Community discussions

MikroTik App
 
xevete
just joined
Topic Author
Posts: 1
Joined: Mon Apr 08, 2024 9:13 pm

Trouble connecting Android phone to MikroTik IKEv2 VPN server: Need assistance with log analysis

Mon Apr 08, 2024 9:26 pm

Hello everyone, this is my first post. I'm having trouble setting up an IKEv2 PSK VPN server. After configuring it according to the video: https://www.youtube.com/watch?v=xFEVqCpyal4 (I'm from Brazil, it's in Portuguese), I'm having difficulties connecting my Android phone to the MikroTik. It always shows as unsuccessful on the phone screen. Here's the log generated on the MikroTik during the connection attempt. Can anyone give me a hint as to what could be the issue?

15:15:28 ipsec,debug ===== received 1072 bytes from 181.77.30.62[32763] to 192.168.1.2[500] 
15:15:28 ipsec,debug,packet 6e549051 dc4c7410 00000000 00000000 21202208 00000000 00000430 22000198 
15:15:28 ipsec,debug,packet 020000c8 01010015 0300000c 0100000d 800e0100 0300000c 0100000c 800e0100 
15:15:28 ipsec,debug,packet 0300000c 0100000d 800e00c0 0300000c 0100000c 800e00c0 0300000c 0100000d 
15:15:28 ipsec,debug,packet 800e0080 0300000c 0100000c 800e0080 03000008 0300000e 03000008 0300000d 
15:15:28 ipsec,debug,packet 03000008 0300000c 03000008 03000005 03000008 03000008 03000008 04000010 
15:15:28 ipsec,debug,packet 03000008 0400001f 03000008 0400000f 03000008 0400000e 03000008 02000002 
15:15:28 ipsec,debug,packet 03000008 02000004 03000008 02000005 03000008 02000006 03000008 02000007 
15:15:28 ipsec,debug,packet 00000008 02000008 000000cc 02010014 03000008 0100001c 0300000c 01000014 
15:15:28 ipsec,debug,packet 800e0100 0300000c 01000013 800e0100 0300000c 01000012 800e0100 0300000c 
15:15:28 ipsec,debug,packet 01000014 800e00c0 0300000c 01000013 800e00c0 0300000c 01000012 800e00c0 
15:15:28 ipsec,debug,packet 0300000c 01000014 800e0080 0300000c 01000013 800e0080 0300000c 01000012 
15:15:28 ipsec,debug,packet 800e0080 03000008 04000010 03000008 0400001f 03000008 0400000f 03000008 
15:15:28 ipsec,debug,packet 0400000e 03000008 02000002 03000008 02000004 03000008 02000005 03000008 
15:15:28 ipsec,debug,packet 02000006 03000008 02000007 00000008 02000008 28000208 00100000 d675ddce 
15:15:28 ipsec,debug,packet 16d5ea7d 70fb9b24 24b36d94 1fb5c308 1303124e 4a8fe754 a053fa9c caf814d3 
15:15:28 ipsec,debug,packet 9bf50ebd d798d93e 9263151b 7f16b40d 79e55cb0 56d93dba 5a308d9f a2922354 
15:15:28 ipsec,debug,packet 16da0cad afd34ecb 33022b6b c26c2fe1 cab898d2 b8042b72 3aeeeab1 43301854 
15:15:28 ipsec,debug,packet c0e4bc34 7e306871 b38154d1 c1d9a930 82e60083 29087ff3 486a0597 85e9e39f 
15:15:28 ipsec,debug,packet ca51b2ed 5a1bb5ff c48f376d 5d843ee5 85e52b87 57d58d84 47cfbec5 ade1c1f4 
15:15:28 ipsec,debug,packet 041cd3bb 4d2365eb ea9aad9c 0c6a5b25 08a377a5 ae59185e 2933108a 3dc8a0d3 
15:15:28 ipsec,debug,packet c01d7c0e e5944d37 4d7b8766 227a9b17 c51f59f7 97c52a67 3fd2e9a3 f2a1ac65 
15:15:28 ipsec,debug,packet 50be22ee 87ccd217 74795c9f 0dd8cf78 76b2d105 0be11d7b d1a20d61 8d58721b 
15:15:28 ipsec,debug,packet 81cbe992 dd542142 c0bc5b56 17e8efa1 8e22405b 742eba69 58da825d f8e6dbc5 
15:15:28 ipsec,debug,packet b16c0472 de5857c6 5a8d86b1 ac09760f 1540c6e9 26f44082 389c01c1 a5df5a1e 
15:15:28 ipsec,debug,packet 8d5ff0fc 73a7499a 1a3ba27d fc19911e edf42b65 a6e5541b ccc131d9 b4a01503 
15:15:28 ipsec,debug,packet 16519259 5ebb3c78 7dfa2048 4671a238 a8559630 63f5f4a4 d97d4fef 3b3f74e6 
15:15:28 ipsec,debug,packet 9b34c4fd aa776421 86c1f11b c399fa29 4caeb5ae c25147f2 76e6d5e5 85a6454a 
15:15:28 ipsec,debug,packet 276d6be0 ddfaae4c 889ee1a9 709d1da9 be171c46 3bad36ec dc6d972e 3f999c85 
15:15:28 ipsec,debug,packet 7a610889 03d23744 72c20212 d6007854 6337bb2f 0712863d ca518b92 77aa85c8 
15:15:28 ipsec,debug,packet 6b68895d c1271e1a 3b690528 d3e4f154 5439c8cc d62b8518 6ba424a9 29000024 
15:15:28 ipsec,debug,packet bc2ce9dc f69fe840 e8a96ec1 b342beda 26653c0c 59fe334b ed7614ef c68bae15 
15:15:28 ipsec,debug,packet 2900001c 00004004 68dbc8eb b892d047 94520cf3 e36032af 5f4b000f 2900001c 
15:15:28 ipsec,debug,packet 00004005 454d4acc b4d2569a 5da7999f 1ffb8ef9 ba60cc08 29000008 0000402e 
15:15:28 ipsec,debug,packet 00000010 0000402f 00010002 00030004 
15:15:28 ipsec -> ike2 request, exchange: SA_INIT:0 181.77.30.62[32763] 6e549051dc4c7410:0000000000000000 
15:15:28 ipsec ike2 respond 
15:15:28 ipsec payload seen: SA (408 bytes) 
15:15:28 ipsec payload seen: KE (520 bytes) 
15:15:28 ipsec payload seen: NONCE (36 bytes) 
15:15:28 ipsec payload seen: NOTIFY (28 bytes) 
15:15:28 ipsec payload seen: NOTIFY (28 bytes) 
15:15:28 ipsec payload seen: NOTIFY (8 bytes) 
15:15:28 ipsec payload seen: NOTIFY (16 bytes) 
15:15:28 ipsec processing payload: NONCE 
15:15:28 ipsec processing payload: SA 
15:15:28 ipsec,debug unknown auth: #5 
15:15:28 ipsec,debug unknown auth: #8 
15:15:28 ipsec,debug unknown DH group: #31 
15:15:28 ipsec,debug unknown prf: #4 
15:15:28 ipsec,debug unknown prf: #8 
15:15:28 ipsec,debug unknown enc: #28 
15:15:28 ipsec,debug unknown enc: #19 
15:15:28 ipsec,debug unknown enc: #18 
15:15:28 ipsec,debug unknown enc: #19 
15:15:28 ipsec,debug unknown enc: #18 
15:15:28 ipsec,debug unknown enc: #19 
15:15:28 ipsec,debug unknown enc: #18 
15:15:28 ipsec,debug unknown DH group: #31 
15:15:28 ipsec,debug unknown prf: #4 
15:15:28 ipsec,debug unknown prf: #8 
15:15:28 ipsec IKE Protocol: IKE 
15:15:28 ipsec  proposal #1 
15:15:28 ipsec   enc: aes256-ctr 
15:15:28 ipsec   enc: aes256-cbc 
15:15:28 ipsec   enc: aes192-ctr 
15:15:28 ipsec   enc: aes192-cbc 
15:15:28 ipsec   enc: aes128-ctr 
15:15:28 ipsec   enc: aes128-cbc 
15:15:28 ipsec   prf: hmac-sha1 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   prf: hmac-sha256 
15:15:28 ipsec   prf: hmac-sha384 
15:15:28 ipsec   prf: hmac-sha512 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   auth: sha512 
15:15:28 ipsec   auth: sha384 
15:15:28 ipsec   auth: sha256 
15:15:28 ipsec   auth: unknown 
15:15:28 ipsec   auth: unknown 
15:15:28 ipsec   dh: modp4096 
15:15:28 ipsec   dh: unknown 
15:15:28 ipsec   dh: modp3072 
