<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Can Not Establish IPSEC Connection – PFSense Behind Cisco Router]]></title><description><![CDATA[<p dir="auto">Hello Community,</p>
<p dir="auto">I have been looking through documentation, and tried a few, but I am still stuck on trying to establish an IPSEC connection from a client (IOS or Windows). The setup that I have is: WAN Connection –&gt; Cisco 4431 Router --&gt; PF Sense --&gt; LAN</p>
<p dir="auto">I have created the Phase 1 + 2 settings with</p>
<p dir="auto">Phase 1:</p>
<p dir="auto">Interface: WAN<br />
Authentication Method: PSK + Xauth<br />
Negotiation Mode: Aggressive<br />
My Identifier: My IP Address<br />
Peer Identifier: Distinguished Name</p>
<p dir="auto">Proposal: AES / 128-bit<br />
Hash: SHA1<br />
DH Group: 2 - 1024 bit<br />
Checked Responder Only<br />
Nat Traversal: Force</p>
<p dir="auto">Phase 2:</p>
<p dir="auto">Local Network: LAN subnet<br />
Protocol: ESP<br />
Encryption Algorithm: Checked AES / 128-bit<br />
Hash: SHA1<br />
PFS Key Group: Grayed Out<br />
Lifetime: 3600</p>
<p dir="auto">Router settings and log messages are as follows:</p>
<p dir="auto">interface GigabitEthernet0/0/0<br />
description WAN side<br />
ip address x.x.208.170 255.255.255.248<br />
no ip redirects<br />
no ip unreachables<br />
no ip proxy-arp<br />
ip nat outside<br />
ip verify unicast reverse-path<br />
ip access-group 110 in<br />
load-interval 30<br />
media-type sfp<br />
negotiation auto<br />
ip virtual-reassembly<br />
!<br />
interface GigabitEthernet0/0/1<br />
shutdown<br />
!<br />
interface GigabitEthernet0/0/2<br />
description LAN Side<br />
ip address 10.20.0.1 255.255.255.252<br />
no ip redirects<br />
no ip unreachables<br />
no ip proxy-arp<br />
ip nat inside<br />
negotiation auto<br />
ip virtual-reassembly<br />
!<br />
interface GigabitEthernet0<br />
vrf forwarding Mgmt-intf<br />
no ip address<br />
shutdown<br />
negotiation auto<br />
!<br />
ip nat inside source list 111 interface GigabitEthernet0/0/0 overload<br />
ip nat inside source static udp 10.20.0.2 500 interface GigabitEthernet0/0/0 500<br />
ip nat inside source static esp 10.20.0.2 interface GigabitEthernet0/0/0<br />
ip nat inside source static tcp 10.20.0.2 22 x.x.208.170 1022 extendable<br />
ip forward-protocol nd<br />
ip http server<br />
no ip http secure-server<br />
ip tftp source-interface GigabitEthernet0/0/1<br />
ip route 0.0.0.0 0.0.0.0 x.x.208.169<br />
ip route 10.30.0.0 255.255.255.224 10.20.0.2<br />
!<br />
!<br />
access-list 110 permit udp any any<br />
access-list 110 permit ip any any<br />
access-list 111 permit ip any any log<br />
!</p>
<p dir="auto">Feb 18 13:09:00 charon 08[NET] &lt;17&gt; received packet: from 103.46.209.154[500] to 10.20.0.2[500] (761 bytes)<br />
Feb 18 13:09:00 charon 08[ENC] &lt;17&gt; parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V V V ]<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received FRAGMENTATION vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received XAuth vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received Cisco Unity vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; received DPD vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; 103.46.209.154 is initiating a Aggressive Mode IKE_SA<br />
Feb 18 13:09:00 charon 08[CFG] &lt;17&gt; received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048<br />
Feb 18 13:09:00 charon 08[CFG] &lt;17&gt; configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024<br />
Feb 18 13:09:00 charon 08[IKE] &lt;17&gt; no proposal found<br />
Feb 18 13:09:00 charon 08[ENC] &lt;17&gt; generating INFORMATIONAL_V1 request 3836950386 [ N(NO_PROP) ]<br />
Feb 18 13:09:00 charon 08[NET] &lt;17&gt; sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (56 bytes)<br />
Feb 18 13:09:00 charon 08[NET] &lt;18&gt; received packet: from 103.46.209.154[500] to 10.20.0.2[500] (761 bytes)<br />
