Hi strongswan dev,
We have observed one issue in strong swan that two different SA have been 
assigned with same reqid.

2013-04-23T07:30:26.219374+00:00 10 [info]        charon:  10[IKE] CHILD_SA 
conn11{9} established with SPIs cedee951_i c2612a16_o and TS 14.1.2.0/24 === 
40.0.10.0/24
2013-04-23T07:30:26.219394+00:00 10 [info]        charon:  10[IKE] CHILD_SA 
conn11{9} established with SPIs cedee951_i c2612a16_o and TS 14.1.2.0/24 === 
40.0.10.0/24
2013-04-23T07:30:26.220499+00:00 10 [info]        charon:  07[IKE] CHILD_SA 
conn12{9} established with SPIs c91b6c9b_i cc3d4154_o and TS 172.1.17.131/32 
=== 172.1.17.171/32
2013-04-23T07:30:26.220537+00:00 10 [info]        charon:  07[IKE] CHILD_SA 
conn12{9} established with SPIs c91b6c9b_i cc3d4154_o and TS 172.1.17.131/32 
=== 172.1.17.171/32

Can you kindly provide your input what could be the reason for this issue?
Ipsec logs are attached with this mail.

Best Regards,
Amit Kumar





===============================================================================
Please refer to http://www.aricent.com/legal/email_disclaimer.html
for important disclosures regarding this electronic communication.
===============================================================================
**********************************************
*                                            *
*   ipsec status                             *
*                                            *
**********************************************
000 "conn1": 
192.168.202.0/24===192.168.202.102[192.168.255.129]...50.0.0.1[50.0.0.1]===40.0.0.0/24;
 erouted; eroute owner: #11
000 "conn1":   newest ISAKMP SA: #1; newest IPsec SA: #11; 
000 "conn2": 
192.168.202.0/24===192.168.202.102[192.168.255.129]...50.0.0.1[50.0.0.1]===40.0.1.0/24;
 erouted; eroute owner: #10
000 "conn2":   newest ISAKMP SA: #0; newest IPsec SA: #10; 
000 
000 #11: "conn1" STATE_QUICK_I2 (sent QI2, IPsec SA established); 
EVENT_SA_REPLACE in 81s; newest IPSEC; eroute owner
000 #11: "conn1" [email protected] (0 bytes) [email protected] 
(0 bytes); tunnel
000 #1: "conn1" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 
82201s; newest ISAKMP
000 #10: "conn2" STATE_QUICK_I2 (sent QI2, IPsec SA established); 
EVENT_SA_REPLACE in 53s; newest IPSEC; eroute owner
000 #10: "conn2" [email protected] (0 bytes) [email protected] 
(0 bytes); tunnel
000 
Security Associations (3 up, 0 connecting):
       conn3[1]: ESTABLISHED 20 minutes ago, 
192.168.202.102[192.168.255.129]...50.0.1.1[C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_IPSecGW]
       conn3{1}:  INSTALLED, TUNNEL, ESP SPIs: c415166a_i cc0bd209_o
       conn3{1}:   192.168.202.0/24 === 40.0.2.0/24 
      conn12{9}:  INSTALLED, TUNNEL, ESP SPIs: cdd1e3dd_i ca9f9b68_o
      conn12{9}:   172.1.17.131/32 === 172.1.17.171/32 
       conn4{2}:  INSTALLED, TUNNEL, ESP SPIs: cdaaea7d_i c0c4c3d9_o
       conn4{2}:   192.168.202.0/24 === 40.0.3.0/24 
       conn5[2]: ESTABLISHED 19 minutes ago, 
50.0.11.2[192.168.255.129]...50.0.11.1[C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_IPSecGW]
       conn5{3}:  INSTALLED, TUNNEL, ESP SPIs: cad16a5b_i cce7f200_o
       conn5{3}:   192.168.202.0/24 === 40.0.4.0/24 
       conn7{6}:  INSTALLED, TUNNEL, ESP SPIs: cf1507bd_i caabf605_o
       conn7{6}:   192.168.202.0/24 === 40.0.6.0/24 
       conn6{5}:  INSTALLED, TUNNEL, ESP SPIs: c3430e59_i cee3c29a_o
       conn6{5}:   192.168.202.0/24 === 40.0.5.0/24 
       conn8[3]: ESTABLISHED 19 minutes ago, 
