2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 SA [Initiator, NAT-T] negotiation completed:2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Local Authentication Method : Pre-shared key2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Remote Authentication Method : Pre-shared key2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKE algorithms : aes256-cbc, hmac-sha1, hmac-sha256-1282025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Diffie-Hellman : group 16 (4096 bits)2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Local IKE peer ##.##.##.84:4500 routing instance 2 ID ##.##.##.84 (ipv4)2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Remote IKE peer ##.##.##.177:4500 routing instance 2 ID ##.##.##.2 (ipv4)2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Initiator SPI ######e9 ######50 Responder SPI ######71 ######5b2025-03-28T13:10:54.411Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Local Lifetime: 86400 second2025-03-28T13:10:54.413Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IPsec SA [Initiator, NAT-T, tunnel, auto] negotiation completed:2025-03-28T13:10:54.413Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Local IKE peer ##.##.##.84:4500 routing instance 2 ID ##.##.##.84 (ipv4)2025-03-28T13:10:54.413Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Remote IKE peer ##.##.##.177:4500 routing instance 2 ID ##.##.##.2 (ipv4)2025-03-28T13:10:54.413Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Local Traffic Selector ipv4(##.##.##.0-##.##.##.0.127)2025-03-28T13:10:54.413Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Remote Traffic Selector ipv4(##.##.##.17)2025-03-28T13:10:54.413Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Routing Instance plr_sr (2)2025-03-28T13:10:54.414Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Inbound SPI: | Outbound SPI: | Algorithm:2025-03-28T13:10:54.414Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] ESP [######00] | [######f6] | aes-cbc/256 - hmac-sha256-1282025-03-28T13:10:54.414Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Local Lifetime: 3600 seconds2025-03-28T13:10:54.414Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Fri Mar 28 2025 13:10:54: NOTICE: IPsec SA installed: esp: SPI ######002025-03-28T13:11:06.066Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet R(##.##.##.84:4500 <- ##.##.##.177:4500): len= 52, mID=0, HDR(############50_i, ############5b_r)2025-03-28T13:11:06.066Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet S(##.##.##.84:4500 -> ##.##.##.177:4500): len= 84, mID=0, HDR(############50_i, ############5b_r)[....]2025-03-28T13:11:16.257Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet R(##.##.##.84:4500 <- ##.##.##.177:4500): len= 52, mID=1, HDR(############50_i, ############5b_r)2025-03-28T13:11:16.258Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet S(##.##.##.84:4500 -> ##.##.##.177:4500): len= 84, mID=1, HDR(############50_i, ############5b_r)[....]2025-03-28T13:40:45.823Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet R(##.##.##.84:4500 <- ##.##.##.177:4500): len= 52, mID=176, HDR(############50_i, ############5b_r)2025-03-28T13:40:45.824Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet S(##.##.##.84:4500 -> ##.##.##.177:4500): len= 84, mID=176, HDR(############50_i, ############5b_r)2025-03-28T13:40:55.604Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet R(##.##.##.84:4500 <- ##.##.##.177:4500): len= 60, mID=177, HDR(############50_i, ############5b_r), DEL2025-03-28T13:40:55.605Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet S(##.##.##.84:4500 -> ##.##.