Feb 18 13:09:00 charon 08[ENC] &lt;18&gt; parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V V V ]<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received FRAGMENTATION vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received XAuth vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received Cisco Unity vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; received DPD vendor ID<br />
Feb 18 13:09:00 charon 08[IKE] &lt;18&gt; 103.46.209.154 is initiating a Aggressive Mode IKE_SA<br />
Feb 18 13:09:00 charon 08[CFG] &lt;18&gt; looking for XAuthInitPSK peer configs matching 10.20.0.2…103.46.209.154[cisco]<br />
Feb 18 13:09:00 charon 08[CFG] &lt;18&gt; selected peer config "con1"<br />
Feb 18 13:09:00 charon 08[ENC] &lt;con1|18&gt;generating AGGRESSIVE response 0 [ SA KE No ID V V V V NAT-D NAT-D HASH ]<br />
Feb 18 13:09:00 charon 08[NET] &lt;con1|18&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 13:09:04 charon 08[IKE] &lt;con1|18&gt;sending retransmit 1 of response message ID 0, seq 1<br />
Feb 18 13:09:04 charon 08[NET] &lt;con1|18&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 13:09:09 charon 10[CFG] received stroke: terminate 'con1000'<br />
Feb 18 13:09:09 charon 10[CFG] no IKE_SA named 'con1000' found<br />
Feb 18 13:09:09 charon 08[CFG] received stroke: initiate 'con1000'<br />
Feb 18 13:09:09 charon 08[CFG] no config named 'con1000'<br />
Feb 18 13:09:11 charon 10[IKE] &lt;con1|18&gt;sending retransmit 2 of response message ID 0, seq 1<br />
Feb 18 13:09:11 charon 10[NET] &lt;con1|18&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 13:09:24 charon 13[IKE] &lt;con1|18&gt;sending retransmit 3 of response message ID 0, seq 1<br />
Feb 18 13:09:24 charon 13[NET] &lt;con1|18&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 13:09:30 charon 14[JOB] &lt;con1|18&gt;deleting half open IKE_SA after timeout<br />
Feb 18 14:22:14 charon 10[NET] &lt;19&gt; received packet: from 103.46.209.154[500] to 10.20.0.2[500] (761 bytes)<br />
Feb 18 14:22:14 charon 10[ENC] &lt;19&gt; parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V V V ]<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received FRAGMENTATION vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received XAuth vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received Cisco Unity vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; received DPD vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; 103.46.209.154 is initiating a Aggressive Mode IKE_SA<br />
Feb 18 14:22:14 charon 10[CFG] &lt;19&gt; received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048<br />
Feb 18 14:22:14 charon 10[CFG] &lt;19&gt; configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024<br />
Feb 18 14:22:14 charon 10[IKE] &lt;19&gt; no proposal found<br />
Feb 18 14:22:14 charon 10[ENC] &lt;19&gt; generating INFORMATIONAL_V1 request 3476172714 [ N(NO_PROP) ]<br />
Feb 18 14:22:14 charon 10[NET] &lt;19&gt; sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (56 bytes)<br />
Feb 18 14:22:14 charon 10[NET] &lt;20&gt; received packet: from 103.46.209.154[500] to 10.20.0.2[500] (761 bytes)<br />
Feb 18 14:22:14 charon 10[ENC] &lt;20&gt; parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V V V ]<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received FRAGMENTATION vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received XAuth vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received Cisco Unity vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; received DPD vendor ID<br />
Feb 18 14:22:14 charon 10[IKE] &lt;20&gt; 103.46.209.154 is initiating a Aggressive Mode IKE_SA<br />
Feb 18 14:22:14 charon 10[CFG] &lt;20&gt; looking for XAuthInitPSK peer configs matching 10.20.0.2…103.46.209.154[cisco]<br />
Feb 18 14:22:14 charon 10[CFG] &lt;20&gt; selected peer config "con1"<br />
Feb 18 14:22:14 charon 10[ENC] &lt;con1|20&gt;generating AGGRESSIVE response 0 [ SA KE No ID V V V V NAT-D NAT-D HASH ]<br />
