IT備忘録

Cisco
IPsec IKEv2のデバッグログ

構成図

構成図


IPsec IKEv2のコンフィグで、IPsecが接続される際のデバッグログを記録します。




RT-1のデバッグログ(イニシエーターとして動作)

RT-1#debug crypto ikev2
IKEv2 default debugging is on
RT-1#
RT-1#debug crypto ipsec
Crypto IPSEC debugging is on
RT-1#
000326: *Nov 16 20:51:08.683: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= 11.11.11.11:500, remote= 22.22.22.22:500,
    local_proxy= 10.1.1.0/255.255.255.0/256/0,
    remote_proxy= 10.2.1.0/255.255.255.0/256/0,
    protocol= ESP, transform= esp-aes esp-sha256-hmac  (Tunnel),
    lifedur= 1200s and 4608000kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
000327: *Nov 16 20:51:08.683: IKEv2:Searching Policy with fvrf 0, local address 11.11.11.11
000328: *Nov 16 20:51:08.683: IKEv2:Found Policy 'Policy-name'
000329: *Nov 16 20:51:08.683: IKEv2:(SESSION ID = 3,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 2
000330: *Nov 16 20:51:08.683: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
000331: *Nov 16 20:51:08.683: IKEv2:(SESSION ID = 3,SA ID = 1):Request queued for computation of DH key
000332: *Nov 16 20:51:08.683: IKEv2:IKEv2 initiator - no config data to send in IKE_SA_INIT exch
000333: *Nov 16 20:51:08.683: IKEv2:(SESSION ID = 3,SA ID = 1):Generating IKE_SA_INIT message
000334: *Nov 16 20:51:08.683: IKEv2:(SESSION ID = 3,SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
   AES-CBC   SHA256   SHA256   DH_GROUP_1024_MODP/Group 2

000335: *Nov 16 20:51:08.683: IKEv2:(SESSION ID = 3,SA ID = 1):Sending Packet [To 22.22.22.22:500/From 11.11.11.11:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
 SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)

000336: *Nov 16 20:51:08.683: IKEv2:(SESSION ID = 3,SA ID = 1):Insert SA

000337: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):Received Packet [From 22.22.22.22:500/To 11.11.11.11:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : FB1A112B17F492AE Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
 SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)

000338: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):Processing IKE_SA_INIT message
000339: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):Verify SA init message
000340: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):Processing IKE_SA_INIT message
000341: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):Checking NAT discovery
000342: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):NAT not found
000343: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 2
000344: *Nov 16 20:51:08.691: IKEv2:(SESSION ID = 3,SA ID = 1):Request queued for computation of DH secret
000345: *Nov 16 20:51:08.695: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
000346: *Nov 16 20:51:08.695: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA
000347: *Nov 16 20:51:08.695: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED
000348: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Completed SA init exchange
000349: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Check for EAP exchange
000350: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Generate my authentication data
000351: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Use preshared key for id 11.11.11.11, key len 6
000352: *Nov 16 20:51:08.695: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
000353: *Nov 16 20:51:08.695: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
000354: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Get my authentication method
000355: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):My authentication method is 'PSK'
000356: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Check for EAP exchange
000357: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Generating IKE_AUTH message
000358: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Constructing IDi payload: '11.11.11.11' of type 'IPv4 address'
000359: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
   AES-CBC   SHA256   Don't use ESN
000360: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Building packet for encryption.
Payload contents:
 VID IDi AUTH SA TSi TSr NOTIFY(INITIAL_CONTACT) NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)

000361: *Nov 16 20:51:08.695: IKEv2:(SESSION ID = 3,SA ID = 1):Sending Packet [To 22.22.22.22:500/From 11.11.11.11:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : FB1A112B17F492AE Message id: 1
IKEv2 IKE_AUTH Exchange REQUEST
Payload contents:
 ENCR


000362: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Received Packet [From 22.22.22.22:500/To 11.11.11.11:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : FB1A112B17F492AE Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents:
 VID IDr AUTH SA TSi TSr NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)