50.0.13.2[192.168.255.129]...50.0.13.1[C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_IPSecGW]
      conn11{9}:  INSTALLED, TUNNEL, ESP SPIs: cedee951_i c2612a16_o
      conn11{9}:   14.1.2.0/24 === 40.0.10.0/24 
      conn10{8}:  INSTALLED, TUNNEL, ESP SPIs: c10d51cb_i cb1340e7_o
      conn10{8}:   192.168.202.0/24 === 40.0.9.0/24 
       conn8{4}:  INSTALLED, TUNNEL, ESP SPIs: cb170eab_i cfa973c2_o
       conn8{4}:   192.168.202.0/24 === 40.0.7.0/24 
       conn9{7}:  INSTALLED, TUNNEL, ESP SPIs: c335054c_i c5fb953a_o
       conn9{7}:   192.168.202.0/24 === 40.0.8.0/24 
**********************************************
*                                            *
*   ipsec statusall                          *
*                                            *
**********************************************
000 Status of IKEv1 pluto daemon (strongSwan 4.5.3):
000 interface lo/lo 127.0.0.1:4500
000 interface lo/lo 127.0.0.1:500
000 interface lo:1/lo:1 172.1.17.131:4500
000 interface lo:1/lo:1 172.1.17.131:500
000 interface eth1/eth1 10.29.8.40:4500
000 interface eth1/eth1 10.29.8.40:500
000 interface eth1:1/eth1:1 192.168.255.129:4500
000 interface eth1:1/eth1:1 192.168.255.129:500
000 interface rio0/rio0 192.168.253.16:4500
000 interface rio0/rio0 192.168.253.16:500
000 interface eth3/eth3 192.168.202.102:4500
000 interface eth3/eth3 192.168.202.102:500
000 interface eth5.48/eth5.48 192.168.255.54:4500
000 interface eth5.48/eth5.48 192.168.255.54:500
000 interface eth3.2007/eth3.2007 50.0.13.2:4500
000 interface eth3.2007/eth3.2007 50.0.13.2:500
000 interface eth3.2006/eth3.2006 50.0.11.2:4500
000 interface eth3.2006/eth3.2006 50.0.11.2:500
000 interface eth5.32:5/eth5.32:5 14.1.2.1:4500
000 interface eth5.32:5/eth5.32:5 14.1.2.1:500
000 %myid = '%any'
000 loaded plugins: curl aes des sha1 sha2 md5 random x509 pkcs1 pgp dnskey pem 
openssl gmp hmac cra xauth attr kernel-netlink resolve 
000 debug options: none
000 
000 "conn1": 
192.168.202.0/24===192.168.202.102[192.168.255.129]...50.0.0.1[50.0.0.1]===40.0.0.0/24;
 erouted; eroute owner: #11
000 "conn1":   CAs: "C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegrationCA"...%any
000 "conn1":   ike_life: 83668s; ipsec_life: 450s; rekey_margin: 180s; 
rekey_fuzz: 50%; keyingtries: 0
000 "conn1":   dpd_action: restart; dpd_delay: 10s; dpd_timeout: 120s;
000 "conn1":   policy: PUBKEY+ENCRYPT+TUNNEL+UP; prio: 24,24; interface: eth3; 
000 "conn1":   newest ISAKMP SA: #1; newest IPsec SA: #11; 
000 "conn1":   IKE proposal: AES_CBC_128/HMAC_SHA1/MODP_1024
000 "conn1":   ESP proposal: AES_CBC_128/HMAC_SHA1/<N/A>
000 "conn2": 
192.168.202.0/24===192.168.202.102[192.168.255.129]...50.0.0.1[50.0.0.1]===40.0.1.0/24;
 erouted; eroute owner: #10
000 "conn2":   CAs: "C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegrationCA"...%any
000 "conn2":   ike_life: 83668s; ipsec_life: 450s; rekey_margin: 180s; 
rekey_fuzz: 50%; keyingtries: 0
000 "conn2":   dpd_action: restart; dpd_delay: 10s; dpd_timeout: 120s;
000 "conn2":   policy: PUBKEY+ENCRYPT+TUNNEL+UP; prio: 24,24; interface: eth3; 
000 "conn2":   newest ISAKMP SA: #0; newest IPsec SA: #10; 
000 "conn2":   ESP proposal: AES_CBC_128/HMAC_SHA1/<N/A>
000 
000 #11: "conn1" STATE_QUICK_I2 (sent QI2, IPsec SA established); 
EVENT_SA_REPLACE in 76s; newest IPSEC; eroute owner
000 #11: "conn1" [email protected] (0 bytes) [email protected] 
(0 bytes); tunnel
000 #1: "conn1" STATE_MAIN_I4 (ISAKMP SA established); EVENT_SA_REPLACE in 
82196s; newest ISAKMP; DPD active
000 #10: "conn2" STATE_QUICK_I2 (sent QI2, IPsec SA established); 