Feb 18 14:22:14 charon 10[NET] &lt;con1|20&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 14:22:18 charon 10[IKE] &lt;con1|20&gt;sending retransmit 1 of response message ID 0, seq 1<br />
Feb 18 14:22:18 charon 10[NET] &lt;con1|20&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 14:22:25 charon 10[IKE] &lt;con1|20&gt;sending retransmit 2 of response message ID 0, seq 1<br />
Feb 18 14:22:25 charon 10[NET] &lt;con1|20&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 14:22:38 charon 10[IKE] &lt;con1|20&gt;sending retransmit 3 of response message ID 0, seq 1<br />
Feb 18 14:22:38 charon 10[NET] &lt;con1|20&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (412 bytes)<br />
Feb 18 14:22:44 charon 10[JOB] &lt;con1|20&gt;deleting half open IKE_SA after timeout</p>
<p dir="auto">Please Help!!!&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|20&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;&lt;/con1|18&gt;</p>
]]></description><link>https://forum.netgate.com/topic/111788/can-not-establish-ipsec-connection-pfsense-behind-cisco-router</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 22:57:12 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/111788.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 18 Feb 2017 09:56:47 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Can Not Establish IPSEC Connection – PFSense Behind Cisco Router on Fri, 24 Feb 2017 13:22:01 GMT]]></title><description><![CDATA[<p dir="auto">Have you fix this problem? It seems that I have exact the same problem as you.<br />
My config is almost the same as yours. I hope someone could give the right answer.</p>
]]></description><link>https://forum.netgate.com/post/682310</link><guid isPermaLink="true">https://forum.netgate.com/post/682310</guid><dc:creator><![CDATA[-Sonic- 0]]></dc:creator><pubDate>Fri, 24 Feb 2017 13:22:01 GMT</pubDate></item><item><title><![CDATA[Reply to Can Not Establish IPSEC Connection – PFSense Behind Cisco Router on Sun, 19 Feb 2017 10:53:03 GMT]]></title><description><![CDATA[<p dir="auto">Now seeing the attempted connection under Status –&gt; IPSEC:</p>
<p dir="auto">Time Process PID Message<br />
Feb 19 15:12:25 charon 07[NET] received packet: from 103.46.209.154[500] to 10.20.0.2[500]<br />
Feb 19 15:12:25 charon 07[NET] waiting for data on sockets<br />
Feb 19 15:12:25 charon 12[MGR] checkout IKEv1 SA by message with SPIs 7ba7c04f2b6e9753_i 0000000000000000_r<br />
Feb 19 15:12:25 charon 12[MGR] created IKE_SA (unnamed)[3]<br />
Feb 19 15:12:25 charon 12[NET] &lt;3&gt; received packet: from 103.46.209.154[500] to 10.20.0.2[500] (771 bytes)<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received FRAGMENTATION vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received XAuth vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received Cisco Unity vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; received DPD vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; 103.46.209.154 is initiating a Aggressive Mode IKE_SA<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; IKE_SA (unnamed)[3] state change: CREATED =&gt; CONNECTING<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; no proposal found<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; queueing INFORMATIONAL task<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; activating new tasks<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; activating INFORMATIONAL task<br />
Feb 19 15:12:25 charon 12[NET] &lt;3&gt; sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (56 bytes)<br />
Feb 19 15:12:25 charon 12[MGR] &lt;3&gt; checkin and destroy IKE_SA (unnamed)[3]<br />
Feb 19 15:12:25 charon 04[NET] sending packet: from 10.20.0.2[500] to 103.46.209.154[500]<br />
Feb 19 15:12:25 charon 12[IKE] &lt;3&gt; IKE_SA (unnamed)[3] state change: CONNECTING =&gt; DESTROYING<br />
Feb 19 15:12:25 charon 12[MGR] checkin and destroy of IKE_SA successful<br />
