) exp=7200 secs Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Added the IPSEC SA --- DONE !! Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey(ike=db3d3e0e) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Peer:AUTH_HMAC_SHA1_96 Peer:ESN_0 HASH_r fe db 05 ad 2d 4d d7 ea e1 07 2d 9e 7b a0 7b df 4a 17 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ragcfg IKECFG_SAMPLE_getAttrs innerip:c0a8ed0b g_switch_ip:a8c2302 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| #SEND 5412 bytes to 85.XXX.XXX.XXX(58360) (936603.720) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| *** ipc_auth_recv_packet user=20:4c:03:d0:9e:94, pass=******, result=0 ctx:0x994c24, ctx-innerip::: l2tp_pool:default-l2tp-pool Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 82 52 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:16 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:17 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| CheckCfgAttr type:18 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| DP SA out:0 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:4b1e0300 oppspi:d9f68500 esrc:85.XXX.XXX.XXX edst:10.140.35.2 dstnet:0.0.0.0 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 family: Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| DP SA out:1 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:d9f68500 oppspi:4b1e0300 esrc:10.140.35.2 edst:85.XXX.XXX.XXX dstnet:192.168.237.11 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 f Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| DoCfgReq Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey id:3678223886 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey k:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey k:0 swapping spi/dst/src Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey k:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey spi:4b1e0300 opp-spi:d9f68500 src:85.XXX.XXX.XXX dst:10.140.35.2 initiator:NO out:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_addIPsecKey spi:d9f68500 opp-spi:4b1e0300 src:10.140.35.2 dst:85.XXX.XXX.XXX initiator:NO out:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IKE_useCert certchain:0x99fedc Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IPSEC_keyAddEx spdid:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IPSEC_newSa Added outbound-hash for pxSa 0x9805d4 IP:85.XXX.XXX.XXX status:0 inbound:0 hash:137848742 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| IPSEC_newSa SADB:0x9805d4 Proto:50 SPI:d9f68500 OppSPI:4b1e0300 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255.255.255.255 S Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| OutCp entered Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| OutTfm2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| OutTs : responder no:0 start:0.0.0.0 end:255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| OutTs : responder no:1 start:0.0.0.0 end:255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending no:1 fragment out of 7 fragments, size = 900 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending no:2 fragment out of 7 fragments, size = 900 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending no:3 fragment out of 7 fragments, size = 900 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending no:4 fragment out of 7 fragments, size = 900 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending no:5 fragment out of 7 fragments, size = 900 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending no:6 fragment out of 7 fragments, size = 900 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| Sending last fragment, size = 260 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:d9f68500 ispi:4b1e0300 auth:2 len:20 enc:4 len:32 add:1 out:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| authR_out Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| cleanup_and_free_context delete ctx memory Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after close sock:48 with ip:192.168.237.11 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after ioctl sock:48 with ip:192.168.237.11 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify after socket:48 with ip:192.168.237.11 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify entered with ip:192.168.237.11/255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| controlplaneRouteModify socket:48 request:35083 dev:tsgw rtflags:1 with ip:192.168.237.11 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| get_ikev2_internal_ip Inner-ip from AAA 192.168.237.11, DNS1:0.0.0.0, DNS2:0.0.0.0, WINS1:0.0.0.0, WINS2:0.0.0.0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet calling client_auth_ip_up for InnerIP 192.168.237.11, c0a8ed0b, extip 85.XXX.XXX.XXX Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet cookie:3678223886 innerip 0.0.0.0 inneripv6 :: Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet removing ctx 994c24 from auth-list. auth-cookie 3678223886 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet rsa signature pending, skipping outstanding send Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet rsp.cluster_rap_innerip 192.168.237.11 rsp.cluster_rap_inneripv6 0.0.0.0 rsp.inner_ip 0.0.0.0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| ipc_ikev2_auth_recv_vpn_packet:4890 sa cert-type 1, db cert-type 1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| xlp_rcv_response: Nothing to be read from cryptolib fd Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IP4_ADDRESS IP4_NETMASK TSi: 0.0.0.0~255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IPSEC_keyDelete(raddr=85.XXX.XXX.XXX) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Proposal #1: ESP(5) spi=d9f68500 Peer:ENCR_AES_GCM_16 256-BITS unsupported Expected:ENCR_AES Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> HASH_i 3c 96 d9 ef 8a fc 6a 4b 7d 5f 6a 71 76 86 f0 10 