EVENT_SA_REPLACE in 48s; newest IPSEC; eroute owner
000 #10: "conn2" [email protected] (0 bytes) [email protected] 
(0 bytes); tunnel
000 
Status of IKEv2 charon daemon (strongSwan 4.5.3):
  uptime: 20 minutes, since Apr 23 07:30:04 2013
  malloc: sbrk 405504, mmap 0, used 311616, free 93888
  worker threads: 9 of 16 idle, 6/1/0/0 working, job queue: 0/0/0/0, scheduled: 
13
  loaded plugins: curl aes des sha1 sha2 md5 random x509 revocation constraints 
pubkey pkcs1 pgp pem openssl fips-prf gmp xcbc hmac cra attr kernel-netlink 
resolve socket-raw stroke updown 
Listening IP addresses:
  10.29.8.40
  192.168.255.129
  192.168.253.16
  192.168.202.102
  192.168.255.54
  50.0.13.2
  50.0.11.2
  14.1.2.1
  192.168.255.129
Connections:
       conn3:  192.168.202.102...50.0.1.1, dpddelay=10s
       conn3:   local:  [192.168.255.129] uses public key authentication
       conn3:    cert:  "C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_FTM"
       conn3:   remote: [%any] uses any authentication
       conn3:   child:  192.168.202.0/24 === 40.0.2.0/24 TUNNEL, 
dpdaction=restart
       conn4:   child:  192.168.202.0/24 === 40.0.3.0/24 TUNNEL, 
dpdaction=restart
      conn12:   child:  172.1.17.0/24 === 172.1.17.0/24 TUNNEL, 
dpdaction=restart
       conn5:  50.0.11.2...50.0.11.1, dpddelay=10s
       conn5:   local:  [192.168.255.129] uses public key authentication
       conn5:    cert:  "C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_FTM"
       conn5:   remote: [%any] uses any authentication
       conn5:   child:  192.168.202.0/24 === 40.0.4.0/24 TUNNEL, 
dpdaction=restart
       conn6:   child:  192.168.202.0/24 === 40.0.5.0/24 TUNNEL, 
dpdaction=restart
       conn7:   child:  192.168.202.0/24 === 40.0.6.0/24 TUNNEL, 
dpdaction=restart
       conn8:  50.0.13.2...50.0.13.1, dpddelay=10s
       conn8:   local:  [192.168.255.129] uses public key authentication
       conn8:    cert:  "C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_FTM"
       conn8:   remote: [%any] uses any authentication
       conn8:   child:  192.168.202.0/24 === 40.0.7.0/24 TUNNEL, 
dpdaction=restart
       conn9:   child:  192.168.202.0/24 === 40.0.8.0/24 TUNNEL, 
dpdaction=restart
      conn10:   child:  192.168.202.0/24 === 40.0.9.0/24 TUNNEL, 
dpdaction=restart
      conn11:   child:  14.1.2.0/24 === 40.0.10.0/24 TUNNEL, dpdaction=restart
Security Associations (3 up, 0 connecting):
       conn3[1]: ESTABLISHED 20 minutes ago, 
192.168.202.102[192.168.255.129]...50.0.1.1[C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_IPSecGW]
       conn3[1]: IKE SPIs: c68e8b6167f5688b_i* 687442e2087018d5_r, rekeying in 
22 hours, public key reauthentication in 23 hours
       conn3[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
       conn3{1}:  INSTALLED, TUNNEL, ESP SPIs: c415166a_i cc0bd209_o
       conn3{1}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
74 seconds
       conn3{1}:   192.168.202.0/24 === 40.0.2.0/24 
      conn12{9}:  INSTALLED, TUNNEL, ESP SPIs: cdd1e3dd_i ca9f9b68_o
      conn12{9}:  AES_CBC_128/HMAC_SHA1_96, 152 bytes_i (42s ago), 152 bytes_o 
(42s ago), rekeying in 118 seconds
      conn12{9}:   172.1.17.131/32 === 172.1.17.171/32 
       conn4{2}:  INSTALLED, TUNNEL, ESP SPIs: cdaaea7d_i c0c4c3d9_o
       conn4{2}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 3 
minutes
       conn4{2}:   192.168.202.0/24 === 40.0.3.0/24 
       conn5[2]: ESTABLISHED 19 minutes ago, 