000363: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Process auth response notify
000364: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Searching policy based on peer's identity '22.22.22.22' of type 'IPv4 address'
000365: *Nov 16 20:51:08.703: IKEv2:Searching Policy with fvrf 0, local address 11.11.11.11
000366: *Nov 16 20:51:08.703: IKEv2:Found Policy 'Policy-name'
000367: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Verify peer's policy
000368: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Peer's policy verified
000369: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Get peer's authentication method
000370: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Peer's authentication method is 'PSK'
000371: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Get peer's preshared key for 22.22.22.22
000372: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Verify peer's authentication data
000373: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Use preshared key for id 22.22.22.22, key len 6
000374: *Nov 16 20:51:08.703: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
000375: *Nov 16 20:51:08.703: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
000376: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Verification of peer's authenctication data PASSED
000377: *Nov 16 20:51:08.703: IKEv2:(SESSION ID = 3,SA ID = 1):Check for EAP exchange
000378: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):Processing IKE_AUTH message
000379: *Nov 16 20:51:08.707: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 5 flags 16369 keysize 128 IDB 0x12151A54
000380: *Nov 16 20:51:08.707: IPSEC(validate_proposal_request): proposal part #1
000381: *Nov 16 20:51:08.707: IPSEC(validate_proposal_request): proposal part #1,
  (key eng. msg.) INBOUND local= 11.11.11.11:0, remote= 22.22.22.22:0,
    local_proxy= 10.1.1.0/255.255.255.0/256/0,
    remote_proxy= 10.2.1.0/255.255.255.0/256/0,
    protocol= ESP, transform= NONE  (Tunnel),
    lifedur= 0s and 0kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
000382: *Nov 16 20:51:08.707: Crypto mapdb : proxy_match
        src addr     : 10.1.1.0
        dst addr     : 10.2.1.0
        protocol     : 0
        src port     : 0
        dst port     : 0
000383: *Nov 16 20:51:08.707: (ipsec_process_proposal)Map Accepted: MAP-name, 160
000384: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (1800 sec) started
000385: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):Session with IKE ID PAIR (22.22.22.22, 11.11.11.11) is UP
000386: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):Initializing DPD, configured for 30 seconds
000387: *Nov 16 20:51:08.707: IKEv2:IKEv2 MIB tunnel started, tunnel index 1
000388: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):Load IPSEC key material
000389: *Nov 16 20:51:08.707: IKEv2:(SA ID = 1):[IKEv2 -> IPsec] Create IPsec SA into IPsec database
000390: *Nov 16 20:51:08.707: IPSEC(key_engine): got a queue event with 1 KMI message(s)
000391: *Nov 16 20:51:08.707: Crypto mapdb : proxy_match
        src addr     : 10.1.1.0
        dst addr     : 10.2.1.0
        protocol     : 256
        src port     : 0
        dst port     : 0
000392: *Nov 16 20:51:08.707: IPSEC:(SESSION ID = 3) (crypto_ipsec_create_ipsec_sas) Map found MAP-name, 160
000393: *Nov 16 20:51:08.707: IPSEC:(SESSION ID = 3) (crypto_ipsec_sa_find_ident_head) reconnecting with the same proxies and peer 22.22.22.22
000394: *Nov 16 20:51:08.707: IPSEC:(SESSION ID = 3) (create_sa) sa created,
  (sa) sa_dest= 11.11.11.11, sa_proto= 50,
    sa_spi= 0x6753C32D(1733542701),
    sa_trans= esp-aes esp-sha256-hmac , sa_conn_id= 24
    sa_lifetime(k/sec)= (4608000/1200),
  (identity) local= 11.11.11.11:0, remote= 22.22.22.22:0,
    local_proxy= 10.1.1.0/255.255.255.0/256/0,
    remote_proxy= 10.2.1.0/255.255.255.0/256/0
000395: *Nov 16 20:51:08.707: IPSEC:(SESSION ID = 3) (create_sa) sa created,
  (sa) sa_dest= 22.22.22.22, sa_proto= 50,
    sa_spi= 0xF2298290(4062806672),
    sa_trans= esp-aes esp-sha256-hmac , sa_conn_id= 23
    sa_lifetime(k/sec)= (4608000/1200),
  (identity) local= 11.11.11.11:0, remote= 22.22.22.22:0,
    local_proxy= 10.1.1.0/255.255.255.0/256/0,
    remote_proxy= 10.2.1.0/255.255.255.0/256/0
000396: *Nov 16 20:51:08.707: IPSEC: Expand action denied, notify RP
000397: *Nov 16 20:51:08.707: IKEv2:(SA ID = 1):[IPsec -> IKEv2] Creation of IPsec SA into IPsec database PASSED
000398: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):Checking for duplicate IKEv2 SA
RT-1#
000399: *Nov 16 20:51:08.707: IKEv2:(SESSION ID = 3,SA ID = 1):No duplicate IKEv2 SA found
RT-1#no debug all
All possible debugging has been turned off



RT-2のデバッグログ(レスポンダーとして動作)

RT-2#debug crypto ikev2
IKEv2 default debugging is on
RT-2#
RT-2#debug crypto ipsec
Crypto IPSEC debugging is on
RT-2#
000318: *Nov 16 19:32:53.187: IKEv2:Received Packet [From 11.11.11.11:500/To 22.22.22.22:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : 0000000000000000 Message id: 0
IKEv2 IKE_SA_INIT Exchange REQUEST
Payload contents:
 SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)