Feb 19 15:12:25 charon 07[NET] received packet: from 103.46.209.154[500] to 10.20.0.2[500]<br />
Feb 19 15:12:25 charon 07[NET] waiting for data on sockets<br />
Feb 19 15:12:25 charon 12[MGR] checkout IKEv1 SA by message with SPIs c24d4bc5c9ba68b2_i 0000000000000000_r<br />
Feb 19 15:12:25 charon 12[MGR] created IKE_SA (unnamed)[4]<br />
Feb 19 15:12:25 charon 12[NET] &lt;4&gt; received packet: from 103.46.209.154[500] to 10.20.0.2[500] (771 bytes)<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received FRAGMENTATION vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-08 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-07 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-06 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-05 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-04 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-02 vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received XAuth vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received Cisco Unity vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; received DPD vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; 103.46.209.154 is initiating a Aggressive Mode IKE_SA<br />
Feb 19 15:12:25 charon 12[IKE] &lt;4&gt; IKE_SA (unnamed)[4] state change: CREATED =&gt; CONNECTING<br />
Feb 19 15:12:25 charon 12[LIB] &lt;4&gt; size of DH secret exponent: 1023 bits<br />
Feb 19 15:12:25 charon 12[IKE] &lt;con1|4&gt;sending XAuth vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;con1|4&gt;sending DPD vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;con1|4&gt;sending Cisco Unity vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;con1|4&gt;sending FRAGMENTATION vendor ID<br />
Feb 19 15:12:25 charon 12[IKE] &lt;con1|4&gt;sending NAT-T (RFC 3947) vendor ID<br />
Feb 19 15:12:25 charon 12[NET] &lt;con1|4&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (428 bytes)<br />
Feb 19 15:12:25 charon 12[MGR] &lt;con1|4&gt;checkin IKE_SA con1[4]<br />
Feb 19 15:12:25 charon 04[NET] sending packet: from 10.20.0.2[500] to 103.46.209.154[500]<br />
Feb 19 15:12:25 charon 12[MGR] &lt;con1|4&gt;checkin of IKE_SA successful<br />
Feb 19 15:12:29 charon 12[MGR] checkout IKEv1 SA with SPIs c24d4bc5c9ba68b2_i f79e3272d7218d04_r<br />
Feb 19 15:12:29 charon 12[MGR] IKE_SA con1[4] successfully checked out<br />
Feb 19 15:12:29 charon 12[IKE] &lt;con1|4&gt;sending retransmit 1 of response message ID 0, seq 1<br />
Feb 19 15:12:29 charon 12[NET] &lt;con1|4&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (428 bytes)<br />
Feb 19 15:12:29 charon 12[MGR] &lt;con1|4&gt;checkin IKE_SA con1[4]<br />
Feb 19 15:12:29 charon 04[NET] sending packet: from 10.20.0.2[500] to 103.46.209.154[500]<br />
Feb 19 15:12:29 charon 12[MGR] &lt;con1|4&gt;checkin of IKE_SA successful<br />
Feb 19 15:12:36 charon 12[MGR] checkout IKEv1 SA with SPIs c24d4bc5c9ba68b2_i f79e3272d7218d04_r<br />
Feb 19 15:12:36 charon 12[MGR] IKE_SA con1[4] successfully checked out<br />
Feb 19 15:12:36 charon 12[IKE] &lt;con1|4&gt;sending retransmit 2 of response message ID 0, seq 1<br />
Feb 19 15:12:36 charon 12[NET] &lt;con1|4&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (428 bytes)<br />
Feb 19 15:12:36 charon 12[MGR] &lt;con1|4&gt;checkin IKE_SA con1[4]<br />
Feb 19 15:12:36 charon 04[NET] sending packet: from 10.20.0.2[500] to 103.46.209.154[500]<br />
Feb 19 15:12:36 charon 12[MGR] &lt;con1|4&gt;checkin of IKE_SA successful<br />
Feb 19 15:12:49 charon 02[MGR] checkout IKEv1 SA with SPIs c24d4bc5c9ba68b2_i f79e3272d7218d04_r<br />
Feb 19 15:12:49 charon 02[MGR] IKE_SA con1[4] successfully checked out<br />
Feb 19 15:12:49 charon 02[IKE] &lt;con1|4&gt;sending retransmit 3 of response message ID 0, seq 1<br />
Feb 19 15:12:49 charon 02[NET] &lt;con1|4&gt;sending packet: from 10.20.0.2[500] to 103.46.209.154[500] (428 bytes)<br />
Feb 19 15:12:49 charon 02[MGR] &lt;con1|4&gt;checkin IKE_SA con1[4]<br />
Feb 19 15:12:49 charon 04[NET] sending packet: from 10.20.0.2[500] to 103.46.209.154[500]<br />
