As I am limited to my mobile at the moment my observation is not really safe. From my perspective the debug shows no kernel-level packet drops. Data traffic is fully accelerated by SecureXL (SXL).
The issue seems to be a missing Outbound IPsec SA (Phase 2). While inbound traffic is successfully decrypted, the gateway cannot encrypt return traffic because the outbound SPI (MSPI) is missing, forcing a tunnel trigger. IKE negotiation packets are correctly forwarded to the iked daemon.
Key Log Evidence
• Offloading: Tunnel (5ae8 (i: 0)) handled by SXL. [span_5](start_span)Preparing..
• The Error: request_to_open_tunnel_if_not_ready: no mspi --> no VPN on this side (dir 2)
• IKE Success: vpnk_multik_forward_vpnxl: ... forwarding to global instance
Conclusion
The firewall kernel is functioning correctly. The failure is located in the VPN Phase 2 negotiation within the user-mode process, resulting in unidirectional SAs (Inbound OK, Outbound missing).
Next Step
Investigate $FWDIR/log/ike.elg for Phase 2 negotiation errors (e.g., No Proposal Chosen, TS Mismatch) and verify current SAs using vpn tu.
And in addition check logs on peer gateway at if I an right it should show the reason for a phase 2 negotiation issue.
but please be aware that I could have missed or misinterpreted something on my mobile display.
and now to something completely different - CCVS, CCAS, CCTE, CCCS, CCSM elite