I have to tunnels created and configured and reporting up. For reference azure_gateway and local_gateway are substituted for public facing IPs which are either peer endpoint.
vyatta@vyatta:~$ show vpn ipsec sa
Peer ID / IP Local ID / IP
------------ -------------
remote local
Tunnel State Bytes Out/In Encrypt Hash NAT-T A-Time L-Time Proto
------ ----- ------------- ------- ---- ----- ------ ------ -----
1 up 120.0/812.0 aes256 sha1 no 323 3600 all
2 up 4.0K/2.8K aes256 sha1 no 322 3600 all
Here is the routing table.
vyatta@vyatta:~$ show ip route
Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF,
I - ISIS, B - BGP, > - selected route, * - FIB route
S>* 0.0.0.0/0 [1/0] via local_gateway, eth0
K>* 10.30.0.0/16 is directly connected, eth0
C>* 10.50.0.0/24 is directly connected, eth2
C>* 10.101.101.0/24 is directly connected, eth1
S>* 10.250.0.0/16 [1/0] via 10.50.0.1, eth2
C>* 127.0.0.0/8 is directly connected, lo
C>* local_gateway_subnet is directly connected, eth0
I am trying to connect to Windows Azure Virtual Network with VPN.
The Azure subnet is 10.30.0.0/24.
When one tunnel is up I can ping from 10.30.0.4 --> 10.101.101.20 (local server) with no problem.
When the other tunnel is up I can ping from 10.30.0.4 -->10.50.0.203 (router interface) with no problem.
Both tunnels will not stay up at the same time and they flip flow every 60 seconds exactly.
Here is the debug output:
vyatta@vyatta:~$ show vpn debug
000 Status of IKEv1 pluto daemon (strongSwan 4.5.2):
000 interface lo/lo ::1:500
000 interface lo/lo 127.0.0.1:4500
000 interface lo/lo 127.0.0.1:500
000 interface eth0/eth0 local_gateway:4500
000 interface eth0/eth0 local_gateway:500
000 interface eth1/eth1 10.101.101.1:4500
000 interface eth1/eth1 10.101.101.1:500
000 interface eth2/eth2 10.50.0.203:4500
000 interface eth2/eth2 10.50.0.203:500
000 %myid = '%any'
000 loaded plugins: test-vectors curl ldap aes des sha1 sha2 md5 random x509 pkcs1 pgp dnskey pem openssl gmp hmac xauth attr kernel-netlink resolve
000 debug options: raw+crypt+parsing+emitting+control+lifecycle+kernel+dns+natt+oppo+controlmore
000
000 "peer-137.117.97.216-tunnel-1": 10.101.101.0/24===local_gateway[local_gateway]...azure_gateway[azure_gateway]===10.30.0.0/16; erouted; eroute owner: #3442
000 "peer-azure_gateway-tunnel-1": ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "peer-azure_gateway-tunnel-1": dpd_action: restart; dpd_delay: 30s; dpd_timeout: 120s;
000 "peer-azure_gateway-tunnel-1": policy: PSK+ENCRYPT+TUNNEL; prio: 24,16; interface: eth0;
000 "peer-azure_gateway-tunnel-1": newest ISAKMP SA: #0; newest IPsec SA: #3442;
000 "peer-azure_gateway-tunnel-1": ESP proposal: AES_CBC_256/HMAC_SHA1/
000 "peer-azure_gateway-tunnel-2": 10.50.0.0/24===local_gateway[local_gateway]...azure_gateway[azure_gateway]===10.30.0.0/16; erouted; eroute owner: #3444
000 "peer-azure_gateway-tunnel-2": ike_life: 28800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 1
000 "peer-azure_gateway-tunnel-2": dpd_action: restart; dpd_delay: 30s; dpd_timeout: 120s;
000 "peer-azure_gateway-tunnel-2": policy: PSK+ENCRYPT+TUNNEL; prio: 24,16; interface: eth0;
000 "peer-azure_gateway-tunnel-2": newest ISAKMP SA: #3441; newest IPsec SA: #3444;
000 "peer-azure_gateway-tunnel-2": IKE proposal: AES_CBC_256/HMAC_SHA1/MODP_1024
000 "peer-azure_gateway-tunnel-2": ESP proposal: AES_CBC_256/HMAC_SHA1/
000
000 #3440: "peer-azure_gateway-tunnel-1" STATE_QUICK_I1 (sent QI1, expecting QR1); EVENT_RETRANSMIT in 5s
000 #3442: "peer-azure_gateway-tunnel-1" STATE_QUICK_R2 (IPsec SA established); EVENT_SA_REPLACE in 3326s; newest IPSEC; eroute owner
000 #3442: "peer-azure_gateway-tunnel-1" esp.1a711c1c@azure_gateway (0 bytes) esp.ca5bd91d@local_gateway (152 bytes, 0s ago); tunnel
000 #3444: "peer-azure_gateway-tunnel-2" STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 2899s; newest IPSEC; eroute owner
000 #3444: "peer-azure_gateway-tunnel-2" esp.b66776de@azure_gateway (60 bytes) esp.ce333245@local_gateway (32 bytes, 2s ago); tunnel
000 #3441: "peer-azure_gateway-tunnel-2" STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 28525s; newest ISAKMP
000
Here are three minutes of logs output:
Aug 1 11:45:01 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:45:12 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:45:16 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000080 (perhaps this is a duplicated packet)
Aug 1 11:45:16 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:45:31 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000080 (perhaps this is a duplicated packet)
Aug 1 11:45:31 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:45:42 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:45:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: received Delete SA(0x67bd2cc6) payload: deleting IPSEC State #3436
Aug 1 11:45:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: received Delete SA(0x0150d732) payload: deleting IPSEC State #3434