50.0.11.2[192.168.255.129]...50.0.11.1[C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_IPSecGW]
       conn5[2]: IKE SPIs: ab3ac182998ff94c_i* 7b4406f0cd14eb95_r, rekeying in 
22 hours, public key reauthentication in 23 hours
       conn5[2]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
       conn5{3}:  INSTALLED, TUNNEL, ESP SPIs: cad16a5b_i cce7f200_o
       conn5{3}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
31 seconds
       conn5{3}:   192.168.202.0/24 === 40.0.4.0/24 
       conn7{6}:  INSTALLED, TUNNEL, ESP SPIs: cf1507bd_i caabf605_o
       conn7{6}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 8 
seconds
       conn7{6}:   192.168.202.0/24 === 40.0.6.0/24 
       conn6{5}:  INSTALLED, TUNNEL, ESP SPIs: c3430e59_i cee3c29a_o
       conn6{5}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
55 seconds
       conn6{5}:   192.168.202.0/24 === 40.0.5.0/24 
       conn8[3]: ESTABLISHED 19 minutes ago, 
50.0.13.2[192.168.255.129]...50.0.13.1[C=DE, O=NokiaSiemensNetworks, 
CN=FlexiTRSIntegration_IPSecGW]
       conn8[3]: IKE SPIs: aac3b1fe38dcc0d6_i* e7e35f11f5f4d08d_r, rekeying in 
22 hours, public key reauthentication in 23 hours
       conn8[3]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      conn11{9}:  INSTALLED, TUNNEL, ESP SPIs: cedee951_i c2612a16_o
      conn11{9}:  AES_CBC_128/HMAC_SHA1_96, 10795592 bytes_i (757s ago), 0 
bytes_o, rekeying active
      conn11{9}:   14.1.2.0/24 === 40.0.10.0/24 
      conn10{8}:  INSTALLED, TUNNEL, ESP SPIs: c10d51cb_i cb1340e7_o
      conn10{8}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
54 seconds
      conn10{8}:   192.168.202.0/24 === 40.0.9.0/24 
       conn8{4}:  INSTALLED, TUNNEL, ESP SPIs: cb170eab_i cfa973c2_o
       conn8{4}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
76 seconds
       conn8{4}:   192.168.202.0/24 === 40.0.7.0/24 
       conn9{7}:  INSTALLED, TUNNEL, ESP SPIs: c335054c_i c5fb953a_o
       conn9{7}:  AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o, rekeying in 
32 seconds
       conn9{7}:   192.168.202.0/24 === 40.0.8.0/24 
**********************************************
*                                            *
*   ip xfrm state                            *
*                                            *
**********************************************
src 192.168.202.102 dst 50.0.1.1
        proto esp spi 0xc0c4c3d9 reqid 2 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xf05ef6c71582f6e892299c935ac70892e9acfd8d
        enc cbc(aes) 0x4455cdf197ab7ef5868702a5e0591dc8
src 50.0.1.1 dst 192.168.202.102
        proto esp spi 0xcdaaea7d reqid 2 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xbdc6e936dc39e57e97553991577bfb9526401564
        enc cbc(aes) 0xd5af43fceea9926c19444fed256f6206
        sel src 40.0.3.0/24 dst 192.168.202.0/24 
src 192.168.202.102 dst 50.0.0.1
        proto esp spi 0xdc003fe0 reqid 16384 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x6b6725ec96c5d323658f0f792e3ec391d1d008ff
        enc cbc(aes) 0x5b83a6473668e960b7309f41073e7640
src 50.0.0.1 dst 192.168.202.102
        proto esp spi 0xcb4c096a reqid 16384 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xeaefc49f9125a211d58f2b1a90b1704fbd4bf6f0
        enc cbc(aes) 0x1e84776857bc14be743cdc4b8164a954
src 192.168.202.102 dst 50.0.0.1
        proto esp spi 0x471b6c97 reqid 16388 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xa2cda682379ca01d76f26a10c418f179fd6b39d3
        enc cbc(aes) 0x0de11fca62cf7fc5ac5566420c1d282d
src 50.0.0.1 dst 192.168.202.102