e6 d7 2b d0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> TSr: 0.0.0.0~255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Notify: INITIAL_CONTACT CFG_REQUEST Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 320 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1608 dwLength = 526 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 320, dwBodyLen = 292 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1618 dwLength = 526, dwBodyLen = 498 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1664 pxSa = 0xbef854 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> INITIAL _CONTACT received delete child SA's for ip = 85.XXX.XXX.XXX port = 58360 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> Peer:ENCR_AES 256-BITS Peer:ENCR_3DES unsupported Expected:ENCR_AES 256-BITS Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=2272 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=320 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=IKE_AUTH msgid=1 len=526 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={58ade03142c91388 bf71be78647ba32d} np=E{IDi} Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={58ade03142c91388 bf71be78647ba32d} np=FGMT Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 2276 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936603.666) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 324 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936603.664) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936603.652) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936603.656) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936603.658) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 530 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936603.662) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> 256-BITS Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> CheckCfgAttr type:2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> DoSa2_R : detected VPN client Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv:2018: IKE2_msgRecv Called Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv_resume auth pending, skipping outstanding send Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:35 bReq:0 dwMsgId:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 320 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchg_reassemble:1588 ctx->BufferSize = 526 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert trying device cert cert for RAP Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: found valid Server-Cert:Aruba-Factory-Server-Cert-Chain Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_CUSTOM_useCert: got 4 certs Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:324 numSkts:56 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:530 numSkts:56 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certAssign natt port:58360 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : ARUBA cert MAC:20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey : cert CN:20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey num-certs:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certGetKey: Aruba AP cert validated successfully against device ca cert Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:0 cert-len:733 cert:0x8ee4f4 key:0x8ff4bc keylen:2019 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:1 cert-len:1711 cert:0x8f32dc key:(nil) keylen:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:2 cert-len:1079 cert:0x8f4b8c key:(nil) keylen:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain index:3 cert-len:1333 cert:0x8f919c key:(nil) keylen:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain num:4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_certSetChain status:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_fragRecv Rcvd all 0 fragments Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:4500 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:55700 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56726 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:56978 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58128 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58197 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:58360 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:63223 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:0 peer-natt:64146 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId IkeCertId peer-port:500 peer-natt:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId NATT peer-port:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_getCertId status:0 peer-port:0 peer-natt:58360 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: calling mac_hash_tbl_entry_add for username 20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initContSa: isarubaCampusAP 0 isarubaAP 1 isMasterLocal 0 isBOC 0 peeruplinkfailover 0 username 20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_initIPsecKey in:1 dstport:58360 srcport:4500 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_useCert certchain:(nil) Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InAuthSig certNum:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InCp : detected VPN client Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa0: calling IKE2_newIPsecSa Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: InTfmX_R status:0 bMatch:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Responder SPI:4b1e0300 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: Successfully added Responder SPI:4b1e0300 to SPI hash table Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA before BREAK status:0 bMatch:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT CHILD_SA status:0 bMatch:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after ACCEPT status:0 bMatch:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: after