15:15:28 ipsec   dh: modp2048 
15:15:28 ipsec  proposal #2 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: aes256-gcm 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: aes192-gcm 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: aes128-gcm 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   prf: hmac-sha1 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   prf: hmac-sha256 
15:15:28 ipsec   prf: hmac-sha384 
15:15:28 ipsec   prf: hmac-sha512 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   dh: modp4096 
15:15:28 ipsec   dh: unknown 
15:15:28 ipsec   dh: modp3072 
15:15:28 ipsec   dh: modp2048 
15:15:28 ipsec matched proposal: 
15:15:28 ipsec  proposal #1 
15:15:28 ipsec   enc: aes256-cbc 
15:15:28 ipsec   prf: hmac-sha256 
15:15:28 ipsec   auth: sha256 
15:15:28 ipsec   dh: modp2048 
15:15:28 ipsec processing payload: KE 
15:15:28 ipsec DH group number mismatch: 14 != 16 
15:15:28 ipsec adding notify: INVALID_KE_PAYLOAD 
15:15:28 ipsec,debug => (size 0xa) 
15:15:28 ipsec,debug 0000000a 00000011 000e 
15:15:28 ipsec,debug ===== sending 38 bytes from 192.168.1.2[500] to 181.77.30.62[32763] 
15:15:28 ipsec,debug 1 times of 38 bytes message will be sent to 181.77.30.62[32763] 
15:15:28 ipsec,debug,packet 6e549051 dc4c7410 00000000 00000000 29202220 00000000 00000026 0000000a 
15:15:28 ipsec,debug,packet 00000011 000e 
15:15:28 ipsec,debug ===== received 1072 bytes from 181.77.30.62[32763] to 192.168.1.2[500] 
15:15:28 ipsec,debug,packet 6e549051 dc4c7410 00000000 00000000 21202208 00000000 00000430 22000198 
15:15:28 ipsec,debug,packet 020000c8 01010015 0300000c 0100000d 800e0100 0300000c 0100000c 800e0100 
15:15:28 ipsec,debug,packet 0300000c 0100000d 800e00c0 0300000c 0100000c 800e00c0 0300000c 0100000d 
15:15:28 ipsec,debug,packet 800e0080 0300000c 0100000c 800e0080 03000008 0300000e 03000008 0300000d 
15:15:28 ipsec,debug,packet 03000008 0300000c 03000008 03000005 03000008 03000008 03000008 04000010 
15:15:28 ipsec,debug,packet 03000008 0400001f 03000008 0400000f 03000008 0400000e 03000008 02000002 
15:15:28 ipsec,debug,packet 03000008 02000004 03000008 02000005 03000008 02000006 03000008 02000007 
15:15:28 ipsec,debug,packet 00000008 02000008 000000cc 02010014 03000008 0100001c 0300000c 01000014 
15:15:28 ipsec,debug,packet 800e0100 0300000c 01000013 800e0100 0300000c 01000012 800e0100 0300000c 
15:15:28 ipsec,debug,packet 01000014 800e00c0 0300000c 01000013 800e00c0 0300000c 01000012 800e00c0 
15:15:28 ipsec,debug,packet 0300000c 01000014 800e0080 0300000c 01000013 800e0080 0300000c 01000012 
15:15:28 ipsec,debug,packet 800e0080 03000008 04000010 03000008 0400001f 03000008 0400000f 03000008 
15:15:28 ipsec,debug,packet 0400000e 03000008 02000002 03000008 02000004 03000008 02000005 03000008 
15:15:28 ipsec,debug,packet 02000006 03000008 02000007 00000008 02000008 28000208 00100000 d675ddce 
15:15:28 ipsec,debug,packet 16d5ea7d 70fb9b24 24b36d94 1fb5c308 1303124e 4a8fe754 a053fa9c caf814d3 
15:15:28 ipsec,debug,packet 9bf50ebd d798d93e 9263151b 7f16b40d 79e55cb0 56d93dba 5a308d9f a2922354 
15:15:28 ipsec,debug,packet 16da0cad afd34ecb 33022b6b c26c2fe1 cab898d2 b8042b72 3aeeeab1 43301854 
15:15:28 ipsec,debug,packet c0e4bc34 7e306871 b38154d1 c1d9a930 82e60083 29087ff3 486a0597 85e9e39f 
15:15:28 ipsec,debug,packet ca51b2ed 5a1bb5ff c48f376d 5d843ee5 85e52b87 57d58d84 47cfbec5 ade1c1f4 
15:15:28 ipsec,debug,packet 041cd3bb 4d2365eb ea9aad9c 0c6a5b25 08a377a5 ae59185e 2933108a 3dc8a0d3 
15:15:28 ipsec,debug,packet c01d7c0e e5944d37 4d7b8766 227a9b17 c51f59f7 97c52a67 3fd2e9a3 f2a1ac65 
15:15:28 ipsec,debug,packet 50be22ee 87ccd217 74795c9f 0dd8cf78 76b2d105 0be11d7b d1a20d61 8d58721b 
15:15:28 ipsec,debug,packet 81cbe992 dd542142 c0bc5b56 17e8efa1 8e22405b 742eba69 58da825d f8e6dbc5 
15:15:28 ipsec,debug,packet b16c0472 de5857c6 5a8d86b1 ac09760f 1540c6e9 26f44082 389c01c1 a5df5a1e 
15:15:28 ipsec,debug,packet 8d5ff0fc 73a7499a 1a3ba27d fc19911e edf42b65 a6e5541b ccc131d9 b4a01503 
15:15:28 ipsec,debug,packet 16519259 5ebb3c78 7dfa2048 4671a238 a8559630 63f5f4a4 d97d4fef 3b3f74e6 
15:15:28 ipsec,debug,packet 9b34c4fd aa776421 86c1f11b c399fa29 4caeb5ae c25147f2 76e6d5e5 85a6454a 
15:15:28 ipsec,debug,packet 276d6be0 ddfaae4c 889ee1a9 709d1da9 be171c46 3bad36ec dc6d972e 3f999c85 
15:15:28 ipsec,debug,packet 7a610889 03d23744 72c20212 d6007854 6337bb2f 0712863d ca518b92 77aa85c8 
15:15:28 ipsec,debug,packet 6b68895d c1271e1a 3b690528 d3e4f154 5439c8cc d62b8518 6ba424a9 29000024 
15:15:28 ipsec,debug,packet bc2ce9dc f69fe840 e8a96ec1 b342beda 26653c0c 59fe334b ed7614ef c68bae15 
15:15:28 ipsec,debug,packet 2900001c 00004004 68dbc8eb b892d047 94520cf3 e36032af 5f4b000f 2900001c 
15:15:28 ipsec,debug,packet 00004005 454d4acc b4d2569a 5da7999f 1ffb8ef9 ba60cc08 29000008 0000402e 
15:15:28 ipsec,debug,packet 00000010 0000402f 00010002 00030004 
15:15:28 ipsec -> ike2 request, exchange: SA_INIT:0 181.77.30.62[32763] 6e549051dc4c7410:0000000000000000 
15:15:28 ipsec ike2 respond 
15:15:28 ipsec payload seen: SA (408 bytes) 
15:15:28 ipsec payload seen: KE (520 bytes) 
15:15:28 ipsec payload seen: NONCE (36 bytes) 
15:15:28 ipsec payload seen: NOTIFY (28 bytes) 
15:15:28 ipsec payload seen: NOTIFY (28 bytes) 
15:15:28 ipsec payload seen: NOTIFY (8 bytes) 
15:15:28 ipsec payload seen: NOTIFY (16 bytes) 
15:15:28 ipsec processing payload: NONCE 
15:15:28 ipsec processing payload: SA 
15:15:28 ipsec,debug unknown auth: #5 
15:15:28 ipsec,debug unknown auth: #8 
15:15:28 ipsec,debug unknown DH group: #31 
15:15:28 ipsec,debug unknown prf: #4 
15:15:28 ipsec,debug unknown prf: #8 
15:15:28 ipsec,debug unknown enc: #28 
15:15:28 ipsec,debug unknown enc: #19 
15:15:28 ipsec,debug unknown enc: #18 
15:15:28 ipsec,debug unknown enc: #19 
15:15:28 ipsec,debug unknown enc: #18 
15:15:28 ipsec,debug unknown enc: #19 
15:15:28 ipsec,debug unknown enc: #18 
15:15:28 ipsec,debug unknown DH group: #31 
15:15:28 ipsec,debug unknown prf: #4 
15:15:28 ipsec,debug unknown prf: #8 
15:15:28 ipsec IKE Protocol: IKE 
15:15:28 ipsec  proposal #1 
