this is the response changing NPS from CN=VPNUsers1 to VPNUsers1
2025-10-03T19:09:25Informationalcharon11[NET1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (80 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> generating IKE_AUTH response 5 [ N(AUTH_FAILED) ]
2025-10-03T19:09:25Informationalcharon11[CFG1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> no alternative config found
2025-10-03T19:09:25Informationalcharon11[CFG1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> selected peer config '2d217cd3-5e93-4f42-a548-2e917000500f' unacceptable: insufficient authentication rounds
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> switching to peer config '2d217cd3-5e93-4f42-a548-2e917000500f'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> selected peer config 'df9e30a3-41ec-4811-a6b7-e4e0ae4f6697' unacceptable: non-matching authentication done
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> constraint check failed: group membership to 'VPNUsers1' required
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> authentication of '101.168.52.123' with EAP successful
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> parsed IKE_AUTH request 5 [ AUTH ]
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received packet: from 101.168.52.123[4500] to x.x.x.x[4500] (112 bytes)
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (80 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> generating IKE_AUTH response 4 [ EAP/SUCC ]
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> EAP method EAP_MSCHAPV2 succeeded, MSK established
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> RADIUS authentication of 'vpn.user2' successful
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received group membership 'VPNUsers2' from RADIUS
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received RADIUS Access-Accept from server 'server1'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending RADIUS Access-Request to server 'server1'
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received packet: from 101.168.52.123[4500] to x.x.x.x[4500] (80 bytes)
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (128 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received RADIUS Access-Challenge from server 'server1'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending RADIUS Access-Request to server 'server1'
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received packet: from 101.168.52.123[4500] to x.x.x.x[4500] (144 bytes)
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (112 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> initiating EAP_MSCHAPV2 method (id 0x01)
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received RADIUS Access-Challenge from server 'server1'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending RADIUS Access-Request to server 'server1'
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received EAP identity 'vpn.user2'
2025-10-03T19:09:25Informationalcharon11[NET1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (80 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> generating IKE_AUTH response 5 [ N(AUTH_FAILED) ]
2025-10-03T19:09:25Informationalcharon11[CFG1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> no alternative config found
2025-10-03T19:09:25Informationalcharon11[CFG1] <2d217cd3-5e93-4f42-a548-2e917000500f|30> selected peer config '2d217cd3-5e93-4f42-a548-2e917000500f' unacceptable: insufficient authentication rounds
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> switching to peer config '2d217cd3-5e93-4f42-a548-2e917000500f'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> selected peer config 'df9e30a3-41ec-4811-a6b7-e4e0ae4f6697' unacceptable: non-matching authentication done
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> constraint check failed: group membership to 'VPNUsers1' required
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> authentication of '101.168.52.123' with EAP successful
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> parsed IKE_AUTH request 5 [ AUTH ]
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received packet: from 101.168.52.123[4500] to x.x.x.x[4500] (112 bytes)
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (80 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> generating IKE_AUTH response 4 [ EAP/SUCC ]
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> EAP method EAP_MSCHAPV2 succeeded, MSK established
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> RADIUS authentication of 'vpn.user2' successful
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received group membership 'VPNUsers2' from RADIUS
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received RADIUS Access-Accept from server 'server1'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending RADIUS Access-Request to server 'server1'
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received packet: from 101.168.52.123[4500] to x.x.x.x[4500] (80 bytes)
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (128 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received RADIUS Access-Challenge from server 'server1'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending RADIUS Access-Request to server 'server1'
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received packet: from 101.168.52.123[4500] to x.x.x.x[4500] (144 bytes)
2025-10-03T19:09:25Informationalcharon11[NET1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending packet: from x.x.x.x[4500] to 101.168.52.123[4500] (112 bytes)
2025-10-03T19:09:25Informationalcharon11[ENC1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> initiating EAP_MSCHAPV2 method (id 0x01)
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received RADIUS Access-Challenge from server 'server1'
2025-10-03T19:09:25Informationalcharon11[CFG1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> sending RADIUS Access-Request to server 'server1'
2025-10-03T19:09:25Informationalcharon11[IKE1] <df9e30a3-41ec-4811-a6b7-e4e0ae4f6697|30> received EAP identity 'vpn.user2'