Feb 19 15:12:49 charon 02[MGR] &lt;con1|4&gt;checkin of IKE_SA successful<br />
Feb 19 15:12:55 charon 02[MGR] checkout IKEv1 SA with SPIs 7ba7c04f2b6e9753_i b49a71955a2f7a35_r<br />
Feb 19 15:12:55 charon 02[MGR] IKE_SA checkout not successful<br />
Feb 19 15:12:55 charon 06[MGR] checkout IKEv1 SA with SPIs c24d4bc5c9ba68b2_i f79e3272d7218d04_r<br />
Feb 19 15:12:55 charon 06[MGR] IKE_SA con1[4] successfully checked out<br />
Feb 19 15:12:55 charon 06[MGR] &lt;con1|4&gt;checkin and destroy IKE_SA con1[4]<br />
Feb 19 15:12:55 charon 06[IKE] &lt;con1|4&gt;IKE_SA con1[4] state change: CONNECTING =&gt; DESTROYING<br />
Feb 19 15:12:55 charon 06[MGR] checkin and destroy of IKE_SA successful<br />
Feb 19 15:13:12 charon 06[MGR] checkout IKEv1 SA with SPIs c24d4bc5c9ba68b2_i f79e3272d7218d04_r<br />
Feb 19 15:13:12 charon 06[MGR] IKE_SA checkout not successful<br />
Feb 19 15:25:04 charon 07[NET] received packet: from 172.30.3.163[500] to 10.20.0.2[500]<br />
Feb 19 15:25:04 charon 07[NET] waiting for data on sockets<br />
Feb 19 15:25:04 charon 11[MGR] checkout IKEv1 SA by message with SPIs 72c13bb99d21bb9e_i 0000000000000000_r<br />
Feb 19 15:25:04 charon 11[MGR] created IKE_SA (unnamed)[5]<br />
Feb 19 15:25:04 charon 11[NET] &lt;5&gt; received packet: from 172.30.3.163[500] to 10.20.0.2[500] (1183 bytes)<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received XAuth vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received draft-ietf-ipsec-nat-t-ike-00 vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received draft-ietf-ipsec-nat-t-ike-03 vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received NAT-T (RFC 3947) vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received FRAGMENTATION vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received DPD vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; received Cisco Unity vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; 172.30.3.163 is initiating a Aggressive Mode IKE_SA<br />
Feb 19 15:25:04 charon 11[IKE] &lt;5&gt; IKE_SA (unnamed)[5] state change: CREATED =&gt; CONNECTING<br />
Feb 19 15:25:04 charon 11[LIB] &lt;5&gt; size of DH secret exponent: 1023 bits<br />
Feb 19 15:25:04 charon 11[IKE] &lt;con1|5&gt;sending XAuth vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;con1|5&gt;sending DPD vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;con1|5&gt;sending Cisco Unity vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;con1|5&gt;sending FRAGMENTATION vendor ID<br />
Feb 19 15:25:04 charon 11[IKE] &lt;con1|5&gt;sending NAT-T (RFC 3947) vendor ID<br />
Feb 19 15:25:04 charon 11[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:04 charon 11[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:04 charon 11[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:04 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:08 charon 11[MGR] checkout IKEv1 SA with SPIs 72c13bb99d21bb9e_i 27700ec4f94d446a_r<br />
Feb 19 15:25:08 charon 11[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:08 charon 11[IKE] &lt;con1|5&gt;sending retransmit 1 of response message ID 0, seq 1<br />
Feb 19 15:25:08 charon 11[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:08 charon 11[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:08 charon 11[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:08 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:09 charon 07[NET] received packet: from 172.30.3.163[500] to 10.20.0.2[500]<br />
Feb 19 15:25:09 charon 07[NET] waiting for data on sockets<br />
Feb 19 15:25:09 charon 11[MGR] checkout IKEv1 SA by message with SPIs 72c13bb99d21bb9e_i 0000000000000000_r<br />
Feb 19 15:25:09 charon 11[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:09 charon 11[NET] &lt;con1|5&gt;received packet: from 172.30.3.163[500] to 10.20.0.2[500] (1183 bytes)<br />
Feb 19 15:25:09 charon 11[IKE] &lt;con1|5&gt;received retransmit of request with ID 0, retransmitting response<br />
