Hello Timothy,
Thank you for your reply. I thought of that to, I did have the "vpn accel off x.x.x.x" command ready but need a maintenance window, which I didn't have, yet. I would like to get as much info as possible, and it is on my "to do" list. ICMP traffic actually works its the ESP packets that are the problem. JHF is 92
6900 appliance
|Id|Name |Status |Interfaces |Features |
+---------------------------------------------------------------------------------+
|0 |KPPAK |enabled
To sum up:
packet is being droped at "iD":
vpn_is_it_encrypted_packet: dir 0, x.x.x.x:0 -> y.y.y.y:0 IPP 50 IPsec packet, but not ours ;
...
vpnk_multik_forward (in): multicore VPN enabled;
...
chain_ipsec_methods_ok: ******************* Illegal interfaces group 0 get_interfaces_group = -8 ifnum = 34 ;
...
Illegal interfaces group 0 get_interfaces_group = -8 ifnum = 34 ; -> no idea atm
...
vpnk_get_mspi_from_opaque: retuned mspi = [fail]
get_msa_by_mspi: mspi [fail] ... returning;
...
vpn_enc_scheme_to_schemname: illegal scheme -1;
...
fw_log_drop_ex: Packet proto=50 ... dropped by vpn_drop_and_log
Reason: Failure preparing tunnel creation, internal error;
So no mspi, no SA.
I had some different issues on R81.10 but is it possible that packet is being handled by IKED instead of VPND?
I've uploaded this logs to TAC just now. I'll post what the problem/solution was.