Aug 1 11:45:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3433: received Delete SA payload: deleting ISAKMP State #3433
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: received Vendor ID payload [RFC 3947]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Aug 1 11:45:46 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [IKE CGA version 1]
Aug 1 11:45:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: responding to Main Mode
Aug 1 11:45:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Oakley Transform [AES_CBC (256), HMAC_SHA2_256, MODP_1024] refused due to strict flag
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: NAT-Traversal: Result using RFC 3947: no NAT detected
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Peer ID is ID_IPV4_ADDR: 'azure_gateway'
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sent MR3, ISAKMP SA established
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: cannot respond to IPsec SA request because no connection is known for 10.250.0.0/16===local_gateway[local_gateway]...azure_gateway[azure_gateway]===10.30.0.0/16
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_ID_INFORMATION to azure_gateway:500
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3438: IPSec Transform [AES_CBC (256), HMAC_SHA2_256] refused due to strict flag
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3438: responding to Quick Mode
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3438: IPsec SA established {ESP=>0x82d2ae6e
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3439: IPSec Transform [AES_CBC (256), HMAC_SHA2_256] refused due to strict flag
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3439: responding to Quick Mode
Aug 1 11:45:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3439: IPsec SA established {ESP=>0x8132c64e
Aug 1 11:45:48 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:45:48 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:45:49 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:45:49 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:45:52 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:45:52 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:45:59 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:45:59 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:46:12 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:46:14 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:46:14 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:46:29 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:46:29 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:46:42 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: received Delete SA(0x8132c64e) payload: deleting IPSEC State #3439
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: received Delete SA(0x82d2ae6e) payload: deleting IPSEC State #3438
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3440: initiating Quick Mode PSK+ENCRYPT+TUNNEL {using isakmp#3437}
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3437: received Delete SA payload: deleting ISAKMP State #3437
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: received Vendor ID payload [RFC 3947]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Aug 1 11:46:44 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [IKE CGA version 1]
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: responding to Main Mode
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Oakley Transform [AES_CBC (256), HMAC_SHA2_256, MODP_1024] refused due to strict flag
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: NAT-Traversal: Result using RFC 3947: no NAT detected
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Peer ID is ID_IPV4_ADDR: 'azure_gateway'
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sent MR3, ISAKMP SA established
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3442: IPSec Transform [AES_CBC (256), HMAC_SHA2_256] refused due to strict flag
Aug 1 11:46:44 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3442: responding to Quick Mode
Aug 1 11:46:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3442: IPsec SA established {ESP=>0x1a711c1c
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3443: IPSec Transform [AES_CBC (256), HMAC_SHA2_256] refused due to strict flag
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3443: responding to Quick Mode
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3443: IPsec SA established {ESP=>0xaff07872
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3444: initiating Quick Mode PSK+ENCRYPT+TUNNEL {using isakmp#3441}
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3444: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3444: sent QI2, IPsec SA established {ESP=>0xb66776de
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3444: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3444: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3444: sending encrypted notification INVALID_PAYLOAD_TYPE to azure_gateway:500