15:15:28 ipsec   enc: aes256-ctr 
15:15:28 ipsec   enc: aes256-cbc 
15:15:28 ipsec   enc: aes192-ctr 
15:15:28 ipsec   enc: aes192-cbc 
15:15:28 ipsec   enc: aes128-ctr 
15:15:28 ipsec   enc: aes128-cbc 
15:15:28 ipsec   prf: hmac-sha1 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   prf: hmac-sha256 
15:15:28 ipsec   prf: hmac-sha384 
15:15:28 ipsec   prf: hmac-sha512 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   auth: sha512 
15:15:28 ipsec   auth: sha384 
15:15:28 ipsec   auth: sha256 
15:15:28 ipsec   auth: unknown 
15:15:28 ipsec   auth: unknown 
15:15:28 ipsec   dh: modp4096 
15:15:28 ipsec   dh: unknown 
15:15:28 ipsec   dh: modp3072 
15:15:28 ipsec   dh: modp2048 
15:15:28 ipsec  proposal #2 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: aes256-gcm 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: aes192-gcm 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: aes128-gcm 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   enc: unknown 
15:15:28 ipsec   prf: hmac-sha1 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   prf: hmac-sha256 
15:15:28 ipsec   prf: hmac-sha384 
15:15:28 ipsec   prf: hmac-sha512 
15:15:28 ipsec   prf: unknown 
15:15:28 ipsec   dh: modp4096 
15:15:28 ipsec   dh: unknown 
15:15:28 ipsec   dh: modp3072 
15:15:28 ipsec   dh: modp2048 
15:15:28 ipsec matched proposal: 
15:15:28 ipsec  proposal #1 
15:15:28 ipsec   enc: aes256-cbc 
15:15:28 ipsec   prf: hmac-sha256 
15:15:28 ipsec   auth: sha256 
15:15:28 ipsec   dh: modp2048 
15:15:28 ipsec processing payload: KE 
15:15:28 ipsec DH group number mismatch: 14 != 16 
15:15:28 ipsec adding notify: INVALID_KE_PAYLOAD 
15:15:28 ipsec,debug => (size 0xa) 
15:15:28 ipsec,debug 0000000a 00000011 000e 
15:15:28 ipsec,debug ===== sending 38 bytes from 192.168.1.2[500] to 181.77.30.62[32763] 
15:15:28 ipsec,debug 1 times of 38 bytes message will be sent to 181.77.30.62[32763] 
15:15:28 ipsec,debug,packet 6e549051 dc4c7410 00000000 00000000 29202220 00000000 00000026 0000000a 
15:15:28 ipsec,debug,packet 00000011 000e 
15:15:29 ipsec,debug ===== received 816 bytes from 181.77.32.212[37358] to 192.168.1.2[500] 
15:15:29 ipsec,debug,packet f001c53b 4587af8a 00000000 00000000 21202208 00000000 00000330 22000198 
15:15:29 ipsec,debug,packet 020000c8 01010015 0300000c 0100000d 800e0100 0300000c 0100000c 800e0100 
15:15:29 ipsec,debug,packet 0300000c 0100000d 800e00c0 0300000c 0100000c 800e00c0 0300000c 0100000d 
15:15:29 ipsec,debug,packet 800e0080 0300000c 0100000c 800e0080 03000008 0300000e 03000008 0300000d 
15:15:29 ipsec,debug,packet 03000008 0300000c 03000008 03000005 03000008 03000008 03000008 04000010 
15:15:29 ipsec,debug,packet 03000008 0400001f 03000008 0400000f 03000008 0400000e 03000008 02000002 
15:15:29 ipsec,debug,packet 03000008 02000004 03000008 02000005 03000008 02000006 03000008 02000007 
15:15:29 ipsec,debug,packet 00000008 02000008 000000cc 02010014 03000008 0100001c 0300000c 01000014 
15:15:29 ipsec,debug,packet 800e0100 0300000c 01000013 800e0100 0300000c 01000012 800e0100 0300000c 
15:15:29 ipsec,debug,packet 01000014 800e00c0 0300000c 01000013 800e00c0 0300000c 01000012 800e00c0 
15:15:29 ipsec,debug,packet 0300000c 01000014 800e0080 0300000c 01000013 800e0080 0300000c 01000012 
15:15:29 ipsec,debug,packet 800e0080 03000008 04000010 03000008 0400001f 03000008 0400000f 03000008 
15:15:29 ipsec,debug,packet 0400000e 03000008 02000002 03000008 02000004 03000008 02000005 03000008 
15:15:29 ipsec,debug,packet 02000006 03000008 02000007 00000008 02000008 28000108 000e0000 90db0cad 
15:15:29 ipsec,debug,packet 18150a6b 07f9d1a1 8649d0a1 e8a3dc3e 1128596f 53f8f5cc 8635cf66 5a084477 
15:15:29 ipsec,debug,packet a65039dc 1f14e4a7 5b07a18c 6069d88a 9051acb6 ac56c316 0bc3a8a5 2df7b70e 
15:15:29 ipsec,debug,packet fe42ce73 69cc5f07 e9440d87 7a77b299 1cafdebc 4d45dfcd e903401c 7a2fe823 
15:15:29 ipsec,debug,packet c44dba4d 01b52a02 1017701e 657743b9 57da1934 c8ca61d7 da9fe1f4 49b284d4 
15:15:29 ipsec,debug,packet 15e7bdd0 72d8ea59 60fa837c 654244a4 dbf7e6ce 16f6b960 3a141d30 10733b8a 
15:15:29 ipsec,debug,packet f9b21950 c6a67a7e 0628892b a70d83a9 458331a5 6f83a205 594506b8 dbebc9fe 
15:15:29 ipsec,debug,packet a4f5b33b 79c88813 8583a859 02a414d0 eb179b50 084623f3 c2e0bbd0 14bff7bf 
15:15:29 ipsec,debug,packet fea079ad 933f6669 e129b720 85315a0a e506f9c9 d420050b 93abe54f 29000024 
15:15:29 ipsec,debug,packet de821480 1a96808a b09c0519 8df489f3 b5d624e4 d867542d 8147f826 2af1a638 
15:15:29 ipsec,debug,packet 2900001c 00004004 a81c772d 68d4fe7b 0f414d7b b411c568 457b5726 2900001c 
15:15:29 ipsec,debug,packet 00004005 3a5d9168 50f91ab8 444fd4b9 ee17ab9e 78114730 29000008 0000402e 
15:15:29 ipsec,debug,packet 00000010 0000402f 00010002 00030004 
15:15:29 ipsec -> ike2 request, exchange: SA_INIT:0 181.77.32.212[37358] f001c53b4587af8a:0000000000000000 
15:15:29 ipsec ike2 respond 
15:15:29 ipsec payload seen: SA (408 bytes) 
15:15:29 ipsec payload seen: KE (264 bytes) 
15:15:29 ipsec payload seen: NONCE (36 bytes) 
15:15:29 ipsec payload seen: NOTIFY (28 bytes) 
15:15:29 ipsec payload seen: NOTIFY (28 bytes) 
15:15:29 ipsec payload seen: NOTIFY (8 bytes) 
15:15:29 ipsec payload seen: NOTIFY (16 bytes) 
15:15:29 ipsec processing payload: NONCE 
15:15:29 ipsec processing payload: SA 
15:15:29 ipsec,debug unknown auth: #5 
15:15:29 ipsec,debug unknown auth: #8 
15:15:29 ipsec,debug unknown DH group: #31 
15:15:29 ipsec,debug unknown prf: #4 
15:15:29 ipsec,debug unknown prf: #8 
15:15:29 ipsec,debug unknown enc: #28 
15:15:29 ipsec,debug unknown enc: #19 
15:15:29 ipsec,debug unknown enc: #18 
15:15:29 ipsec,debug unknown enc: #19 
15:15:29 ipsec,debug unknown enc: #18 
15:15:29 ipsec,debug unknown enc: #19 
15:15:29 ipsec,debug unknown enc: #18 
15:15:29 ipsec,debug unknown DH group: #31 
15:15:29 ipsec,debug unknown prf: #4 
15:15:29 ipsec,debug unknown prf: #8 
15:15:29 ipsec IKE Protocol: IKE 
15:15:29 ipsec  proposal #1 
15:15:29 ipsec   enc: aes256-ctr 
15:15:29 ipsec   enc: aes256-cbc 
15:15:29 ipsec   enc: aes192-ctr 
