cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
12766
Views
0
Helpful
25
Replies

VPN IPSec site-to-site tunnel between pfSense and Cisco RV042G is not working

nasolsi1
Level 1
Level 1

Hello Support,

 

Could you please help me to fix VPN IPSec issue.
I've recently configured pfSense v.2.4.1-RELEASE (amd64) for VPN IPSec site-to-site tunnel to Cisco RV042G in mode Gateway but unfortunately it didn't work out as expected, and I'm not sure if the VPN issue is caused by either pfSense or Cisco side.
I can ping from pfSense's LAN subnet/WAN IP to Cisco's WAN IP and Gateway but cannot ping from Cisco's LAN subnet and WAN IP to pfSense WAN IP (note: both pfsense and cisco's WAN IPs and Gateway are in same subnet /29 provided by ISP). Cisco router has currently got other VPN IPSec tunnel connections established to our branch offices.
Firewall rules to allow vpn ipsec and ports have been configured on both sides.

Thank you in advance.

25 Replies 25

Hi

I'm sorry but don't know too much about RV042 model. Is there any logs menu where you can filter log messages?

Can you share on a doc please the VPN config of RV042 and Pfsense?

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hi Francesco,

 

Attached files with vpn ipsec conf on pfSense and Cisco.

 

As I said before no any firewall, ipsec or vpn logs on pfSense despite multiple attempts for vpn connection or deleting and recreating the whole vpn ipsec config, and creating firewall rules.

There haven't been any new vpn logs on Cisco for the last two days (latest vpn logs are from 30/10/17 when vpn ipsec tunnel has gone down and never come back up).

Attached also the latest Cisco vpn logs.

 

Is there anyone else from cisco support community to help us with that issue?

 

Thank you in advance.

Hi

Based on your screenshot, I can see on Cisco that you setup agressive mode while Pfsense is in main mode. On Cisco, PFS isn't activated while on Pfsense it seems.
All the rest seems to be ok.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hi Francesco,

 

I did set an aggressive mode on both pfsense and cisco, and gave it a test and as result didn't work out. Then I set a main mode on both and tested it again, and didn't work either.

 

I don't know what else to try.

I've run out of ideas.

 

Thank you for your help.

I'm sure you did it already but both devices can ping each other on their respective wan ip?

As there's no much logs to explore I also run out of ideas.

Hope someone with better knowledge on this Cisco device can give some hints how to take logs like debugs to see what's going on

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hi Francesco,

 

Sorry for my delay.

 

Let give you a brief update on what happened on Friday 3/11/17. I did first reboot Cisco RV042G firewall/vpn and tried vpn connection from pfsense, and as result the vpn connection between pfsense and cisco got established but unfortunately it didn't last long and got dropped again.

Attached the latest cisco vpn logs taken after the vpn connection got dropped.

Hope these logs will help you a bit to figure it out.

 

Thank you in advance.

Hi
On these logs we can see that an authentication issue occurs and then tries to build up back the tunnel but nothing else.
Difficult to say what's going on.
Do you have a quick design?
Have you tried using another Cisco equipment instead of pfsense or the invert, with the same parameters just to see if it's config issue or something else

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hi Francesco,

 

Sorry for my delay.

 

Thank you for all your help.

 

I did restart both Cisco and pfSense and tried vpn ipsec connection from pfSense to Cisco, and as result pfSense keeps trying to established connection as connection keeps going up and down and it couldn't get stabilized by itself.

Here are the latest Cisco vpn logs.

 

Nov 17 08:59:28 2017 VPN Log (g2gips5) #5663: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5663: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5663: sent MR3, ISAKMP SA established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5663: ISAKMP SA expired (LATEST!)
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: responding to Main Mode
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: sent MR3, ISAKMP SA established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5664: ISAKMP SA expired (LATEST!)
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: responding to Main Mode
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: sent MR3, ISAKMP SA established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5665: ISAKMP SA expired (LATEST!)
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: responding to Main Mode
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: sent MR3, ISAKMP SA established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5666: ISAKMP SA expired (LATEST!)
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: responding to Main Mode
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: sent MR3, ISAKMP SA established
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5667: ISAKMP SA expired (LATEST!)
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5668: responding to Main Mode
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:28 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: sent MR3, ISAKMP SA established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5668: ISAKMP SA expired (LATEST!)
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: responding to Main Mode
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: sent MR3, ISAKMP SA established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5669: ISAKMP SA expired (LATEST!)
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: responding to Main Mode
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: sent MR3, ISAKMP SA established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5670: ISAKMP SA expired (LATEST!)
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: responding to Main Mode
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: sent MR3, ISAKMP SA established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5671: ISAKMP SA expired (LATEST!)
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: responding to Main Mode
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: sent MR3, ISAKMP SA established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5672: ISAKMP SA expired (LATEST!)
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: responding to Main Mode
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: sent MR3, ISAKMP SA established
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5673: ISAKMP SA expired (LATEST!)
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: responding to Main Mode
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:29 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5674: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5674: sent MR3, ISAKMP SA established
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5674: ISAKMP SA expired (LATEST!)
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: responding to Main Mode
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: ignoring informational payload, type IPSEC_INITIAL_CONTACT
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: Peer ID is ID_IPV4_ADDR: '78.130.146.163'
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: sent MR3, ISAKMP SA established
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5675: ISAKMP SA expired (LATEST!)
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:30 2017 VPN Log packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Nov 17 08:59:30 2017 VPN Log (g2gips5) #5676: responding to Main Mode

Hi Francesco,

 

Let me give you an update on this.

 

Finally I've managed to establish vpn ipsec tunnel by changing a negotiation mode from main to aggressive on pfSense as Cisco's negotiation mode was set to aggressive also. I've tried that before and it didn't work but it suddenly started working now, but I'm not sure how long vpn is going to be up and running (note: vpn connection has so far been up and running for more than 2 hours).

An another problem followed by since vpn ipsec tunnel was established and the problem is there is no ping or any packets going through the tunnel. I cannot ping or rdp to remote LAN or other way back.

Here are the ping results:

pfSense side:

pfSense WAN- Cisco WAN- ping test successfull 0% packets lost

pfSense LAN- Cisco WAN IP- ping test successfull 0% packets lost

pfSense LAN- Cisco LAN IP- variable- ping test either failed with 100% packets lost or successful with 0% packets lost

 

Cisco side:

Cisco WAN- pfSense WAN IP- ping test successfull 0% packets lost

Cisco LAN- pfSense LAN IP- variable- ping test either failed with 100% packets lost or successful with 0% packets lost, or partial 25%/75% packets lost

 

Do I miss any firewall rules?

What should I do next?

Hi

Thanks for the update.
I hope someone with knowledge on these types of equipment can answer you quickly.

I don't either these equipments to make a quick lab and test how vpn works on that boxes and how to troubleshoot them.

I'm sorry to not being able to help you on that topic

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hello Nasolsi1, can you help me, i have the same problem but my Encryption Algorithm is AES