Quick Guide
FAQs
VPN Site-to-Site (new version)
Step 1: On the display screen, select Logging from the horizontal menu bar.

Step 2: You can monitor the service activity history.

| Type | Description |
|---|---|
| IKE (Internet Key Exchange) | Information about Phase 1 setup – key exchange. |
| CFG (Configuration) | Information about Phase 2 setup – tunnel configuration. |
| NET (Network) | Information about communication between peers via UDP 500/4500. |
| KNL (Kernel) | Information about route or route policy configuration. |
| ENC (Encryption) | Information about encryption/decryption during handshake. |
| DPD (Dead Peer Detection) | Information about peer health checks. |
| LIB (Library) | Information about internal library calls within the Charon engine. |
| ESP (Encapsulating Security Payload) | Information about Security Association (SA) setup using IPsec. |
| TRC (Traffic) | Information about sending encrypted traffic packets. |
| System | Information about other system logs. |
Common log messages
| Content | Message logs | Meaning / Troubleshooting |
|---|---|---|
| Successful log samples | N/A | N/A |
| IKE Phase 1 successful | [IKE] IKE_SA |
The IKE SA connection was successfully established between the local and remote IPs. indicates the name of the VPN connection in use. |
| IPSec Phase 2 successful | [IKE] CHILD_SA |
The data tunnel has been successfully established between the subnet ranges. indicates the name of the VPN connection in use. |
| Traffic successful | [NET] [NET] |
Data packets were successfully transmitted through the tunnel. Port 4500 indicates that NAT-T is being used. The presence of both send and receive logs confirms stable peer communication. |
| Rekey successful | |
The system automatically re-generated a new security key without disrupting the connection. |
| Reauthentication successful | IKE_SA reauthentication completed |
The device successfully reauthenticated after a certain period. |
| PSK authentication successful | authentication of 'IP' with pre-shared key successful |
The device successfully authenticated using the pre-shared key. |
| Failure log samples | N/A | N/A |
| Incorrect negotiation mode in IKE Policy – Phase 1 | Initiator side logs:[IKE] initiating Aggressive Mode IKE_SA con2[1] to 203.0.113.5[IKE] received AUTHENTICATION_FAILED error notify[ENC] parsed INFORMATIONAL_V1 request 1215317906 [ N(AUTH_FAILED) ]Responder side logs: Aggressive Mode PSK disabled for security reasonsGenerating INFORMATIONAL_V1 request 2940146627 [ N(AUTH_FAILED) ] |
The negotiation mode in Phase 1 is mismatched between both peers. Please recheck the Phase 1 negotiation mode setting in the VPN connection details. |
| Incorrect information in IKE Policy – Phase 1 | Initiator side logs:[ENC] parsed INFORMATIONAL_V1 request 4216246776 [ HASH N(AUTH_FAILED) ][IKE] received AUTHENTICATION_FAILED error notifyResponder side logs: [CFG] looking for pre-shared key peer configs matching 203.0.113.5...198.51.100.3[someid][IKE] no peer config found |
Phase 1 authentication failed. Please verify the IKE Policy configuration on both sides. |
| Mismatched Pre-shared Key between peers | Connection logs:charon: 09[ENC] invalid HASH_V1/ID_V1 payload length, decryption failed?charon: 09[ENC] could not decrypt payloadscharon: 09[IKE] message parsing failed |
Authentication failed. Please verify that both peers are using the same pre-shared key. |
| Incorrect IKE Policy configuration – Phase 1 | Connection logs:[IKE] no proposal found[ENC] generating INFORMATIONAL_V1 request 3851683074 [ N(NO_PROP) ][IKE] received NO_PROPOSAL_CHOSEN error notify |
Incorrect encryption or algorithm settings in Phase 1. Please recheck the IKE Policy configuration on both ends. |
| Incorrect IPsec Policy configuration – Phase 2 | Connection logs:[IKE] no matching CHILD_SA config found[ENC] generating INFORMATIONAL_V1 request 1136605099 [ HASH N(INVAL_ID) ][IKE] received NO_PROPOSAL_CHOSEN error notify |
Phase 2 authentication failed. Please review the IPsec Policy configuration on both sides. This may also occur if the remote subnet declared in the Customer Gateway is incorrect. |
| Mismatched peer ID information | Connection logs:[IKE] remote host is behind NAT[IKE] IDir '192.0.2.10' does not match to '203.0.113.245' |
Peer ID mismatch detected. If NAT IP is used, please verify Local/Remote ID configuration. For VPN connections using NAT IP, refer to the corresponding setup guide. |