##.177:4500): len= 84, mID=177, HDR(############50_i, ############5b_r)2025-03-28T13:40:55.605Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IPsec SA EVENT:2025-03-28T13:40:55.605Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IPsec SA ESP Inbound SPI ######00, Outbound SPI ######f6: destroyed2025-03-28T13:40:55.606Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="iked-dp-control" level="INFO"] SA delete for SPIs 0x######00_i 0x######f6_o, dir 0x0, encr algo aes256-cbc2025-03-28T13:40:55.606Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="iked-dp-control" level="INFO"] Deleting IPSec inbound SA local=##.##.##.177, remote=##.##.##.842025-03-28T13:40:55.606Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="iked-dp-control" level="INFO"] Sending SA delete for policy UUID 0x##########09 0x##############00, SPI 0x######00 IPv6 endpoint flag not set, IPv6 rule flag not set,2025-03-28T13:40:55.607Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="iked-dp-control" level="INFO"] Deleting IPSec outbound SA local=##.##.##.84, remote=##.##.##.1772025-03-28T13:40:55.607Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="iked-dp-control" level="INFO"] Sending SA delete for policy UUID 0x##########09 0x##############00, SPI 0x######f6 IPv6 endpoint flag not set, IPv6 rule flag not set,2025-03-28T13:40:55.608Z edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] Fri Mar 28 2025 13:40:55: NOTICE: IPsec SA deleted: esp: SPI ######00edge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet S(##.##.##.84:500 -> ##.##.##.177:500): len= 734, mID=0, HDR(############89_i, 0000000000000000_r), SA, KE, Nonce, N(NAT_DETECTION_SOURCE_IP), N(NAT_DETECTION_DESTINATION_IP), N(FRAGMENTATION_SUPPORTED), Videdge_fqdn NSX 3126911 VPN [nsx@6876 comp="nsx-edge" subcomp="iked" s2comp="ike-stack" level="INFO"] IKEv2 packet R(##.##.##.84:500 <- ##.##.##.177:500): len= 44, mID=0, HDR(############89_i, 0000000000000000_r), N(COOKIE)14:10:57.056747 ##:##:##:##:##:d8 > ##:##:##:##:##:20, ethertype IPv4 (0x0800), length 776: ##.##.##.84.22306 > ##.##.##.177.isakmp: isakmp: parent_sa ikev2_init[I]14:10:57.062692 ##:##:##:##:##:20 > ##:##:##:##:##:d8, ethertype IPv4 (0x0800), length 86: ##.##.##.177.isakmp > ##.##.##.84.22306: isakmp: parent_sa ikev2_init[R]14:10:57.064504 ##:##:##:##:##:d8 > ##:##:##:##:##:20, ethertype IPv4 (0x0800), length 792: ##.##.##.84.22306 > ##.##.##.177.isakmp: isakmp: parent_sa ikev2_init[I]14:10:57.076604 ##:##:##:##:##:20 > ##:##:##:##:##:d8, ethertype IPv4 (0x0800), length 917: ##.##.##.177.isakmp > ##.##.##.84.22306: isakmp: parent_sa ikev2_init[R]14:10:57.100628 ##:##:##:##:##:d8 > ##:##:##:##:##:20, ethertype IPv4 (0x0800), length 286: ##.##.##.84.19697 > ##.##.##.177.ipsec-nat-t: NONESP-encap: isakmp: child_sa ikev2_auth[I]14:10:57.105777 ##:##:##:##:##:20 > ##:##:##:##:##:d8, ethertype IPv4 (0x0800), length 286: ##.##.##.177.ipsec-nat-t > ##.##.##.84.19697: NONESP-encap: isakmp: child_sa ikev2_auth[R]14:10:57.110284 ##:##:##:##:##:d8 > ##:##:##:##:##:20, ethertype IPv4 (0x0800), length 270: ##.##.##.84.19697 > ##.##.##.177.ipsec-nat-t: NONESP-encap: isakmp: child_sa child_sa[I]14:10:57.115739 ##:##:##:##:##:20 > ##:##:##:##:##:d8, ethertype IPv4 (0x0800), length 286: ##.##.##.177.ipsec-nat-t > ##.##.##.84.19697: NONESP-encap: isakmp: child_sa child_sa[R]VMware NSX
IPSec VPN is not supported when the local endpoint IP address goes through NAT in the same logical router that the IPSec VPN session is configured.
Owing to this, the IKE packets undergo NAT and use a random source port to establish the session. However, the ESP (tunnel) traffic do not undergo NAT. Therefore, as the remote endpoint does not receive the ESP packets on the random source port that was used to establish the connection, it tears down the connection.
This configuration limitation has been documented in Add an NSX IPSec VPN Service.
There are two options:
1.1.1.10 is the local endpoint and 1.1.1.20 is the remote endpoint. Currently, we have a SNAT rule stating Any Source --> Any Destination --> Translate to 1.1.1.10. Now, we will need to create a "No NAT" rule stating Source IP 1.1.1.10 --> Destination IP 1.1.1.20 --> Any Translated IP.