=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2023.05.06 13:29:09 =~=~=~=~=~=~=~=~=~=~=~= ike shrank heap by 159744 bytes ike 0:To-ASA:21: out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ike 0:To-ASA:21: sent IKE msg (RETRANSMIT_SA_INIT): 192.168.150.1:500->192.168.150.10:500, len=508, vrf=0, id=1b5aeac3b3053870/0000000000000000 ike 0:To-ASA:21: out 1B5AEAC3B305387000000000000000002120220800000000000001FC22000074020000380101000603000008010000020300000802000001030000080300000103000008040000020300000804000005000000080400000E000000380201000603000008010000020300000802000002030000080300000203000008040000020300000804000005000000080400000E28000108000E0000F0EB28D5A91584AD48D66877902BFE2EE5119BE4FF72ADA551F218A374EA211E27182B7277000751AF8489321774BD62D5B71D7AD81FE59A70D487F4CCB562E05415EF2330484D263D98DAD7190047523EB3DEC6FB57F3F11CB9E3176E183DE180742961ACA76C0F25FCBA889EED085318D98E785910BA05183C655A29C09A598076F84BBBB542F2CFBBB435A94207557720B319619121DE336742195AD247A4CD8ECA4818AF45C2BFDC08706310A7E1089D0CC35C36038C1AB0D2AC483C81976A70BBC025465089ADB4B88FC82AC622819213C71865A42B621D0FFAE4BCE01E3FA1DE6F3ECE2F71A85D605174DDBF0C372F42ABCDB5C0ADA923094391DB13D1290000248CD5610AC3B3AFF8DF6D9B1C5E6B5142360FAF280C8A48A4767691961D29612C2900001C00004004F0E9DE6F0AD962E70E1860DFC7CBEC635CEEE5C52900001C000040051E76C7C151F8967336C8DD680D36A672D04243B3000000080000402E ike 0:To-ASA:21: sent IKE msg (RETRANSMIT_SA_INIT): 192.168.150.1:500->192.168.150.10:500, len=508, vrf=0, id=1b5aeac3b3053870/0000000000000000 ike 0:To-ASA:21: negotiation timeout, deleting ike 0:To-ASA: connection expiring due to phase1 down ike 0:To-ASA: deleting ike 0:To-ASA: deleted ike 0:To-ASA: schedule auto-negotiate Forti # diag debug enableike 0:To-ASA: auto-negotiate connection ike 0:To-ASA: created connection: 0xf288930 4 192.168.150.1->192.168.150.10:500. ike 0:To-ASA:sub1: chosen to populate IKE_SA traffic-selectors ike 0:To-ASA: no suitable IKE_SA, queuing CHILD_SA request and initiating IKE_SA negotiation ike 0:To-ASA:22: generate DH public value request queued ike 0:To-ASA:22: out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ike 0:To-ASA:22: sent IKE msg (SA_INIT): 192.168.150.1:500->192.168.150.10:500, len=508, vrf=0, id=944d822a3294240f/0000000000000000 ike 0:To-ASA:22: out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ike 0:To-ASA:22: sent IKE msg (RETRANSMIT_SA_INIT): 192.168.150.1:500->192.168.150.10:500, len=508, vrf=0, id=944d822a3294240f/0000000000000000 ike 0: comes 192.168.150.10:500->192.168.150.1:500,ifindex=4,vrf=0.... ike 0: IKEv2 exchange=SA_INIT id=8554128eb7f2347c/0000000000000000 len=506 ike 0: in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ike 0:8554128eb7f2347c/0000000000000000:23: responder received SA_INIT msg ike 0:8554128eb7f2347c/0000000000000000:23: VID unknown (19): CISCO-DELETE-REASON ike 0:8554128eb7f2347c/0000000000000000:23: VID unknown (55): CISCO(COPYRIGHT)&Copyright (c) 2009 Cisco Systems, Inc. ike 0:8554128eb7f2347c/0000000000000000:23: received notify type NAT_DETECTION_SOURCE_IP ike 0:8554128eb7f2347c/0000000000000000:23: received notify type NAT_DETECTION_DESTINATION_IP ike 0:8554128eb7f2347c/0000000000000000:23: received notify type FRAGMENTATION_SUPPORTED ike 0:8554128eb7f2347c/0000000000000000:23: VID FRAGMENTATION 4048B7D56EBCE88525E7DE7F00D6C2D3 ike 0:8554128eb7f2347c/0000000000000000:23: incoming proposal: ike 0:8554128eb7f2347c/0000000000000000:23: proposal id = 1: ike 0:8554128eb7f2347c/0000000000000000:23: protocol = IKEv2: ike 0:8554128eb7f2347c/0000000000000000:23: encapsulation = IKEv2/none ike 0:8554128eb7f2347c/0000000000000000:23: type=ENCR, val=DES_CBC ike 0:8554128eb7f2347c/0000000000000000:23: type=INTEGR, val=AUTH_HMAC_MD5_96 ike 0:8554128eb7f2347c/0000000000000000:23: type=PRF, val=PRF_HMAC_MD5 ike 0:8554128eb7f2347c/0000000000000000:23: type=DH_GROUP, val=MODP1536. ike 0:8554128eb7f2347c/0000000000000000:23: matched proposal id 1 ike 0:8554128eb7f2347c/0000000000000000:23: proposal id = 1: ike 0:8554128eb7f2347c/0000000000000000:23: protocol = IKEv2: ike 0:8554128eb7f2347c/0000000000000000:23: encapsulation = IKEv2/none ike 0:8554128eb7f2347c/0000000000000000:23: type=ENCR, val=DES_CBC ike 0:8554128eb7f2347c/0000000000000000:23: type=INTEGR, val=AUTH_HMAC_MD5_96 ike 0:8554128eb7f2347c/0000000000000000:23: type=PRF, val=PRF_HMAC_MD5 ike 0:8554128eb7f2347c/0000000000000000:23: type=DH_GROUP, val=MODP1536. ike 0:8554128eb7f2347c/0000000000000000:23: lifetime=86400 ike 0:8554128eb7f2347c/0000000000000000:23: SA proposal chosen, matched gateway To-ASA ike 0: found To-ASA 192.168.150.1 4 -> 192.168.150.10:500 ike 0:To-ASA:23: processing notify type NAT_DETECTION_SOURCE_IP ike 0:To-ASA:23: processing NAT-D payload ike 0:To-ASA:23: NAT detected: PEER ike 0:To-ASA:23: process NAT-D ike 0:To-ASA:23: processing notify type NAT_DETECTION_DESTINATION_IP ike 0:To-ASA:23: processing NAT-D payload ike 0:To-ASA:23: NAT detected: PEER ike 0:To-ASA:23: process NAT-D ike 0:To-ASA:23: processing notify type FRAGMENTATION_SUPPORTED ike 0:To-ASA:23: responder preparing SA_INIT msg ike 0:To-ASA:23: generate DH public value request queued ike 0:To-ASA:23: responder preparing SA_INIT msg ike 0:To-ASA:23: compute DH shared secret request queued ike 0:To-ASA:23: responder preparing SA_INIT msg ike 0:To-ASA:23: out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ike 0:To-ASA:23: sent IKE msg (SA_INIT_RESPONSE): 192.168.150.1:500->192.168.150.10:500, len=356, vrf=0, id=8554128eb7f2347c/61b8ebedddd9b2dd ike 0:To-ASA:23: IKE SA 8554128eb7f2347c/61b8ebedddd9b2dd SK_ei 8:516FC2D74872D462 ike 0:To-ASA:23: IKE SA 8554128eb7f2347c/61b8ebedddd9b2dd SK_er 8:E81E1C69D7780D52 ike 0:To-ASA:23: IKE SA 8554128eb7f2347c/61b8ebedddd9b2dd SK_ai 16:469EA5C80AB366A808F01116D6F0BA7F ike 0:To-ASA:23: IKE SA 8554128eb7f2347c/61b8ebedddd9b2dd SK_ar 16:3F4FBE01354409ED9CEF5D45ED2C7A44 