000319: *Nov 16 19:32:53.187: IKEv2:(SESSION ID = 9,SA ID = 1):Verify SA init message
000320: *Nov 16 19:32:53.187: IKEv2:(SESSION ID = 9,SA ID = 1):Insert SA
000321: *Nov 16 19:32:53.191: IKEv2:Searching Policy with fvrf 0, local address 22.22.22.22
000322: *Nov 16 19:32:53.191: IKEv2:Found Policy 'Policy-name'
000323: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):Processing IKE_SA_INIT message
000324: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieve configured trustpoint(s)
000325: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): NONE
000326: *Nov 16 19:32:53.191: IKEv2:Failed to retrieve Certificate Issuer list
000327: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH public key, DH Group 2
000328: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
000329: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):Request queued for computation of DH key
000330: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):[IKEv2 -> Crypto Engine] Computing DH secret key, DH Group 2
000331: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):Request queued for computation of DH secret
000332: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] DH key Computation PASSED
000333: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[IKEv2 -> Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA
000334: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[Crypto Engine -> IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED
000335: *Nov 16 19:32:53.191: IKEv2:IKEv2 responder - no config data to send in IKE_SA_INIT exch
000336: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):Generating IKE_SA_INIT message
000337: *Nov 16 19:32:53.191: IKEv2:(SESSION ID = 9,SA ID = 1):IKE Proposal: 1, SPI size: 0 (initial negotiation),
Num. transforms: 4
   AES-CBC   SHA256   SHA256   DH_GROUP_1024_MODP/Group 2
000338: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Retrieve configured trustpoint(s)
000339: *Nov 16 19:32:53.191: IKEv2:(SA ID = 1):[PKI -> IKEv2] Retrieved trustpoint(s): NONE
000340: *Nov 16 19:32:53.191: IKEv2:Failed to retrieve Certificate Issuer list

000341: *Nov 16 19:32:53.195: IKEv2:(SESSION ID = 9,SA ID = 1):Sending Packet [To 11.11.11.11:500/From 22.22.22.22:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : FB1A112B17F492AE Message id: 0
IKEv2 IKE_SA_INIT Exchange RESPONSE
Payload contents:
 SA KE N VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP)

000342: *Nov 16 19:32:53.195: IKEv2:(SESSION ID = 9,SA ID = 1):Completed SA init exchange
000343: *Nov 16 19:32:53.195: IKEv2:(SESSION ID = 9,SA ID = 1):Starting timer (30 sec) to wait for auth message

000344: *Nov 16 19:32:53.199: IKEv2:(SESSION ID = 9,SA ID = 1):Received Packet [From 11.11.11.11:500/To 22.22.22.22:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : FB1A112B17F492AE Message id: 1
IKEv2 IKE_AUTH Exchange REQUEST
Payload contents:
 VID IDi AUTH SA TSi TSr NOTIFY(INITIAL_CONTACT) NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)

000345: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Stopping timer to wait for auth message
000346: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Checking NAT discovery
000347: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):NAT not found
000348: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Searching policy based on peer's identity '11.11.11.11' of type 'IPv4 address'
000349: *Nov 16 19:32:53.203: IKEv2:found matching IKEv2 profile 'Profile-name'
000350: *Nov 16 19:32:53.203: IKEv2:Searching Policy with fvrf 0, local address 22.22.22.22
000351: *Nov 16 19:32:53.203: IKEv2:Found Policy 'Policy-name'
000352: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Verify peer's policy
000353: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Peer's policy verified
000354: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Get peer's authentication method
000355: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Peer's authentication method is 'PSK'
000356: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Get peer's preshared key for 11.11.11.11
000357: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Verify peer's authentication data
000358: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Use preshared key for id 11.11.11.11, key len 6
000359: *Nov 16 19:32:53.203: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
000360: *Nov 16 19:32:53.203: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
000361: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Verification of peer's authenctication data PASSED
000362: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Processing INITIAL_CONTACT
000363: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Processing IKE_AUTH message
000364: *Nov 16 19:32:53.203: IKEv2:KMI/verify policy/sending to IPSec:
         prot: 3 txfm: 12 hmac 5 flags 16369 keysize 128 IDB 0x0
000365: *Nov 16 19:32:53.203: IPSEC(validate_proposal_request): proposal part #1
000366: *Nov 16 19:32:53.203: IPSEC(validate_proposal_request): proposal part #1,
  (key eng. msg.) INBOUND local= 22.22.22.22:0, remote= 11.11.11.11:0,
    local_proxy= 10.2.1.0/255.255.255.0/256/0,
    remote_proxy= 10.1.1.0/255.255.255.0/256/0,
    protocol= ESP, transform= NONE  (Tunnel),
    lifedur= 0s and 0kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
000367: *Nov 16 19:32:53.203: Crypto mapdb : proxy_match
        src addr     : 10.2.1.0
        dst addr     : 10.1.1.0
        protocol     : 0
        src port     : 0
        dst port     : 0
000368: *Nov 16 19:32:53.203: (ipsec_process_proposal)Map Accepted: MAP-name, 160
000369: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Get my authentication method
000370: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):My authentication method is 'PSK'
000371: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Get peer's preshared key for 11.11.11.11
000372: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Generate my authentication data
000373: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Use preshared key for id 22.22.22.22, key len 6
000374: *Nov 16 19:32:53.203: IKEv2:[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
000375: *Nov 16 19:32:53.203: IKEv2:[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
000376: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Get my authentication method
000377: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):My authentication method is 'PSK'
000378: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Generating IKE_AUTH message
000379: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Constructing IDr payload: '22.22.22.22' of type 'IPv4 address'
000380: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):ESP Proposal: 1, SPI size: 4 (IPSec negotiation),
Num. transforms: 3
   AES-CBC   SHA256   Don't use ESN
000381: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Building packet for encryption.
Payload contents:
 VID IDr AUTH SA TSi TSr NOTIFY(SET_WINDOW_SIZE) NOTIFY(ESP_TFC_NO_SUPPORT) NOTIFY(NON_FIRST_FRAGS)