15:15:29 ipsec   enc: aes192-cbc 
15:15:29 ipsec   enc: aes128-ctr 
15:15:29 ipsec   enc: aes128-cbc 
15:15:29 ipsec   prf: hmac-sha1 
15:15:29 ipsec   prf: unknown 
15:15:29 ipsec   prf: hmac-sha256 
15:15:29 ipsec   prf: hmac-sha384 
15:15:29 ipsec   prf: hmac-sha512 
15:15:29 ipsec   prf: unknown 
15:15:29 ipsec   auth: sha512 
15:15:29 ipsec   auth: sha384 
15:15:29 ipsec   auth: sha256 
15:15:29 ipsec   auth: unknown 
15:15:29 ipsec   auth: unknown 
15:15:29 ipsec   dh: modp4096 
15:15:29 ipsec   dh: unknown 
15:15:29 ipsec   dh: modp3072 
15:15:29 ipsec   dh: modp2048 
15:15:29 ipsec  proposal #2 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   enc: aes256-gcm 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   enc: aes192-gcm 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   enc: aes128-gcm 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   enc: unknown 
15:15:29 ipsec   prf: hmac-sha1 
15:15:29 ipsec   prf: unknown 
15:15:29 ipsec   prf: hmac-sha256 
15:15:29 ipsec   prf: hmac-sha384 
15:15:29 ipsec   prf: hmac-sha512 
15:15:29 ipsec   prf: unknown 
15:15:29 ipsec   dh: modp4096 
15:15:29 ipsec   dh: unknown 
15:15:29 ipsec   dh: modp3072 
15:15:29 ipsec   dh: modp2048 
15:15:29 ipsec matched proposal: 
15:15:29 ipsec  proposal #1 
15:15:29 ipsec   enc: aes256-cbc 
15:15:29 ipsec   prf: hmac-sha256 
15:15:29 ipsec   auth: sha256 
15:15:29 ipsec   dh: modp2048 
15:15:29 ipsec processing payload: KE 
15:15:30 ipsec,debug => shared secret (size 0x100) 
15:15:30 ipsec,debug 1c717cb2 7af49a35 68aa352e e008ab5e 06a43206 fb6b7ea9 a502e604 64b1e730 
15:15:30 ipsec,debug d8090a68 f62f5c2b 6ffbb5da ff755f05 d6a92dc6 b81bd6f0 b03f352e a8923ac3 
15:15:30 ipsec,debug bbc3fab0 88898b1c 2a2ccc0d ca200163 da20aec8 668fa0e8 3f5477e9 25fef942 
15:15:30 ipsec,debug 9a3a4ac7 5125ae99 3594cc68 1067fe9d 410ff27f b0cf064f 036879d5 1cbe8830 
15:15:30 ipsec,debug c5c2f8bc 69d24aaa 00f5ee5e d7a9f171 13aa4734 3c17d423 54731f35 5c17b447 
15:15:30 ipsec,debug 7b86c6dc 14aee5ca 0da80080 21818656 2fa75c1c 4a8b3f6d 9f14c3ae 3bcc46dc 
15:15:30 ipsec,debug 57746125 cc1e1784 778f7bb1 a1e5838e 154e41fa b50ca451 e9aa32fe 8a5bd84f 
15:15:30 ipsec,debug fe27026a f8279320 93ef4975 190a91ba 8c92a172 1ec533fb 43ab6643 480cefdf 
15:15:30 ipsec adding payload: SA 
15:15:30 ipsec,debug => (size 0x30) 
15:15:30 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 
15:15:30 ipsec,debug 03000008 0300000c 00000008 0400000e 
15:15:30 ipsec adding payload: KE 
15:15:30 ipsec,debug => (first 0x100 of 0x108) 
15:15:30 ipsec,debug 00000108 000e0000 3bbb0913 5a825736 7bca1e81 fa4ae271 303a5b2b 37e0f919 
15:15:30 ipsec,debug 0d51cadd 246f0fff f068232f be137f08 1759d258 e728467a cdc6e0d8 46fe5cdb 
15:15:30 ipsec,debug 031f284f 829456eb 4097888e e0449240 058bddea e7ec4300 15439194 e97d1cad 
15:15:30 ipsec,debug c2d58bfd 1d38b830 04eed9d4 55fb1dc2 53d3be50 8059410d 58299c7c 08a5c50d 
15:15:30 ipsec,debug fedcba06 8728e27f 5e0b1956 464cd12c 2170d0b4 fc43f7b0 7732358d 764d2a50 
15:15:30 ipsec,debug e1421ebd 48e1482e 4bf0df97 24d56612 51bcb80c 771fd2ea 84f0685b 5867eff5 
15:15:30 ipsec,debug 6135a9c5 e21d0f98 62d7e261 0ce5aa1b 2484a3e7 3c4a5593 c9facdab 0dd7fbe0 
15:15:30 ipsec,debug 6b2d95d0 930ed91f 25655c8e 0265fedd 33c813fd 043878ef 8e47e0cf 06c24b14 
15:15:30 ipsec adding payload: NONCE 
15:15:30 ipsec,debug => (size 0x1c) 
15:15:30 ipsec,debug 0000001c a3177b21 051604b1 313743d1 84c0e5e8 e28fe0da 0ac479c3 
15:15:30 ipsec adding notify: NAT_DETECTION_SOURCE_IP 
15:15:30 ipsec,debug => (size 0x1c) 
15:15:30 ipsec,debug 0000001c 00004004 bc4cc297 0f7d5945 036952ca 58a3422e f9f5f336 
15:15:30 ipsec adding notify: NAT_DETECTION_DESTINATION_IP 
15:15:30 ipsec,debug => (size 0x1c) 
15:15:30 ipsec,debug 0000001c 00004005 ba5f04e6 51754536 7d9707c2 88e7925e 695a59d8 
15:15:30 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED 
15:15:30 ipsec,debug => (size 0x8) 
15:15:30 ipsec,debug 00000008 0000402e 
15:15:30 ipsec adding payload: CERTREQ 
15:15:30 ipsec,debug => (size 0x5) 
15:15:30 ipsec,debug 00000005 04 
15:15:30 ipsec <- ike2 reply, exchange: SA_INIT:0 181.77.32.212[37358] f001c53b4587af8a:cbdf6108f207c5c7 
15:15:30 ipsec,debug ===== sending 437 bytes from 192.168.1.2[500] to 181.77.32.212[37358] 
15:15:30 ipsec,debug 1 times of 437 bytes message will be sent to 181.77.32.212[37358] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 21202220 00000000 000001b5 22000030 
15:15:30 ipsec,debug,packet 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 03000008 
15:15:30 ipsec,debug,packet 0300000c 00000008 0400000e 28000108 000e0000 3bbb0913 5a825736 7bca1e81 
15:15:30 ipsec,debug,packet fa4ae271 303a5b2b 37e0f919 0d51cadd 246f0fff f068232f be137f08 1759d258 
15:15:30 ipsec,debug,packet e728467a cdc6e0d8 46fe5cdb 031f284f 829456eb 4097888e e0449240 058bddea 
15:15:30 ipsec,debug,packet e7ec4300 15439194 e97d1cad c2d58bfd 1d38b830 04eed9d4 55fb1dc2 53d3be50 
15:15:30 ipsec,debug,packet 8059410d 58299c7c 08a5c50d fedcba06 8728e27f 5e0b1956 464cd12c 2170d0b4 
15:15:30 ipsec,debug,packet fc43f7b0 7732358d 764d2a50 e1421ebd 48e1482e 4bf0df97 24d56612 51bcb80c 
15:15:30 ipsec,debug,packet 771fd2ea 84f0685b 5867eff5 6135a9c5 e21d0f98 62d7e261 0ce5aa1b 2484a3e7 
15:15:30 ipsec,debug,packet 3c4a5593 c9facdab 0dd7fbe0 6b2d95d0 930ed91f 25655c8e 0265fedd 33c813fd 
15:15:30 ipsec,debug,packet 043878ef 8e47e0cf 06c24b14 6797ff62 098598e4 2900001c a3177b21 051604b1 
15:15:30 ipsec,debug,packet 313743d1 84c0e5e8 e28fe0da 0ac479c3 2900001c 00004004 bc4cc297 0f7d5945 
15:15:30 ipsec,debug,packet 036952ca 58a3422e f9f5f336 2900001c 00004005 ba5f04e6 51754536 7d9707c2 
15:15:30 ipsec,debug,packet 88e7925e 695a59d8 26000008 0000402e 00000005 04 
15:15:30 ipsec,debug => skeyseed (size 0x20) 
15:15:30 ipsec,debug da3ffe99 82272c3a a3a3e8f9 cbf42e6c b7cd7a84 6d76640c bffb0503 4fffa9e4 
15:15:30 ipsec,debug => keymat (size 0x20) 
15:15:30 ipsec,debug c70db4cd 03b30d48 e100cc65 275a803d 7baf2ec6 8d76f619 1e313825 284248f4 
15:15:30 ipsec,debug => SK_ai (size 0x20) 