ike 0: comes 192.168.150.10:4500->192.168.150.1:4500,ifindex=4,vrf=0.... ike 0: IKEv2 exchange=AUTH id=8554128eb7f2347c/61b8ebedddd9b2dd:00000001 len=260 ike 0: in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ike 0:To-ASA:23: dec 8554128EB7F2347C61B8EBEDDDD9B2DD2E20230800000001000000E82B000004230000148754138EA4C5C73B8140BECC99C38C982700000C01000000C0A864012100001802000000A9DA99968F46A65768274F76638D895F2C0000280000002401030403E25CE4740300000801000002030000080300000100000008050000002D00002802000000070000100000FFFFAC10110AAC10110A070000100000FFFFAC101100AC1011FF2900002802000000070000100000FFFF140A0A01140A0A01070000100000FFFF140A0A00140A0AFF2900000801004000290000080100400A000000080100400B ike 0:To-ASA:23: responder received AUTH msg ike 0:To-ASA:23: processing notify type INITIAL_CONTACT ike 0:To-ASA:23: processing notify type ESP_TFC_PADDING_NOT_SUPPORTED ike 0:To-ASA:23: processing notify type NON_FIRST_FRAGMENTS_ALSO ike 0:To-ASA:23: peer identifier IPV4_ADDR 192.168.100.1 ike 0:To-ASA:23: auth verify done ike 0:To-ASA:23: responder AUTH continuation ike 0:To-ASA:23: authentication succeeded ike 0:To-ASA:23: responder creating new child ike 0:To-ASA:23:26: peer proposal: ike 0:To-ASA:23:26: TSi_0 0:172.16.17.10-172.16.17.10:0 ike 0:To-ASA:23:26: TSi_1 0:172.16.17.0-172.16.17.255:0 ike 0:To-ASA:23:26: TSr_0 0:20.10.10.1-20.10.10.1:0 ike 0:To-ASA:23:26: TSr_1 0:20.10.10.0-20.10.10.255:0 ike 0:To-ASA:23:sub1:26: comparing selectors ike 0:To-ASA:23:sub2:26: comparing selectors ike 0:To-ASA:23:sub2:26: matched by rfc-rule-2 ike 0:To-ASA:23:sub2:26: phase2 matched by subset ike 0:To-ASA:23:26: local narrowing exactly matches static selector ike 0:To-ASA:23:sub2:26: accepted proposal: ike 0:To-ASA:23:sub2:26: TSi_0 0:172.16.17.0-172.16.17.255:0 ike 0:To-ASA:23:sub2:26: TSr_0 0:20.10.10.0-20.10.10.255:0 ike 0:To-ASA:23:sub2:26: autokey ike 0:To-ASA:23:sub2:26: incoming child SA proposal: ike 0:To-ASA:23:sub2:26: proposal id = 1: ike 0:To-ASA:23:sub2:26: protocol = ESP: ike 0:To-ASA:23:sub2:26: encapsulation = TUNNEL ike 0:To-ASA:23:sub2:26: type=ENCR, val=DES_CBC ike 0:To-ASA:23:sub2:26: type=INTEGR, val=MD5 ike 0:To-ASA:23:sub2:26: type=ESN, val=NO ike 0:To-ASA:23:sub2:26: PFS is disabled ike 0:To-ASA:23:sub2:26: matched proposal id 1 ike 0:To-ASA:23:sub2:26: proposal id = 1: ike 0:To-ASA:23:sub2:26: protocol = ESP: ike 0:To-ASA:23:sub2:26: encapsulation = TUNNEL ike 0:To-ASA:23:sub2:26: type=ENCR, val=DES_CBC ike 0:To-ASA:23:sub2:26: type=INTEGR, val=MD5 ike 0:To-ASA:23:sub2:26: type=ESN, val=NO ike 0:To-ASA:23:sub2:26: PFS is disabled ike 0:To-ASA:23:sub2:26: lifetime=43200 ike 0:To-ASA:23: responder preparing AUTH msg ike 0:To-ASA:23: remote port change 500 -> 4500 ike 0:To-ASA:23: established IKE SA 8554128eb7f2347c/61b8ebedddd9b2dd ike 0:To-ASA:23: check peer route: if_addr4_rcvd=0, if_addr6_rcvd=0, mode_cfg=0 ike 0:To-ASA:23: processing INITIAL-CONTACT ike 0:To-ASA: flushing ike 0:To-ASA: flushed ike 0:To-ASA:23: processed INITIAL-CONTACT ike 0:To-ASA: set oper up ike 0:To-ASA: schedule auto-negotiate ike 0:To-ASA:23:sub2:26: replay protection enabled ike 0:To-ASA:23:sub2:26: set sa life soft seconds=42931. ike 0:To-ASA:23:sub2:26: set sa life hard seconds=43200. ike 0:To-ASA:23:sub2:26: IPsec SA selectors #src=1 #dst=1 ike 0:To-ASA:23:sub2:26: src 0 7 0:20.10.10.0-20.10.10.255:0 ike 0:To-ASA:23:sub2:26: dst 0 7 0:172.16.17.0-172.16.17.255:0 ike 0:To-ASA:23:sub2:26: add IPsec SA: SPIs=a03ec535/e25ce474 ike 0:To-ASA:23:sub2:26: IPsec SA dec spi a03ec535 key 8:84E2B379299A823D auth 16:04DA92D7A6B7A401E7EF746B1A52B964 ike 0:To-ASA:23:sub2:26: IPsec SA enc spi e25ce474 key 8:99C4B2F0563CA0AF auth 16:4A0F757A5D449372865A0FF02F20CAAC ike 0:To-ASA:23:sub2:26: added IPsec SA: SPIs=a03ec535/e25ce474 ike 0:To-ASA:23:sub2:26: sending SNMP tunnel UP trap ike 0:To-ASA:23: enc 27000011020000007068617365312D69642100001802000000D6A87EAB371101F4BFEA5ADB95BEE79E2C0000280000002401030403A03EC5350300000801000002030000080300000100000008050000002D00001801000000070000100000FFFFAC101100AC1011FF0000001801000000070000100000FFFF140A0A00140A0AFF06050403020106 ike 0:To-ASA:23: out 8554128EB7F2347C61B8EBEDDDD9B2DD2E20232000000001000000BC240000A073AECE9FE6F416AE8B8E59574282D7AA9CE01878DE0EE55C036B1FB377987AB14666114386AD9104CC2243DD35E3B919D454D82B2086B3E9A26DB18B80EC05096D8257C330CB7E4864139D6D0B5ACE13AA72240A54CB73187934CFFBD0F4DDC6A7AEAF3AD4A13E8C9EE92A76243C8CF0F98B8C49AD5EEF9A8C525741C49D1D720AF462CB72866BF52E27C193B18537CE3E0C45FBBA0238A660AD1915 ike 0:To-ASA:23: sent IKE msg (AUTH_RESPONSE): 192.168.150.1:4500->192.168.150.10:4500, len=188, vrf=0, id=8554128eb7f2347c/61b8ebedddd9b2dd:00000001 ike 0:To-ASA:22: out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ike 0:To-ASA:22: sent IKE msg (RETRANSMIT_SA_INIT): 192.168.150.1:500->192.168.150.10:500, len=508, vrf=0, id=944d822a3294240f/0000000000000000 ike shrank heap by 159744 bytes ike 0:To-ASA:22: out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ike 0:To-ASA:22: sent IKE msg (RETRANSMIT_SA_INIT): 192.168.150.1:500->192.168.150.10:500, len=508, vrf=0, id=944d822a3294240f/0000000000000000 ike 0: comes 192.168.150.10:4500->192.168.150.1:4500,ifindex=4,vrf=0.... ike 0: IKEv2 exchange=INFORMATIONAL id=8554128eb7f2347c/61b8ebedddd9b2dd:00000002 len=60 ike 0: in 8554128EB7F2347C61B8EBEDDDD9B2DD2E202508000000020000003C00000020C62D0682C1D7C46B8FF81FDBE522B6605B5FA182F60EFAC589DFA724 ike 0:To-ASA:23: dec 8554128EB7F2347C61B8EBEDDDD9B2DD2E202508000000020000002000000004 ike 0:To-ASA:23: received informational request ike 0:To-ASA:23: enc 0706050403020107 ike 0:To-ASA:23: out 8554128EB7F2347C61B8EBEDDDD9B2DD2E202520000000020000003C00000020DC467AF4C52F3A04672C02C9C2671504AE23D4E9BCF4BC7242F57404 ike 0:To-ASA:23: sent IKE msg (INFORMATIONAL_RESPONSE): 192.168.150.1:4500->192.168.150.10:4500, len=60, vrf=0, id=8554128eb7f2347c/61b8ebedddd9b2dd:00000002