11[ENC] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> parsed CREATE_CHILD_SA request 316 [ N(REKEY_SA) SA No KE TSi TSr ]11[CFG] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> configured proposals: ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/NO_EXT_SEQ, ESP:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/NO_EXT_SEQ11[ENC] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> generating CREATE_CHILD_SA response 316 [ N(NO_PROP) ]11[NET] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> received packet: from 10.0.0.1[4500] to 10.100.0.1[4500] (764 bytes)11[KNL] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> querying policy 192.168.1.0/24 === 192.168.2.0/24 in failed, not found11[CFG] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> received proposals: ESP:AES_CBC_128/AES_CBC_256/HMAC_SHA1_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/MODP_2048/MODP_1024/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_1024_160/MODP_2048_224/MODP_2048_256/MODP_1536/ECP_256/ECP_384/ECP_521/NO_EXT_SEQ, ESP:AES_GCM_16_128/AES_GCM_16_256/MODP_2048/MODP_1024/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_1024_160/MODP_2048_224/MODP_2048_256/MODP_1536/ECP_256/ECP_384/ECP_521/NO_EXT_SEQ11[IKE] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> failed to establish CHILD_SA, keeping IKE_SA11[IKE] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> no acceptable proposal found
14[IKE] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> CHILD_SA closed10[CFG] trap not found, unable to acquire reqid 3...14[IKE] <8d241d13-f558-4dfb-bc38-b223d034e82d|2> closing CHILD_SA d2b12213-cfc6-4add-bb19-40189425785b{2} with SPIs c698e5dd_i (144508 bytes) c1cbdfef_o (407048 bytes) and TS 192.168.1.0/24 === 196.168.0.0/24
Connections:aaf171bd-3651-4058-a4a5-173f74170a88: 10.0.0.1...10.100.0.1 IKEv1/2, dpddelay=10saaf171bd-3651-4058-a4a5-173f74170a88: local: [10.0.0.1] uses pre-shared key authenticationaaf171bd-3651-4058-a4a5-173f74170a88: remote: [10.100.0.1] uses pre-shared key authenticationdf0fa5da-9de6-456c-aec0-5d5f92dd56f2: child: 0.0.0.0/0 === 0.0.0.0/0 TUNNEL, dpdaction=none8d241d13-f558-4dfb-bc38-b223d034e82d: 10.0.0.1...10.2.0.1 IKEv1/2, dpddelay=10s8d241d13-f558-4dfb-bc38-b223d034e82d: local: [10.0.0.1] uses pre-shared key authentication8d241d13-f558-4dfb-bc38-b223d034e82d: remote: [10.2.0.1] uses pre-shared key authenticationd2b12213-cfc6-4add-bb19-40189425785b: child: 0.0.0.0/0 === 0.0.0.0/0 TUNNEL, dpdaction=noneSecurity Associations (2 up, 0 connecting):8d241d13-f558-4dfb-bc38-b223d034e82d[2]: ESTABLISHED 54 minutes ago, 10.0.0.1[10.0.0.1]...10.2.0.1[10.2.0.1]8d241d13-f558-4dfb-bc38-b223d034e82d[2]: IKEv2 SPIs: 79b71f8158877bd3_i* 6ee5444982fa6228_r, rekeying in 2 hours8d241d13-f558-4dfb-bc38-b223d034e82d[2]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048d2b12213-cfc6-4add-bb19-40189425785b{2}: INSTALLED, TUNNEL, reqid 4, ESP in UDP SPIs: c698e5dd_i c1cbdfef_od2b12213-cfc6-4add-bb19-40189425785b{2}: AES_CBC_128/HMAC_SHA1_96, 131461 bytes_i, 370264 bytes_o, rekeying actived2b12213-cfc6-4add-bb19-40189425785b{2}: 192.168.1.0/24 === 192.168.0.0/24aaf171bd-3651-4058-a4a5-173f74170a88[1]: ESTABLISHED 54 minutes ago, 10.0.0.1[10.0.0.1]...10.100.0.1[10.100.0.1]aaf171bd-3651-4058-a4a5-173f74170a88[1]: IKEv2 SPIs: 462cfcc566cdae50_i* c5e5d1a11af57d2a_r, rekeying in 3 hoursaaf171bd-3651-4058-a4a5-173f74170a88[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048df0fa5da-9de6-456c-aec0-5d5f92dd56f2{1}: INSTALLED, TUNNEL, reqid 3, ESP in UDP SPIs: cf8b5207_i c210e95d_odf0fa5da-9de6-456c-aec0-5d5f92dd56f2{1}: AES_CBC_128/HMAC_SHA1_96, 1640080 bytes_i, 2461144 bytes_o, rekeying activedf0fa5da-9de6-456c-aec0-5d5f92dd56f2{1}: 192.168.1.0/24 === 192.168.0.0/24