15:15:30 ipsec,debug ffb3cd25 d7ddf5a5 f52aa7c6 1b57e971 90855a04 70339830 f37ca049 07fa3132 
15:15:30 ipsec,debug => SK_ar (size 0x20) 
15:15:30 ipsec,debug 00955580 8aeb222c 1eba50e7 915d4eb2 f6982f7a 5f08828e c02239b6 67ce1f5b 
15:15:30 ipsec,debug => SK_ei (size 0x20) 
15:15:30 ipsec,debug 7307f29f 9bd664df 3646fd98 de7ad415 9086d19d 3dae135d 3b33f745 6f8c7213 
15:15:30 ipsec,debug => SK_er (size 0x20) 
15:15:30 ipsec,debug 4c514c8f a9c5e14e f1548373 5c80412b eea44f60 940970fb 50f88f93 4b31a65d 
15:15:30 ipsec,debug => SK_pi (size 0x20) 
15:15:30 ipsec,debug 8fe7c4fa 3d6c9220 7d133314 c6bfde0f adb0909e 6abc7c3a 1bfa26f0 c867f010 
15:15:30 ipsec,debug => SK_pr (size 0x20) 
15:15:30 ipsec,debug 6fab771d be40d509 a5c87e3d e0865a4f 5852431f 708fe8d5 7264a4dd 752f4127 
15:15:30 ipsec,info new ike2 SA (R): 192.168.1.2[500]-181.77.32.212[37358] spi:cbdf6108f207c5c7:f001c53b4587af8a 
15:15:30 ipsec processing payloads: VID (none found) 
15:15:30 ipsec processing payloads: NOTIFY 
15:15:30 ipsec   notify: NAT_DETECTION_SOURCE_IP 
15:15:30 ipsec   notify: NAT_DETECTION_DESTINATION_IP 
15:15:30 ipsec   notify: IKEV2_FRAGMENTATION_SUPPORTED 
15:15:30 ipsec   notify: SIGNATURE_HASH_ALGORITHMS 
15:15:30 ipsec,debug 0001000200030004 
15:15:30 ipsec (NAT-T) REMOTE LOCAL 
15:15:30 ipsec KA list add: 192.168.1.2[4500]->181.77.32.212[37358] 
15:15:30 ipsec fragmentation negotiated 
15:15:30 ipsec,debug ===== received 816 bytes from 181.77.32.212[37358] to 192.168.1.2[500] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a 00000000 00000000 21202208 00000000 00000330 22000198 
15:15:30 ipsec,debug,packet 020000c8 01010015 0300000c 0100000d 800e0100 0300000c 0100000c 800e0100 
15:15:30 ipsec,debug,packet 0300000c 0100000d 800e00c0 0300000c 0100000c 800e00c0 0300000c 0100000d 
15:15:30 ipsec,debug,packet 800e0080 0300000c 0100000c 800e0080 03000008 0300000e 03000008 0300000d 
15:15:30 ipsec,debug,packet 03000008 0300000c 03000008 03000005 03000008 03000008 03000008 04000010 
15:15:30 ipsec,debug,packet 03000008 0400001f 03000008 0400000f 03000008 0400000e 03000008 02000002 
15:15:30 ipsec,debug,packet 03000008 02000004 03000008 02000005 03000008 02000006 03000008 02000007 
15:15:30 ipsec,debug,packet 00000008 02000008 000000cc 02010014 03000008 0100001c 0300000c 01000014 
15:15:30 ipsec,debug,packet 800e0100 0300000c 01000013 800e0100 0300000c 01000012 800e0100 0300000c 
15:15:30 ipsec,debug,packet 01000014 800e00c0 0300000c 01000013 800e00c0 0300000c 01000012 800e00c0 
15:15:30 ipsec,debug,packet 0300000c 01000014 800e0080 0300000c 01000013 800e0080 0300000c 01000012 
15:15:30 ipsec,debug,packet 800e0080 03000008 04000010 03000008 0400001f 03000008 0400000f 03000008 
15:15:30 ipsec,debug,packet 0400000e 03000008 02000002 03000008 02000004 03000008 02000005 03000008 
15:15:30 ipsec,debug,packet 02000006 03000008 02000007 00000008 02000008 28000108 000e0000 90db0cad 
15:15:30 ipsec,debug,packet 18150a6b 07f9d1a1 8649d0a1 e8a3dc3e 1128596f 53f8f5cc 8635cf66 5a084477 
15:15:30 ipsec,debug,packet a65039dc 1f14e4a7 5b07a18c 6069d88a 9051acb6 ac56c316 0bc3a8a5 2df7b70e 
15:15:30 ipsec,debug,packet fe42ce73 69cc5f07 e9440d87 7a77b299 1cafdebc 4d45dfcd e903401c 7a2fe823 
15:15:30 ipsec,debug,packet c44dba4d 01b52a02 1017701e 657743b9 57da1934 c8ca61d7 da9fe1f4 49b284d4 
15:15:30 ipsec,debug,packet 15e7bdd0 72d8ea59 60fa837c 654244a4 dbf7e6ce 16f6b960 3a141d30 10733b8a 
15:15:30 ipsec,debug,packet f9b21950 c6a67a7e 0628892b a70d83a9 458331a5 6f83a205 594506b8 dbebc9fe 
15:15:30 ipsec,debug,packet a4f5b33b 79c88813 8583a859 02a414d0 eb179b50 084623f3 c2e0bbd0 14bff7bf 
15:15:30 ipsec,debug,packet fea079ad 933f6669 e129b720 85315a0a e506f9c9 d420050b 93abe54f 29000024 
15:15:30 ipsec,debug,packet de821480 1a96808a b09c0519 8df489f3 b5d624e4 d867542d 8147f826 2af1a638 
15:15:30 ipsec,debug,packet 2900001c 00004004 a81c772d 68d4fe7b 0f414d7b b411c568 457b5726 2900001c 
15:15:30 ipsec,debug,packet 00004005 3a5d9168 50f91ab8 444fd4b9 ee17ab9e 78114730 29000008 0000402e 
15:15:30 ipsec,debug,packet 00000010 0000402f 00010002 00030004 
15:15:30 ipsec -> ike2 request, exchange: SA_INIT:0 181.77.32.212[37358] f001c53b4587af8a:0000000000000000 
15:15:30 ipsec ike2 respond 
15:15:30 ipsec payload seen: SA (408 bytes) 
15:15:30 ipsec payload seen: KE (264 bytes) 
15:15:30 ipsec payload seen: NONCE (36 bytes) 
15:15:30 ipsec payload seen: NOTIFY (28 bytes) 
15:15:30 ipsec payload seen: NOTIFY (28 bytes) 
15:15:30 ipsec payload seen: NOTIFY (8 bytes) 
15:15:30 ipsec payload seen: NOTIFY (16 bytes) 
15:15:30 ipsec IKE_SA_INIT retransmitted 
15:15:30 ipsec,debug ===== sending 437 bytes from 192.168.1.2[500] to 181.77.32.212[37358] 
15:15:30 ipsec,debug 1 times of 437 bytes message will be sent to 181.77.32.212[37358] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 21202220 00000000 000001b5 22000030 
15:15:30 ipsec,debug,packet 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 03000008 
15:15:30 ipsec,debug,packet 0300000c 00000008 0400000e 28000108 000e0000 3bbb0913 5a825736 7bca1e81 
15:15:30 ipsec,debug,packet fa4ae271 303a5b2b 37e0f919 0d51cadd 246f0fff f068232f be137f08 1759d258 
15:15:30 ipsec,debug,packet e728467a cdc6e0d8 46fe5cdb 031f284f 829456eb 4097888e e0449240 058bddea 
15:15:30 ipsec,debug,packet e7ec4300 15439194 e97d1cad c2d58bfd 1d38b830 04eed9d4 55fb1dc2 53d3be50 
15:15:30 ipsec,debug,packet 8059410d 58299c7c 08a5c50d fedcba06 8728e27f 5e0b1956 464cd12c 2170d0b4 
15:15:30 ipsec,debug,packet fc43f7b0 7732358d 764d2a50 e1421ebd 48e1482e 4bf0df97 24d56612 51bcb80c 
15:15:30 ipsec,debug,packet 771fd2ea 84f0685b 5867eff5 6135a9c5 e21d0f98 62d7e261 0ce5aa1b 2484a3e7 
15:15:30 ipsec,debug,packet 3c4a5593 c9facdab 0dd7fbe0 6b2d95d0 930ed91f 25655c8e 0265fedd 33c813fd 
15:15:30 ipsec,debug,packet 043878ef 8e47e0cf 06c24b14 6797ff62 098598e4 2900001c a3177b21 051604b1 
15:15:30 ipsec,debug,packet 313743d1 84c0e5e8 e28fe0da 0ac479c3 2900001c 00004004 bc4cc297 0f7d5945 
15:15:30 ipsec,debug,packet 036952ca 58a3422e f9f5f336 2900001c 00004005 ba5f04e6 51754536 7d9707c2 
15:15:30 ipsec,debug,packet 88e7925e 695a59d8 26000008 0000402e 00000005 04 