        proto esp spi 0xcc87e23e reqid 16388 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xd5df6945a9027b08273048a4b5dde3c1fa140418
        enc cbc(aes) 0x5cddf584704dd1b740c6be35fd86d5a4
src 50.0.11.2 dst 50.0.11.1
        proto esp spi 0xcee3c29a reqid 5 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x8a755dad147b0cb16ae249a14b9fd2408a8e9add
        enc cbc(aes) 0x9c362d02fb3d947ad7a62c95bde5a6f8
src 50.0.11.1 dst 50.0.11.2
        proto esp spi 0xc3430e59 reqid 5 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x6a4597acabb27e13fa7cde112443fe785f343f12
        enc cbc(aes) 0xcce500ce2b6563587aadaed2ead084b0
        sel src 40.0.5.0/24 dst 192.168.202.0/24 
src 192.168.202.102 dst 50.0.1.1
        proto esp spi 0xca9f9b68 reqid 9 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x3039e224c02a2310c1584f5bc671bd9a5272b5d9
        enc cbc(aes) 0x48661907c31b78390e05f6934449cbb5
src 50.0.1.1 dst 192.168.202.102
        proto esp spi 0xcdd1e3dd reqid 9 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xd2d1eae7088095bf9c53c7e31aeb54741c07fa60
        enc cbc(aes) 0xd65cd564c12093761a23ea870042aeba
        sel src 172.1.17.171/32 dst 172.1.17.131/32 
src 192.168.202.102 dst 50.0.1.1
        proto esp spi 0xcc0bd209 reqid 1 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x2ff4e4ff00fe9f4ddf2c4c016f8ccef22942c6d2
        enc cbc(aes) 0x26cd9f81021e9e482a3d92f84bd5065c
src 50.0.1.1 dst 192.168.202.102
        proto esp spi 0xc415166a reqid 1 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x0eebba88f7ffd82c3107faac25e664aadb40c434
        enc cbc(aes) 0x70c7b46823d07580f143b48e83d8cdf0
        sel src 40.0.2.0/24 dst 192.168.202.0/24 
src 50.0.13.2 dst 50.0.13.1
        proto esp spi 0xc5fb953a reqid 7 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xcd7175a8e0c7b9b1c45b43b5a1c91fe8cae281ca
        enc cbc(aes) 0x57939d8ea1116ac8a01c3d3ade0c2a9c
src 50.0.13.1 dst 50.0.13.2
        proto esp spi 0xc335054c reqid 7 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xc9a823f39f8af48097785548b547b3d1d2cccf7c
        enc cbc(aes) 0x3e0a5bb5368dcb4f331852f12d868388
        sel src 40.0.8.0/24 dst 192.168.202.0/24 
src 50.0.13.2 dst 50.0.13.1
        proto esp spi 0xcfa973c2 reqid 4 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x7784620591fa2093470d33fe7b9f80261175aacf
        enc cbc(aes) 0xd046f5aa5e9f696836131c7104ad4993
src 50.0.13.1 dst 50.0.13.2
        proto esp spi 0xcb170eab reqid 4 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x07fc86ca53a7541ee8debec8b8c20e3c07379752
        enc cbc(aes) 0x97bf1e4c158d427f8aacadf7d7edcc95
        sel src 40.0.7.0/24 dst 192.168.202.0/24 
src 50.0.11.2 dst 50.0.11.1
        proto esp spi 0xcaabf605 reqid 6 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xc59165b618e73474c8a664608ae105870e85d7c4
        enc cbc(aes) 0xb381d199591b923655d9c7e4e85d716a
src 50.0.11.1 dst 50.0.11.2
        proto esp spi 0xcf1507bd reqid 6 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xce554a0185d4b6515f5e4c58deec378c9bfa3c5a
        enc cbc(aes) 0x06bc11476a2a865fcb26709cb6d6b3b2
        sel src 40.0.6.0/24 dst 192.168.202.0/24 
src 50.0.13.2 dst 50.0.13.1
        proto esp spi 0xcb1340e7 reqid 8 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x7e297e16c00db41ef1c8a91990752c6115e17601
        enc cbc(aes) 0x6fae7fe4c291726ac1e1fea90824639c
src 50.0.13.1 dst 50.0.13.2
        proto esp spi 0xc10d51cb reqid 8 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xcb41be904f2830715bffb88c615e6fe55f996ce6