000382: *Nov 16 19:32:53.203: IKEv2:(SESSION ID = 9,SA ID = 1):Sending Packet [To 11.11.11.11:500/From 22.22.22.22:500/VRF i0:f0]
Initiator SPI : 3F4707F23174F959 - Responder SPI : FB1A112B17F492AE Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents:
 ENCR

000383: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (1800 sec) started
000384: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):Session with IKE ID PAIR (11.11.11.11, 22.22.22.22) is UP
000385: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):Initializing DPD, configured for 30 seconds
000386: *Nov 16 19:32:53.207: IKEv2:IKEv2 MIB tunnel started, tunnel index 1
000387: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):Load IPSEC key material
000388: *Nov 16 19:32:53.207: IKEv2:(SA ID = 1):[IKEv2 -> IPsec] Create IPsec SA into IPsec database
000389: *Nov 16 19:32:53.207: IPSEC(key_engine): got a queue event with 1 KMI message(s)
000390: *Nov 16 19:32:53.207: Crypto mapdb : proxy_match
        src addr     : 10.2.1.0
        dst addr     : 10.1.1.0
        protocol     : 256
        src port     : 0
        dst port     : 0
000391: *Nov 16 19:32:53.207: IPSEC:(SESSION ID = 9) (crypto_ipsec_create_ipsec_sas) Map found MAP-name, 160
000392: *Nov 16 19:32:53.207: IPSEC:(SESSION ID = 9) (create_sa) sa created,
  (sa) sa_dest= 22.22.22.22, sa_proto= 50,
    sa_spi= 0xF2298290(4062806672),
    sa_trans= esp-aes esp-sha256-hmac , sa_conn_id= 23
    sa_lifetime(k/sec)= (4608000/1200),
  (identity) local= 22.22.22.22:0, remote= 11.11.11.11:0,
    local_proxy= 10.2.1.0/255.255.255.0/256/0,
    remote_proxy= 10.1.1.0/255.255.255.0/256/0
000393: *Nov 16 19:32:53.207: IPSEC:(SESSION ID = 9) (create_sa) sa created,
  (sa) sa_dest= 11.11.11.11, sa_proto= 50,
    sa_spi= 0x6753C32D(1733542701),
    sa_trans= esp-aes esp-sha256-hmac , sa_conn_id= 24
    sa_lifetime(k/sec)= (4608000/1200),
  (identity) local= 22.22.22.22:0, remote= 11.11.11.11:0,
    local_proxy= 10.2.1.0/255.255.255.0/256/0,
    remote_proxy= 10.1.1.0/255.255.255.0/256/0
000394: *Nov 16 19:32:53.207: IPSEC: Expand action denied, notify RP
000395: *Nov 16 19:32:53.207: IKEv2:(SA ID = 1):[IPsec -> IKEv2] Creation of IPsec SA into IPsec database PASSED
000396: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):Checking for duplicate IKEv2 SA
000397: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):No duplicate IKEv2 SA found
000398: *Nov 16 19:32:53.207: IKEv2:(SESSION ID = 9,SA ID = 1):Starting timer (8 sec) to delete negotiation context
RT-2#
RT-2#no debug all
All possible debugging has been turned off