15:15:30 ipsec,debug ===== received 816 bytes from 181.77.32.212[37358] to 192.168.1.2[500] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a 00000000 00000000 21202208 00000000 00000330 22000198 
15:15:30 ipsec,debug,packet 020000c8 01010015 0300000c 0100000d 800e0100 0300000c 0100000c 800e0100 
15:15:30 ipsec,debug,packet 0300000c 0100000d 800e00c0 0300000c 0100000c 800e00c0 0300000c 0100000d 
15:15:30 ipsec,debug,packet 800e0080 0300000c 0100000c 800e0080 03000008 0300000e 03000008 0300000d 
15:15:30 ipsec,debug,packet 03000008 0300000c 03000008 03000005 03000008 03000008 03000008 04000010 
15:15:30 ipsec,debug,packet 03000008 0400001f 03000008 0400000f 03000008 0400000e 03000008 02000002 
15:15:30 ipsec,debug,packet 03000008 02000004 03000008 02000005 03000008 02000006 03000008 02000007 
15:15:30 ipsec,debug,packet 00000008 02000008 000000cc 02010014 03000008 0100001c 0300000c 01000014 
15:15:30 ipsec,debug,packet 800e0100 0300000c 01000013 800e0100 0300000c 01000012 800e0100 0300000c 
15:15:30 ipsec,debug,packet 01000014 800e00c0 0300000c 01000013 800e00c0 0300000c 01000012 800e00c0 
15:15:30 ipsec,debug,packet 0300000c 01000014 800e0080 0300000c 01000013 800e0080 0300000c 01000012 
15:15:30 ipsec,debug,packet 800e0080 03000008 04000010 03000008 0400001f 03000008 0400000f 03000008 
15:15:30 ipsec,debug,packet 0400000e 03000008 02000002 03000008 02000004 03000008 02000005 03000008 
15:15:30 ipsec,debug,packet 02000006 03000008 02000007 00000008 02000008 28000108 000e0000 90db0cad 
15:15:30 ipsec,debug,packet 18150a6b 07f9d1a1 8649d0a1 e8a3dc3e 1128596f 53f8f5cc 8635cf66 5a084477 
15:15:30 ipsec,debug,packet a65039dc 1f14e4a7 5b07a18c 6069d88a 9051acb6 ac56c316 0bc3a8a5 2df7b70e 
15:15:30 ipsec,debug,packet fe42ce73 69cc5f07 e9440d87 7a77b299 1cafdebc 4d45dfcd e903401c 7a2fe823 
15:15:30 ipsec,debug,packet c44dba4d 01b52a02 1017701e 657743b9 57da1934 c8ca61d7 da9fe1f4 49b284d4 
15:15:30 ipsec,debug,packet 15e7bdd0 72d8ea59 60fa837c 654244a4 dbf7e6ce 16f6b960 3a141d30 10733b8a 
15:15:30 ipsec,debug,packet f9b21950 c6a67a7e 0628892b a70d83a9 458331a5 6f83a205 594506b8 dbebc9fe 
15:15:30 ipsec,debug,packet a4f5b33b 79c88813 8583a859 02a414d0 eb179b50 084623f3 c2e0bbd0 14bff7bf 
15:15:30 ipsec,debug,packet fea079ad 933f6669 e129b720 85315a0a e506f9c9 d420050b 93abe54f 29000024 
15:15:30 ipsec,debug,packet de821480 1a96808a b09c0519 8df489f3 b5d624e4 d867542d 8147f826 2af1a638 
15:15:30 ipsec,debug,packet 2900001c 00004004 a81c772d 68d4fe7b 0f414d7b b411c568 457b5726 2900001c 
15:15:30 ipsec,debug,packet 00004005 3a5d9168 50f91ab8 444fd4b9 ee17ab9e 78114730 29000008 0000402e 
15:15:30 ipsec,debug,packet 00000010 0000402f 00010002 00030004 
15:15:30 ipsec -> ike2 request, exchange: SA_INIT:0 181.77.32.212[37358] f001c53b4587af8a:0000000000000000 
15:15:30 ipsec ike2 respond 
15:15:30 ipsec payload seen: SA (408 bytes) 
15:15:30 ipsec payload seen: KE (264 bytes) 
15:15:30 ipsec payload seen: NONCE (36 bytes) 
15:15:30 ipsec payload seen: NOTIFY (28 bytes) 
15:15:30 ipsec payload seen: NOTIFY (28 bytes) 
15:15:30 ipsec payload seen: NOTIFY (8 bytes) 
15:15:30 ipsec payload seen: NOTIFY (16 bytes) 
15:15:30 ipsec IKE_SA_INIT retransmitted 
15:15:30 ipsec,debug ===== sending 437 bytes from 192.168.1.2[500] to 181.77.32.212[37358] 
15:15:30 ipsec,debug 1 times of 437 bytes message will be sent to 181.77.32.212[37358] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 21202220 00000000 000001b5 22000030 
15:15:30 ipsec,debug,packet 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 03000008 
15:15:30 ipsec,debug,packet 0300000c 00000008 0400000e 28000108 000e0000 3bbb0913 5a825736 7bca1e81 
15:15:30 ipsec,debug,packet fa4ae271 303a5b2b 37e0f919 0d51cadd 246f0fff f068232f be137f08 1759d258 
15:15:30 ipsec,debug,packet e728467a cdc6e0d8 46fe5cdb 031f284f 829456eb 4097888e e0449240 058bddea 
15:15:30 ipsec,debug,packet e7ec4300 15439194 e97d1cad c2d58bfd 1d38b830 04eed9d4 55fb1dc2 53d3be50 
15:15:30 ipsec,debug,packet 8059410d 58299c7c 08a5c50d fedcba06 8728e27f 5e0b1956 464cd12c 2170d0b4 
15:15:30 ipsec,debug,packet fc43f7b0 7732358d 764d2a50 e1421ebd 48e1482e 4bf0df97 24d56612 51bcb80c 
15:15:30 ipsec,debug,packet 771fd2ea 84f0685b 5867eff5 6135a9c5 e21d0f98 62d7e261 0ce5aa1b 2484a3e7 
15:15:30 ipsec,debug,packet 3c4a5593 c9facdab 0dd7fbe0 6b2d95d0 930ed91f 25655c8e 0265fedd 33c813fd 
15:15:30 ipsec,debug,packet 043878ef 8e47e0cf 06c24b14 6797ff62 098598e4 2900001c a3177b21 051604b1 
15:15:30 ipsec,debug,packet 313743d1 84c0e5e8 e28fe0da 0ac479c3 2900001c 00004004 bc4cc297 0f7d5945 
15:15:30 ipsec,debug,packet 036952ca 58a3422e f9f5f336 2900001c 00004005 ba5f04e6 51754536 7d9707c2 
15:15:30 ipsec,debug,packet 88e7925e 695a59d8 26000008 0000402e 00000005 04 
15:15:30 ipsec,debug ===== received 512 bytes from 181.77.32.212[37346] to 192.168.1.2[4500] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 2e202308 00000001 00000200 230001e4 
15:15:30 ipsec,debug,packet 5e6b3a26 c9c5042a df7c4b6e dd1b34e7 5b2eaf00 78385b0a 3401e159 5a13ed97 
15:15:30 ipsec,debug,packet 50b3cbc3 bc1bdca2 1ae1e3c7 7059efe3 26f448b2 3ba8edfb 6b8ed3f8 a05ba141 
15:15:30 ipsec,debug,packet e320d516 ee38d8fe 8ae1686c 4164aefe 14b7773a 69f22602 004b2362 29d1299f 
15:15:30 ipsec,debug,packet 00c42b91 bb815ec7 cea38356 8bf03ec7 c1696fee 5211e039 e7fb6160 dd214761 
15:15:30 ipsec,debug,packet bee015d3 8ae0da76 c1d54dae 400f43bb 799b0d3a 60a150d6 fb25528e dfb402b7 
15:15:30 ipsec,debug,packet 347cf6ed 2e887107 d3ce7d43 f9193609 be03d118 d47ba714 9e805d86 58b62466 
15:15:30 ipsec,debug,packet 7297fdc5 8b51d309 14711b7a 11e53829 97331ee2 5aabbe28 146549af 4d878634 
15:15:30 ipsec,debug,packet 8656988d c61c9711 7dc8853b c30b3eb0 fdeffca3 584e9bbe f7a3b13f 0b4fc9af 
15:15:30 ipsec,debug,packet 6e5a459a 9c47dd4e b40204fd 28bb81e5 70ffbe33 472cfff2 1429edee 71e2fe00 
15:15:30 ipsec,debug,packet bc6fae2b cb3cdb71 18f2abf9 23834ce8 af93432f 4568e07c 6fa82405 4f1f7065 
15:15:30 ipsec,debug,packet eb8f66aa d7369a0b 30490311 4b08cccc 77749549 2091cc68 995079da 2b57b51b 