        enc cbc(aes) 0x6d0d929a2f5bcf6f51a358ffdf65532f
        sel src 40.0.9.0/24 dst 192.168.202.0/24 
src 50.0.11.2 dst 50.0.11.1
        proto esp spi 0xcce7f200 reqid 3 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0xfa62250dbd2ccd5149068c7274558ab24ae2280d
        enc cbc(aes) 0xdaeb61f31885ad83a7bdc9d2a5553bf1
src 50.0.11.1 dst 50.0.11.2
        proto esp spi 0xcad16a5b reqid 3 mode tunnel
        replay-window 0 flag 20
        auth hmac(sha1) 0x7935d0b8b2ee4d6ddb69b828f2d0dda9a2453fd5
        enc cbc(aes) 0x3c47f60d8549f513dafc969e8705478d
        sel src 40.0.4.0/24 dst 192.168.202.0/24 
**********************************************
*                                            *
*   ip xfrm policy                           *
*                                            *
**********************************************
src 40.0.3.0/24 dst 192.168.202.0/24 
        dir fwd priority 4 
        tmpl src 50.0.1.1 dst 192.168.202.102
                proto esp reqid 2 mode tunnel
src 40.0.3.0/24 dst 192.168.202.0/24 
        dir in priority 4 
        tmpl src 50.0.1.1 dst 192.168.202.102
                proto esp reqid 2 mode tunnel
src 192.168.202.0/24 dst 40.0.3.0/24 
        dir out priority 4 
        tmpl src 192.168.202.102 dst 50.0.1.1
                proto esp reqid 2 mode tunnel
src 192.168.202.0/24 dst 40.0.0.0/24 
        dir out priority 1 
        tmpl src 192.168.202.102 dst 50.0.0.1
                proto esp reqid 16384 mode tunnel
src 40.0.0.0/24 dst 192.168.202.0/24 
        dir fwd priority 1 
        tmpl src 50.0.0.1 dst 192.168.202.102
                proto esp reqid 16384 mode tunnel
src 40.0.0.0/24 dst 192.168.202.0/24 
        dir in priority 1 
        tmpl src 50.0.0.1 dst 192.168.202.102
                proto esp reqid 16384 mode tunnel
src 192.168.202.0/24 dst 40.0.1.0/24 
        dir out priority 2 
        tmpl src 192.168.202.102 dst 50.0.0.1
                proto esp reqid 16388 mode tunnel
src 40.0.1.0/24 dst 192.168.202.0/24 
        dir fwd priority 2 
        tmpl src 50.0.0.1 dst 192.168.202.102
                proto esp reqid 16388 mode tunnel
src 40.0.1.0/24 dst 192.168.202.0/24 
        dir in priority 2 
        tmpl src 50.0.0.1 dst 192.168.202.102
                proto esp reqid 16388 mode tunnel
src 40.0.5.0/24 dst 192.168.202.0/24 
        dir fwd priority 6 
        tmpl src 50.0.11.1 dst 50.0.11.2
                proto esp reqid 5 mode tunnel
src 40.0.5.0/24 dst 192.168.202.0/24 
        dir in priority 6 
        tmpl src 50.0.11.1 dst 50.0.11.2
                proto esp reqid 5 mode tunnel
src 192.168.202.0/24 dst 40.0.5.0/24 
        dir out priority 6 
        tmpl src 50.0.11.2 dst 50.0.11.1
                proto esp reqid 5 mode tunnel
src 172.1.17.171/32 dst 172.1.17.131/32 
        dir fwd priority 12 
        tmpl src 50.0.1.1 dst 192.168.202.102
                proto esp reqid 9 mode tunnel
src 172.1.17.171/32 dst 172.1.17.131/32 
        dir in priority 12 
        tmpl src 50.0.1.1 dst 192.168.202.102
                proto esp reqid 9 mode tunnel
src 172.1.17.131/32 dst 172.1.17.171/32 
        dir out priority 12 
        tmpl src 192.168.202.102 dst 50.0.1.1
                proto esp reqid 9 mode tunnel
src 40.0.2.0/24 dst 192.168.202.0/24 
        dir fwd priority 3 
        tmpl src 50.0.1.1 dst 192.168.202.102
                proto esp reqid 1 mode tunnel
src 40.0.2.0/24 dst 192.168.202.0/24 
        dir in priority 3 
        tmpl src 50.0.1.1 dst 192.168.202.102