Connections:8f79a251-2d3d-4d61-b7f5-6c0dcfbf0891: 10.0.0.1...10.100.0.2 IKEv1/2, dpddelay=10s8f79a251-2d3d-4d61-b7f5-6c0dcfbf0891: local: [10.0.0.1] uses pre-shared key authentication8f79a251-2d3d-4d61-b7f5-6c0dcfbf0891: remote: [10.100.0.2] uses pre-shared key authentication00e4d642-ed80-4ef0-9832-be100e3ad0ce: child: 192.168.1.0/24 === 192.168.0.0/24 TUNNEL, dpdaction=starta810a0e2-1d15-42d6-b69e-4fd9ede3b3cd: 10.0.0.1...10.100.0.1 IKEv1/2, dpddelay=10sa810a0e2-1d15-42d6-b69e-4fd9ede3b3cd: local: [10.0.0.1] uses pre-shared key authenticationa810a0e2-1d15-42d6-b69e-4fd9ede3b3cd: remote: [10.100.0.1] uses pre-shared key authentication03b4295e-377c-40dd-a218-2f7fa0c507bb: child: 192.168.1.0/24 === 192.168.0.0/24 TUNNEL, dpdaction=startSecurity Associations (2 up, 0 connecting):a810a0e2-1d15-42d6-b69e-4fd9ede3b3cd[508]: ESTABLISHED 3 hours ago, 10.0.0.1[10.0.0.1]...10.100.0.1[10.100.0.1]a810a0e2-1d15-42d6-b69e-4fd9ede3b3cd[508]: IKEv2 SPIs: 1c440b692b07a25e_i* c63fe1a1b59f769b_r, rekeying in 15 minutesa810a0e2-1d15-42d6-b69e-4fd9ede3b3cd[508]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_204803b4295e-377c-40dd-a218-2f7fa0c507bb{2197}: INSTALLED, TUNNEL, reqid 4, ESP in UDP SPIs: c593b369_i c0d42ecf_o03b4295e-377c-40dd-a218-2f7fa0c507bb{2197}: AES_CBC_128/HMAC_SHA1_96/MODP_1024_160, 0 bytes_i (0 pkts, 4s ago), 938144 bytes_o (5592 pkts, 1s ago), rekeying in 9 minutes03b4295e-377c-40dd-a218-2f7fa0c507bb{2197}: 192.168.1.0/24 === 192.168.0.0/248f79a251-2d3d-4d61-b7f5-6c0dcfbf0891[509]: ESTABLISHED 2 hours ago, 10.0.0.1[10.0.0.1]...10.100.0.2[10.100.0.2]8f79a251-2d3d-4d61-b7f5-6c0dcfbf0891[509]: IKEv2 SPIs: bb4d910f8dd3264d_i* cf6183813ad2d065_r, rekeying in 83 minutes8f79a251-2d3d-4d61-b7f5-6c0dcfbf0891[509]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_204800e4d642-ed80-4ef0-9832-be100e3ad0ce{2198}: INSTALLED, TUNNEL, reqid 4, ESP in UDP SPIs: c8ded20a_i cbba5c3c_o00e4d642-ed80-4ef0-9832-be100e3ad0ce{2198}: AES_CBC_128/HMAC_SHA1_96/MODP_1024_160, 639729 bytes_i (5275 pkts, 1s ago), 904216 bytes_o (5499 pkts, 1s ago), rekeying in 33 minutes00e4d642-ed80-4ef0-9832-be100e3ad0ce{2198}: 192.168.1.0/24 === 192.168.0.0/24
children { df0fa5da-9de6-456c-aec0-5d5f92dd56f2 { reqid = 3 esp_proposals = default sha256_96 = no start_action = start close_action = none dpd_action = clear mode = tunnel policies = no local_ts = 0.0.0.0/0 remote_ts = 0.0.0.0/0 rekey_time = 3600 updown = /usr/local/opnsense/scripts/ipsec/updown_event.py --connection_child df0fa5da-9de6-456c-aec0-5d5f92dd56f2 } }
children { 00e4d642-ed80-4ef0-9832-be100e3ad0ce { esp_proposals = aes128-sha1-modp1024s160 sha256_96 = no start_action = start close_action = none dpd_action = start mode = tunnel policies = yes local_ts = 10.3.0.0/19 remote_ts = 172.31.0.0/16 rekey_time = 3600 updown = /usr/local/opnsense/scripts/ipsec/updown_event.py --connection_child 00e4d642-ed80-4ef0-9832-be100e3ad0ce } }