15:15:30 ipsec,debug,packet b0eac70a 5d0d0134 6c0e5467 3b943d2a 39a3751a 422e366a 90811198 5767ff55 
15:15:30 ipsec,debug,packet 53435910 3d7064be 4350fd29 cdb075b2 1fe4da47 8aa9d49f 96cee644 51d739c7 
15:15:30 ipsec,debug,packet 87eec7b0 c81fae92 228c48ff ef3ad525 3d5272f9 52fbc998 69ed752a ba87ae1c 
15:15:30 ipsec,debug,packet 97763f3d d11f192a 9d450b01 016f814e 3e6bfa44 e63e48ac 47786379 1019fdd3 
15:15:30 ipsec -> ike2 request, exchange: AUTH:1 181.77.32.212[37346] f001c53b4587af8a:cbdf6108f207c5c7 
15:15:30 ipsec peer ports changed: 37358 -> 37346 
15:15:30 ipsec KA remove: 192.168.1.2[4500]->181.77.32.212[37358] 
15:15:30 ipsec,debug KA tree dump: 192.168.1.2[4500]->181.77.32.212[37358] (in_use=1) 
15:15:30 ipsec,debug KA removing this one... 
15:15:30 ipsec KA list add: 192.168.1.2[4500]->181.77.32.212[37346] 
15:15:30 ipsec payload seen: ENC (484 bytes) 
15:15:30 ipsec processing payload: ENC 
15:15:30 ipsec,debug => iv (size 0x10) 
15:15:30 ipsec,debug 5e6b3a26 c9c5042a df7c4b6e dd1b34e7 
15:15:30 ipsec,debug decrypted packet 
15:15:30 ipsec,debug,packet => decrypted packet (size 0x1db) 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 23202308 00000001 000001db 24000017 
15:15:30 ipsec,debug,packet 03000000 74657374 65407465 7374652e 636f6d27 00000c01 000000b1 17d35121 
15:15:30 ipsec,debug,packet 00002802 00000060 8a263acd e33a5885 918a3b4f 7dd83784 8d707318 69f67ad0 
15:15:30 ipsec,debug,packet 520ea754 bbb8792c 0000d402 00005001 03040718 0c98d003 00000c01 00000c80 
15:15:30 ipsec,debug,packet 0e010003 00000c01 00000c80 0e00c003 00000c01 00000c80 0e008003 00000803 
15:15:30 ipsec,debug,packet 00000e03 00000803 00000d03 00000803 00000c00 00000805 00000000 00008002 
15:15:30 ipsec,debug,packet 03040a69 a06f6503 00000c01 00001480 0e010003 00000c01 00001380 0e010003 
15:15:30 ipsec,debug,packet 00000c01 00001280 0e010003 00000c01 00001480 0e00c003 00000c01 00001380 
15:15:30 ipsec,debug,packet 
15:15:30 ipsec,debug,packet 0e00c003 00000c01 00001280 0e00c003 00000c01 00001480 0e008003 00000c01 
15:15:30 ipsec,debug,packet 00001380 0e008003 00000c01 00001280 0e008000 00000805 0000002d 00004002 
15:15:30 ipsec,debug,packet 00000007 00001000 00ffff00 000000ff ffffff08 00002800 00ffff00 00000000 
15:15:30 ipsec,debug,packet 00000000 00000000 000000ff ffffffff ffffffff ffffffff ffffff2f 00004002 
15:15:30 ipsec,debug,packet 00000007 00001000 00ffff00 000000ff ffffff08 00002800 00ffff00 00000000 
15:15:30 ipsec,debug,packet 00000000 00000000 000000ff ffffffff ffffffff ffffffff ffffff00 00002001 
15:15:30 ipsec,debug,packet 00000000 01000000 08000000 03000000 0a000000 02000000 070000 
15:15:30 ipsec payload seen: ID_I (23 bytes) 
15:15:30 ipsec payload seen: ID_R (12 bytes) 
15:15:30 ipsec payload seen: AUTH (40 bytes) 
15:15:30 ipsec payload seen: SA (212 bytes) 
15:15:30 ipsec payload seen: TS_I (64 bytes) 
15:15:30 ipsec payload seen: TS_R (64 bytes) 
15:15:30 ipsec payload seen: CONFIG (32 bytes) 
15:15:30 ipsec processing payloads: NOTIFY (none found) 
15:15:30 ipsec ike auth: respond 
15:15:30 ipsec processing payload: ID_I 
15:15:30 ipsec ID_I (RFC822): teste@teste.com 
15:15:30 ipsec processing payload: ID_R 
15:15:30 ipsec ID_R (ADDR4): 177.23.211.81 
15:15:30 ipsec processing payload: AUTH 
15:15:30 ipsec,error identity not found for peer: RFC822: teste@teste.com 
15:15:30 ipsec reply notify: AUTHENTICATION_FAILED 
15:15:30 ipsec adding notify: AUTHENTICATION_FAILED 
15:15:30 ipsec,debug => (size 0x8) 
15:15:30 ipsec,debug 00000008 00000018 
15:15:30 ipsec <- ike2 reply, exchange: AUTH:1 181.77.32.212[37346] f001c53b4587af8a:cbdf6108f207c5c7 
15:15:30 ipsec,debug,packet => outgoing plain packet (size 0x24) 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 29202320 00000001 00000024 00000008 
15:15:30 ipsec,debug,packet 00000018 
15:15:30 ipsec adding payload: ENC 
15:15:30 ipsec,debug => (size 0xe4) 
15:15:30 ipsec,debug 290000e4 3e6bfa44 e63e48ac 47786379 1019fdd3 634a957c 10fd5797 7481cb2c 
15:15:30 ipsec,debug 2753b9e0 4e0dcd1d 88b0120b c6bce012 abf6e5a3 94626e1f e0a3e8d2 218d4339 
15:15:30 ipsec,debug a186e982 e37cc204 c43535df 0f182301 e2aa1d7b 97d3855c 2d6358ad ae969223 
15:15:30 ipsec,debug ee6e94e9 b1b9ea4a fbd6ecba 814653a9 412f89b8 c7d6c465 bd983d5b edb22c16 
15:15:30 ipsec,debug 609cc363 9e73b856 ab4868a3 1f0f3d5f a131e2f0 b5668193 321d36c1 2cc40f94 
15:15:30 ipsec,debug c3beae54 a9fc3815 23f36b18 8d3dbf93 456ba665 02257399 882ad82e fa7646e9 
15:15:30 ipsec,debug 76a8a075 31507fa0 6eb54f5a 656c34f7 0b481791 00000000 00000000 00000000 
15:15:30 ipsec,debug 00000000 
15:15:30 ipsec,debug ===== sending 256 bytes from 192.168.1.2[4500] to 181.77.32.212[37346] 
15:15:30 ipsec,debug 1 times of 260 bytes message will be sent to 181.77.32.212[37346] 
15:15:30 ipsec,debug,packet f001c53b 4587af8a cbdf6108 f207c5c7 2e202320 00000001 00000100 290000e4 
15:15:30 ipsec,debug,packet 3e6bfa44 e63e48ac 47786379 1019fdd3 634a957c 10fd5797 7481cb2c 2753b9e0 
15:15:30 ipsec,debug,packet 4e0dcd1d 88b0120b c6bce012 abf6e5a3 94626e1f e0a3e8d2 218d4339 a186e982 
15:15:30 ipsec,debug,packet e37cc204 c43535df 0f182301 e2aa1d7b 97d3855c 2d6358ad ae969223 ee6e94e9 
15:15:30 ipsec,debug,packet b1b9ea4a fbd6ecba 814653a9 412f89b8 c7d6c465 bd983d5b edb22c16 609cc363 
15:15:30 ipsec,debug,packet 9e73b856 ab4868a3 1f0f3d5f a131e2f0 b5668193 321d36c1 2cc40f94 c3beae54 
15:15:30 ipsec,debug,packet a9fc3815 23f36b18 8d3dbf93 456ba665 02257399 882ad82e fa7646e9 76a8a075 
15:15:30 ipsec,debug,packet 31507fa0 6eb54f5a 656c34f7 0b481791 59a21a4e 4acc7658 f5eea95c d89dc0dc 
15:15:30 ipsec,info killing ike2 SA: 192.168.1.2[4500]-181.77.32.212[37346] spi:cbdf6108f207c5c7:f001c53b4587af8a 
15:15:30 ipsec KA remove: 192.168.1.2[4500]->181.77.32.212[37346] 
15:15:30 ipsec,debug KA tree dump: 192.168.1.2[4500]->181.77.32.212[37346] (in_use=1) 
15:15:30 ipsec,debug KA removing this one... 
Last edited by tangent on Tue Apr 09, 2024 12:27 am, edited 1 time in total.
Reason: added line breaks before "code" block to allow phpBB to render it as-intended
 