                proto esp reqid 1 mode tunnel
src 192.168.202.0/24 dst 40.0.2.0/24 
        dir out priority 3 
        tmpl src 192.168.202.102 dst 50.0.1.1
                proto esp reqid 1 mode tunnel
src 40.0.8.0/24 dst 192.168.202.0/24 
        dir fwd priority 9 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 7 mode tunnel
src 40.0.8.0/24 dst 192.168.202.0/24 
        dir in priority 9 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 7 mode tunnel
src 192.168.202.0/24 dst 40.0.8.0/24 
        dir out priority 9 
        tmpl src 50.0.13.2 dst 50.0.13.1
                proto esp reqid 7 mode tunnel
src 40.0.7.0/24 dst 192.168.202.0/24 
        dir fwd priority 8 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 4 mode tunnel
src 40.0.7.0/24 dst 192.168.202.0/24 
        dir in priority 8 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 4 mode tunnel
src 192.168.202.0/24 dst 40.0.7.0/24 
        dir out priority 8 
        tmpl src 50.0.13.2 dst 50.0.13.1
                proto esp reqid 4 mode tunnel
src 40.0.6.0/24 dst 192.168.202.0/24 
        dir fwd priority 7 
        tmpl src 50.0.11.1 dst 50.0.11.2
                proto esp reqid 6 mode tunnel
src 40.0.6.0/24 dst 192.168.202.0/24 
        dir in priority 7 
        tmpl src 50.0.11.1 dst 50.0.11.2
                proto esp reqid 6 mode tunnel
src 192.168.202.0/24 dst 40.0.6.0/24 
        dir out priority 7 
        tmpl src 50.0.11.2 dst 50.0.11.1
                proto esp reqid 6 mode tunnel
src 40.0.9.0/24 dst 192.168.202.0/24 
        dir fwd priority 10 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 8 mode tunnel
src 40.0.9.0/24 dst 192.168.202.0/24 
        dir in priority 10 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 8 mode tunnel
src 192.168.202.0/24 dst 40.0.9.0/24 
        dir out priority 10 
        tmpl src 50.0.13.2 dst 50.0.13.1
                proto esp reqid 8 mode tunnel
src 40.0.4.0/24 dst 192.168.202.0/24 
        dir fwd priority 5 
        tmpl src 50.0.11.1 dst 50.0.11.2
                proto esp reqid 3 mode tunnel
src 40.0.4.0/24 dst 192.168.202.0/24 
        dir in priority 5 
        tmpl src 50.0.11.1 dst 50.0.11.2
                proto esp reqid 3 mode tunnel
src 192.168.202.0/24 dst 40.0.4.0/24 
        dir out priority 5 
        tmpl src 50.0.11.2 dst 50.0.11.1
                proto esp reqid 3 mode tunnel
src 40.0.10.0/24 dst 14.1.2.0/24 
        dir fwd priority 11 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 9 mode tunnel
src 40.0.10.0/24 dst 14.1.2.0/24 
        dir in priority 11 
        tmpl src 50.0.13.1 dst 50.0.13.2
                proto esp reqid 9 mode tunnel
src 14.1.2.0/24 dst 40.0.10.0/24 
        dir out priority 11 
        tmpl src 50.0.13.2 dst 50.0.13.1
                proto esp reqid 9 mode tunnel
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src ::/0 dst ::/0 
        dir 3 priority 0 
src ::/0 dst ::/0 
        dir 4 priority 0 
src ::/0 dst ::/0 
        dir 3 priority 0 
src ::/0 dst ::/0 
        dir 4 priority 0 
src ::/0 dst ::/0 
        dir 3 priority 0 
src ::/0 dst ::/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 3 priority 0 
src 0.0.0.0/0 dst 0.0.0.0/0 
        dir 4 priority 0 
src 14.1.2.1/24 dst 0.0.0.0/0 
        dir fwd priority 0 
src 0.0.0.0/0 dst 14.1.2.1/24 
        dir out priority 0 
src 10.29.8.40/32 dst 0.0.0.0/0 
        dir out priority 0 
src 192.168.254.0/23 dst 192.168.254.0/23 
        dir out priority 0 
src 192.168.254.0/23 dst 192.168.254.0/23 
        dir in priority 0 