Feb 19 15:25:09 charon 11[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:09 charon 11[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:09 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:09 charon 11[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:14 charon 07[NET] received packet: from 172.30.3.163[500] to 10.20.0.2[500]<br />
Feb 19 15:25:14 charon 07[NET] waiting for data on sockets<br />
Feb 19 15:25:14 charon 11[MGR] checkout IKEv1 SA by message with SPIs 72c13bb99d21bb9e_i 0000000000000000_r<br />
Feb 19 15:25:14 charon 11[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:14 charon 11[NET] &lt;con1|5&gt;received packet: from 172.30.3.163[500] to 10.20.0.2[500] (1183 bytes)<br />
Feb 19 15:25:14 charon 11[IKE] &lt;con1|5&gt;received retransmit of request with ID 0, retransmitting response<br />
Feb 19 15:25:14 charon 11[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:14 charon 11[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:14 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:14 charon 11[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:15 charon 11[MGR] checkout IKEv1 SA with SPIs 72c13bb99d21bb9e_i 27700ec4f94d446a_r<br />
Feb 19 15:25:15 charon 11[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:15 charon 11[IKE] &lt;con1|5&gt;sending retransmit 2 of response message ID 0, seq 1<br />
Feb 19 15:25:15 charon 11[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:15 charon 11[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:15 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:15 charon 11[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:19 charon 07[NET] received packet: from 172.30.3.163[500] to 10.20.0.2[500]<br />
Feb 19 15:25:19 charon 07[NET] waiting for data on sockets<br />
Feb 19 15:25:19 charon 12[MGR] checkout IKEv1 SA by message with SPIs 72c13bb99d21bb9e_i 0000000000000000_r<br />
Feb 19 15:25:19 charon 12[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:19 charon 12[NET] &lt;con1|5&gt;received packet: from 172.30.3.163[500] to 10.20.0.2[500] (1183 bytes)<br />
Feb 19 15:25:19 charon 12[IKE] &lt;con1|5&gt;received retransmit of request with ID 0, retransmitting response<br />
Feb 19 15:25:19 charon 12[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:19 charon 12[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:19 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:19 charon 12[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:28 charon 12[MGR] checkout IKEv1 SA with SPIs 72c13bb99d21bb9e_i 27700ec4f94d446a_r<br />
Feb 19 15:25:28 charon 12[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:28 charon 12[IKE] &lt;con1|5&gt;sending retransmit 3 of response message ID 0, seq 1<br />
Feb 19 15:25:28 charon 12[NET] &lt;con1|5&gt;sending packet: from 10.20.0.2[500] to 172.30.3.163[500] (432 bytes)<br />
Feb 19 15:25:28 charon 12[MGR] &lt;con1|5&gt;checkin IKE_SA con1[5]<br />
Feb 19 15:25:28 charon 04[NET] sending packet: from 10.20.0.2[500] to 172.30.3.163[500]<br />
Feb 19 15:25:28 charon 12[MGR] &lt;con1|5&gt;checkin of IKE_SA successful<br />
Feb 19 15:25:34 charon 12[MGR] checkout IKEv1 SA with SPIs 72c13bb99d21bb9e_i 27700ec4f94d446a_r<br />
Feb 19 15:25:34 charon 12[MGR] IKE_SA con1[5] successfully checked out<br />
Feb 19 15:25:34 charon 12[MGR] &lt;con1|5&gt;checkin and destroy IKE_SA con1[5]<br />
Feb 19 15:25:34 charon 12[IKE] &lt;con1|5&gt;IKE_SA con1[5] state change: CONNECTING =&gt; DESTROYING<br />
Feb 19 15:25:34 charon 12[MGR] checkin and destroy of IKE_SA successful&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|5&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;&lt;/con1|4&gt;</p>
]]></description><link>https://forum.netgate.com/post/680972</link><guid isPermaLink="true">https://forum.netgate.com/post/680972</guid><dc:creator><![CDATA[anking]]></dc:creator><pubDate>Sun, 19 Feb 2017 10:53:03 GMT</pubDate></item></channel></rss>