abbio90
Member Candidate
Member Candidate
Posts: 242
Joined: Fri Aug 27, 2021 9:16 pm
Contact:

Re: Trouble connecting Android phone to MikroTik IKEv2 VPN server: Need assistance with log analysis

Wed Apr 10, 2024 7:12 am

I use it on various Androids and it works well, here you can find the guide

https://foisfabio.it/index.php/2023/03/ ... tik-ikev2/
 
pimmie
newbie
Posts: 43
Joined: Fri Mar 27, 2015 4:51 pm

Re: Trouble connecting Android phone to MikroTik IKEv2 VPN server: Need assistance with log analysis

Wed Apr 10, 2024 9:28 am

Why would you still use IKEv2 as opposed to wireguard? For a site-to-site I can see why IKEv2 might still have some advantages, but not sure why it would be beneficial for a phone/road warrior?
 
abbio90
Member Candidate
Member Candidate
Posts: 242
Joined: Fri Aug 27, 2021 9:16 pm
Contact:

Re: Trouble connecting Android phone to MikroTik IKEv2 VPN server: Need assistance with log analysis

Wed Apr 10, 2024 4:31 pm

I use it on a company phone on which the apps are installed centrally by the headquarters. IKEv2 being managed in a proprietary manner by Android I can use it
 
TheCat12
Member Candidate
Member Candidate
Posts: 196
Joined: Fri Dec 31, 2021 9:13 pm

Re: Trouble connecting Android phone to MikroTik IKEv2 VPN server: Need assistance with log analysis

Wed Apr 10, 2024 7:44 pm

Looking at the debug there's something wrong with the identity of the road warrior. Could you also export your config to tell where exactly the problem is?

/export file=anynameyouwish

Who is online

Users browsing this forum: che, holvoetn, Seekport [Bot] and 45 guests