Jan 21 16:24:30 fw1 charon[37304]:
12[IKE] <con1|46555> deleting IKE_SA con1[46555] between 1.2.3.4[1.2.3.4]...9.8.7.6[9.8.7.6]12[IKE] <con1|46555> sending DELETE for IKE_SA con1[46555]12[ENC] <con1|46555> generating INFORMATIONAL request 0 [ D ]12[NET] <con1|46555> sending packet: from 1.2.3.4[4500] to 9.8.7.6[4500] (80 bytes)12[NET] <46557> received packet: from 9.8.7.6[500] to 1.2.3.4[500] (1100 bytes)12[ENC] <46557> parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]12[IKE] <46557> 9.8.7.6 is initiating an IKE_SA12[CFG] <46557> selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_204804[NET] <con1|46555> received packet: from 9.8.7.6[4500] to 1.2.3.4[4500] (80 bytes)04[ENC] <con1|46555> parsed INFORMATIONAL response 0 [ ]04[IKE] <con1|46555> IKE_SA deleted12[IKE] <46557> sending cert request for "DC=int, DC=aaa, DC=emea, CN=aaaEMEA-CA"12[IKE] <46557> sending cert request for "C=DE, ST=Bundesland, L=Ortschaft, O=aaa, E=edv@aaa.de, CN=aaaMobile"12[IKE] <46557> sending cert request for "C=DE, ST=Bundesland, L=Ortschaft, O=aaa, E=edv@aaa.de, CN=aaaFirewall-CA"12[IKE] <46557> sending cert request for "C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA"12[IKE] <46557> sending cert request for "C=US, O=Let's Encrypt, CN=R3"12[IKE] <46557> sending cert request for "C=DE, ST=B-W, L=Ortschaft, O= Aluminium-Werke Wut??schingen AG and Co.KG, E=edv@aaa.de, CN=aaaFW-Squid"12[IKE] <46557> sending cert request for "C=US, O=(STAGING) Let's Encrypt, CN=(STAGING) Artificial Apricot R3"12[ENC] <46557> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]12[NET] <46557> sending packet: from 1.2.3.4[500] to 9.8.7.6[500] (617 bytes)12[NET] <46557> received packet: from 9.8.7.6[4500] to 1.2.3.4[4500] (688 bytes)12[ENC] <46557> parsed IKE_AUTH request 1 [ IDi CERTREQ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]12[IKE] <46557> received cert request for "C=DE, ST=Bundesland, L=Ortschaft, O=aaa, E=edv@aaa.de, CN=aaaFirewall-CA"12[IKE] <46557> received 1 cert requests for an unknown ca12[CFG] <46557> looking for peer configs matching 1.2.3.4[1.2.3.4]...9.8.7.6[9.8.7.6]12[CFG] <con1|46557> selected peer config 'con1'12[IKE] <con1|46557> authentication of '9.8.7.6' with pre-shared key successful12[IKE] <con1|46557> peer supports MOBIKE12[IKE] <con1|46557> authentication of '1.2.3.4' (myself) with pre-shared key12[IKE] <con1|46556> schedule delete of duplicate IKE_SA for peer '9.8.7.6' due to uniqueness policy and suspected reauthentication12[IKE] <con1|46557> IKE_SA con1[46557] established between 1.2.3.4[1.2.3.4]...9.8.7.6[9.8.7.6]12[IKE] <con1|46557> scheduling reauthentication in 2635s12[IKE] <con1|46557> maximum IKE_SA lifetime 3175s12[CFG] <con1|46557> selected proposal: ESP:AES_CBC_128/HMAC_SHA2_256_128/NO_EXT_SEQ12[IKE] <con1|46557> CHILD_SA con1{46733} established with SPIs c542ab3c_i c7765dd3_o and TS 172.16.20.232/29 === 192.168.190.0/2412[ENC] <con1|46557> generating IKE_AUTH response 1 [ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) ]12[NET] <con1|46557> sending packet: from 1.2.3.4[4500] to 9.8.7.6[4500] (336 bytes)