src 192.168.253.0/24 dst 192.168.253.0/24 
        dir out priority 0 
src 192.168.253.0/24 dst 192.168.253.0/24 
        dir in priority 0 
src 192.168.255.0/24 dst 192.168.255.0/24 
        dir out priority 0 
src 192.168.255.0/24 dst 192.168.255.0/24 
        dir in priority 0 
**********************************************
*                                            *
*   /etc/ipsec.secrets                       *
*                                            *
**********************************************
# /etc/ipsec.secrets - strongSwan IPsec secrets file
: RSA "privkey.crk"
**********************************************
*                                            *
*   /etc/ipsec.conf                          *
*                                            *
**********************************************
config setup 
  plutostart=yes 
  plutodebug=none 
  nat_traversal=yes 
  uniqueids=no 
  charonstart=yes 
  charondebug="dmn 1, mgr 1, ike 0, chd 1, job 0, cfg 0, knl 0, net 0, enc -1, 
lib -1" 

ca rootca0 
  cacert=rootCaCert_0.pem 

conn %default 
  leftcert=/etc/ipsec.d/certs/btsCert.pem 
  auto=start 
  pfs=no 
  keyingtries=%forever 
  mobike=no 

conn conn1 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.0.0/24 
  left=192.168.202.102 
  right=50.0.0.1 
  keyexchange=ikev1 
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn2 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.1.0/24 
  left=192.168.202.102 
  right=50.0.0.1 
  keyexchange=ikev1 
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn3 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.2.0/24 
  left=192.168.202.102 
  right=50.0.1.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn4 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.3.0/24 
  left=192.168.202.102 
  right=50.0.1.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn5 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.4.0/24 
  left=50.0.11.2 
  right=50.0.11.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn6 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.5.0/24 
  left=50.0.11.2 
  right=50.0.11.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn7 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.6.0/24 
  left=50.0.11.2 
  right=50.0.11.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn8 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.7.0/24 
  left=50.0.13.2 
  right=50.0.13.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn9 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.8.0/24 
  left=50.0.13.2 
  right=50.0.13.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn10 
  type=tunnel 
  leftsubnet=192.168.202.102/24 
  rightsubnet=40.0.9.0/24 
  left=50.0.13.2 
  right=50.0.13.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn11 
  type=tunnel 
  leftsubnet=14.1.2.0/24 
  rightsubnet=40.0.10.0/24 
  left=50.0.13.2 
  right=50.0.13.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 

conn conn12 
  type=tunnel 
  leftsubnet=172.1.17.131/24 
  rightsubnet=172.1.17.171/24 
  left=192.168.202.102 
  right=50.0.1.1 
  keyexchange=ikev2 
 reauth=no  
  ike=aes128-sha1-modp1024,3des-sha1-modp1024! 
  ikelifetime=83668s 
  esp=aes128-sha1,3des-sha1! 
  authby=pubkey 
  rightid=%any  
  leftid="192.168.255.129" 
  keylife=450s 
  dpdaction=restart 
  dpddelay=10 
  dpdtimeout=120 
  rekeyfuzz=50% 
  rekeymargin=180s 
_______________________________________________
Dev mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/dev

Reply via email to