initIPsecKey status:0 bMatch:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: before initIPsecKey status:0 bMatch:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InSa: dwSpi[I Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 authAlgo:2 len:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R i:0 Cnt:1 encrAlgo:12 len:32 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : dstip:0.0.0.0 srcip:0.0.0.0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R : Initialize ipsecKeyEx Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R Accepting map:default-rap-ipsecmap transform:default-rap-transform Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R setting IPSEC_SA map lifetime:7200 in seconds Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying ipsec-xf:default-rap-transform Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R trying map:default-rap-ipsecmap numxf:3 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 auth algo 2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: selected cnt:0 encr TfmId 12 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTfm2_R: status=0 merror:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs # of TS:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs entered Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:0 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs no:1 IPV4 addr:0.0.0.0 end:255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> InTs responder: the remote switch ip is :: pxIPsecSa->dwIP 0.0.0.0 pxIPsecSa->dwIPEnd 255.255.255.255 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RAP Dynamic Map found Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [3 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> RE-ASSEMBLING FRAG NUM [5 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> UseCustomCert: certNum:4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_serialNumber_string Cert-len:1713 Serial Number: 74:3D:96:8E:00:02:01:31:6E:85 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> asn_cert_ike_subj_string Cert-len:1713 Subject: /CN=CNL2K2T1LL::20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> authR_in: status:0 authmtd:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth_tried:1 auth_supported:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> dh_tried:0 dh_supported:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> enc_tried:1 enc_supported:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> get the vlan 1435 from ip in pxSa Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ike2.c (953): errorCode = ERR_FRAGMENTATION_REQUIRED Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: adding IPSEC spi 0x4b1e0300 to SPI hash table Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> ipsec_spi_hash_tbl_entry_add: successfully added IPSEC spi 0x4b1e0300 to SPI hash table Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: Cookies : Initiator cookie:58ade03142c91388 Responder cookie:bf71be78647ba32d Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: added sa entry to an existing mac entry Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: adding mac hash table entry for user 20:4c:03:d0:9e:94 version 2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: converted mac : 20:4c:3:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> mac_hash_tbl_entry_add: found an existing mac entry salist numOfNodes 0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:1, idx:1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:2, idx:2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:3, idx:3 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:4, idx:4 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pFragHdr->oFragNum:5, idx:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests ip:85.XXX.XXX.XXX cookie:3678223886 auth:3 vpn:2 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> pap_ikev2_auth_requests username: 20:4c:03:d0:9e:94 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Current cert index being considered: 0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Last cert has n parent in chain Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> sort_certificate_chain: Size of certificate chain to be sorted: 1 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:324 Mar 29 22:35:33 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:530 Mar 29 22:35:33 isakmpd[3475]: <103076> <3475> |ike| IKEv2 IPSEC Tunnel created for peer 85.XXX.XXX.XXX:58360 Mar 29 22:35:33 isakmpd[3475]: <103077> <3475> |ike| IKEv2 IKE_SA succeeded for peer 85.XXX.XXX.XXX:58360 Mar 29 22:35:33 isakmpd[3475]: <103078> <3475> |ike| IKEv2 CHILD_SA successful for peer 85.XXX.XXX.XXX:58360 Mar 29 22:35:33 isakmpd[3475]: <103082> <3475> |ike| IKEv2 Client-Authentication succeeded for 192.168.237.11 (External 85.XXX.XXX.XXX) for default-vpn-role Mar 29 22:35:33 localdb[3578]: <133005> <3578> |localdb| User 20:4c:03:d0:9e:94 Successfully Authenticated Mar 29 22:35:33 localdb[3578]: <133028> <3578> |localdb| executeUSERDBMethod(127.0.0.1:8214 ==> 127.0.0.1:8344 PktType:0x402 SeqNum:40194 MsgCode:62): Received udb_msg with msgtype:62 id:97 reqtype:6 dbtype:13 Mar 29 22:35:33 localdb[3578]: <133108> <3578> |localdb| executeUSERDBMethod: Query for mac:20:4c:03:d0:9e:94 is successful locally with msgtype:62 id:97 reqtype:6 dbtype:13 Mar 29 22:35:33 localdb[3578]: <133122> <3578> |localdb| make_response: Sending response to 127.0.0.1:8214 with msgtype:79 id:97 reqtype:6 dbtype:13 Mar 29 22:35:39 isakmpd[3475]: <103063> <3475> |ike| exchange_start_ikev2 pre-connect check duplicate mapname:default-local-master-ipsecmap Mar 29 22:35:46 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4134 Auth ip down message.ip=192.168.237.11. flags 4 Mar 29 22:35:46 isakmpd[3475]: <103060> <3475> |ike| ipc.c:ipc_rcvcb:4172 sa_xauth_downreturned ok for IP192.168.237.11: flag 4 Mar 29 22:35:46 isakmpd[3475]: <103060> <3475> |ike| sa.c:sa_xauth_down:2727 ikev2_sa_xauth_down success ip 192.168.237.11 flag 4 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| Deleted the IPSEC SA --- DONE !! Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing spi 0x4b1e0300 from hash table Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| DP SA out:0 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:4b1e0300 oppspi:d9f68500 esrc:85.XXX.XXX.XXX edst:10.140.35.2 dstnet:0.0.0.0 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 family: Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| DP SA out:1 natt:1 mode:1 proto:1 cipher:4 auth:2 spi:d9f68500 oppspi:4b1e0300 esrc:10.140.35.2 edst:85.XXX.XXX.XXX dstnet:192.168.237.11 dstmask:0.0.0.0 nattport:58360 trust:0 dpd:0 ingress:0 sacl:0 f Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IKE_resetInnerIP: Reset innerip:192.168.237.11 in IKESA Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa (RESPONDER) Outgoing=1 SADB Proto:50 SPI:d9f68500 OppSPI:4b1e0300 Dst:85.XXX.XXX.XXX Src:10.140.35.2 natt:58360 Dport:0 Sport:0 Oprot:0 Mode:2 Inner:192.168.237.11 DstIP:0.0.0.0 DstIPe:255 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa freeing pxsa 0x9805d4 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: Removing entry from m_hashTableOutbnd. RAP: 1 Innerip: 192.168.237.11 Dst: 85.XXX.XXX.XXX Src: 10.140.35.2 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IPSEC_delSa: freeing innerip:192.168.237.11 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| IPSEC_deleteSaByInnerIPExtIP delete IPSEC SA 85.XXX.XXX.XXX:(inner:192.168.237.11) Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| arubaIPSecSetKeys:IPSECKEY proto:50 ospi:d9f68500 ispi:4b1e0300 auth:2 len:20 enc:4 len:32 add:0 out:1 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| freeL2TPIP freeing IP 192.168.237.11 from pool Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| ipsec_spi_hash_tbl_entry_remove: Successfully removed IPSEC spi 0x4b1e0300 from SPI hash table Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> --> R Delete: 0 IKE_ SA's Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> <-- R#SEND 84 bytes to 85.XXX.XXX.XXX(58360) (936617.45) Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> auth=sha1 encr=aes Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> exchange=INFORMATIONAL msgid=2 len=80 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> spi={58ade03142c91388 bf71be78647ba32d} np=E{D} Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> #RECV 84 bytes from 85.XXX.XXX.XXX(58360) at 10.140.35.2 (936617.44) Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_delXchg Deleting exchange Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_msgRecv: dwPeerAddr: 55de5b2e wPeerPort: e3f8 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg before delXchg Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_newXchg oExchange:37 bReq:0 dwMsgId:2 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE2_xchgIn:1400 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv: ip:85.XXX.XXX.XXX port:58360 server:0 len:84 numSkts:56 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_EXAMPLE_IKE_msgRecv:1533: IKE2_msgRecv Called Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> IKE_SAMPLE_ikeXchgSend: server instance 0 sktDescr 1 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> cleanup_and_free_context delete ctx memory Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message IKEv2 pkt status:0 Mar 29 22:35:46 isakmpd[3475]: <103063> <3475> |ike| 85.XXX.XXX.XXX:58360-> udp_encap_handle_message ver:2 serverInst:0 pktsize:84 Mar 29 22:35:46 isakmpd[3475]: <103069> <3475> |ike| IKE received AP DOWN for 192.168.237.11 (External 85.XXX.XXX.XXX) Mar 29 22:35:46 isakmpd[3475]: <103101> <3475> |ike| IPSEC SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:35:46 isakmpd[3475]: <103103> <3475> |ike| IPSec SA Deletion: IPSEC_delSa SPI:d9f68500 OppSPI:4b1e0300 Dst:85.XXX.XXX.XXX Src:10.140.35.2 flags:1001 dstPort:0 srcPort:0 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| Cookies : Initiator cookie:58ade03142c91388 new sa Initiator cookie:58ade03142c91388 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| Cookies : Responder cookie:bf71be78647ba32d new sa Responder cookie:bf71be78647ba32d Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE_SA (id=0xdb3d3e0e) deleted Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| , status = -8972 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before 2nd IKE2_delXchg Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa before IKE2_delXchg Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa sa:0xbef854 peer:85.XXX.XXX.XXX:58360 id:3678223886 err:0 saflags:30100059 arflags:5 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: deleting IPSEC SA 85.XXX.XXX.XXX:58360 due to deletion of un-rekeyed IKE_SA Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_delSa: isarubaAp 1 isarubaCampusAp 0 isMasterLocal 0 isBOC 0 ispeeruplinkfailover 0 username 20:4c:03:d0:9e:94 before calling mac_hash_tbl_delete_sa_entry Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_delXchg Deleting exchange Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE2_updateSadb Permanently Deleting IKE_SA for peer 85.XXX.XXX.XXX:58360 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| IKE_deleteHW_state cookies:55de5b2e:e3f8 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| ikev2_same_sa: LB :0 Entry Tag: Host: 10.140.35.2 Mar 29 22:35:47 isakmpd[3475]: <103063> <3475> |ike| mac_hash_tbl_delete_sa_entry: deleting for mac 20:4c:03:d0:9e:94 Mar 29 22:35:47 isakmpd[3475]: <103102> <3475> |ike| IKE SA deleted for peer 85.XXX.XXX.XXX Mar 29 22:35:47 isakmpd[3475]: <103103> <3475> |ike| IKE SA Deletion: IKE2_delSa peer:85.XXX.XXX.XXX:58360 id:3678223886 errcode:OK saflags:0x30100059 arflags:0x5 (Aruba-01) #