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: received Delete SA(0xaff07872) payload: deleting IPSEC State #3443
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: cannot respond to IPsec SA request because no connection is known for 10.250.0.0/16===local_gateway[local_gateway]...azure_gateway[azure_gateway]===10.30.0.0/16
Aug 1 11:46:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_ID_INFORMATION to azure_gateway:500
Aug 1 11:46:48 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x03000000 (perhaps this is a duplicated packet)
Aug 1 11:46:48 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:46:49 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x03000000 (perhaps this is a duplicated packet)
Aug 1 11:46:49 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:46:52 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x03000000 (perhaps this is a duplicated packet)
Aug 1 11:46:52 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:00 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x03000000 (perhaps this is a duplicated packet)
Aug 1 11:47:00 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:12 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:47:15 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x03000000 (perhaps this is a duplicated packet)
Aug 1 11:47:15 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:30 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x03000000 (perhaps this is a duplicated packet)
Aug 1 11:47:30 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:42 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: received Delete SA(0xb66776de) payload: deleting IPSEC State #3444
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: received Delete SA(0x1a711c1c) payload: deleting IPSEC State #3442
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3441: received Delete SA payload: deleting ISAKMP State #3441
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: received Vendor ID payload [RFC 3947]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [FRAGMENTATION]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Aug 1 11:47:45 vyatta pluto[3500]: packet from azure_gateway:500: ignoring Vendor ID payload [IKE CGA version 1]
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: responding to Main Mode
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Oakley Transform [AES_CBC (256), HMAC_SHA2_256, MODP_1024] refused due to strict flag
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: NAT-Traversal: Result using RFC 3947: no NAT detected
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Peer ID is ID_IPV4_ADDR: 'azure_gateway'
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sent MR3, ISAKMP SA established
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: cannot respond to IPsec SA request because no connection is known for 10.250.0.0/16===local_gateway[local_gateway]...azure_gateway[azure_gateway]===10.30.0.0/16
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sending encrypted notification INVALID_ID_INFORMATION to azure_gateway:500
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3446: IPSec Transform [AES_CBC (256), HMAC_SHA2_256] refused due to strict flag
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3446: responding to Quick Mode
Aug 1 11:47:45 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3446: IPsec SA established {ESP=>0x0cde9056
Aug 1 11:47:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:47:46 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:47:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3447: IPSec Transform [AES_CBC (256), HMAC_SHA2_256] refused due to strict flag
Aug 1 11:47:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3447: responding to Quick Mode
Aug 1 11:47:47 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3447: IPsec SA established {ESP=>0x1f0f650a
Aug 1 11:47:50 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:47:50 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:47:54 vyatta pluto[3500]: "peer-azure_gateway-tunnel-1" #3440: max number of retransmissions (2) reached STATE_QUICK_I1
Aug 1 11:47:57 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:47:57 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
Aug 1 11:48:12 vyatta vmsvc[2212]: [ warning] [guestinfo] Failed to get vmstats.
Aug 1 11:48:13 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x01000000 (perhaps this is a duplicated packet)
Aug 1 11:48:13 vyatta pluto[3500]: "peer-azure_gateway-tunnel-2" #3445: sending encrypted notification INVALID_MESSAGE_ID to azure_gateway:500
vyatta@vyatta:~$
What setting am I missing that is causing this flipping to happen every 60 seconds. Sometimes it can be longer but generally it happens every 60 seconds. I am running a constant ping on both communications path so active data should be on each.
Thanks in advanced.
Jason