10-27-2017 02:52 AM - edited 03-12-2019 04:40 AM
Hello Support,
Could you please help me to fix VPN IPSec issue.
I've recently configured pfSense v.2.4.1-RELEASE (amd64) for VPN IPSec site-to-site tunnel to Cisco RV042G in mode Gateway but unfortunately it didn't work out as expected, and I'm not sure if the VPN issue is caused by either pfSense or Cisco side.
I can ping from pfSense's LAN subnet/WAN IP to Cisco's WAN IP and Gateway but cannot ping from Cisco's LAN subnet and WAN IP to pfSense WAN IP (note: both pfsense and cisco's WAN IPs and Gateway are in same subnet /29 provided by ISP). Cisco router has currently got other VPN IPSec tunnel connections established to our branch offices.
Firewall rules to allow vpn ipsec and ports have been configured on both sides.
Thank you in advance.
10-31-2017 11:20 AM
11-01-2017 12:20 AM
Hi Francesco,
Attached files with vpn ipsec conf on pfSense and Cisco.
As I said before no any firewall, ipsec or vpn logs on pfSense despite multiple attempts for vpn connection or deleting and recreating the whole vpn ipsec config, and creating firewall rules.
There haven't been any new vpn logs on Cisco for the last two days (latest vpn logs are from 30/10/17 when vpn ipsec tunnel has gone down and never come back up).
Attached also the latest Cisco vpn logs.
Is there anyone else from cisco support community to help us with that issue?
Thank you in advance.
11-01-2017 05:04 AM
11-01-2017 11:33 PM
Hi Francesco,
I did set an aggressive mode on both pfsense and cisco, and gave it a test and as result didn't work out. Then I set a main mode on both and tested it again, and didn't work either.
I don't know what else to try.
I've run out of ideas.
Thank you for your help.
11-02-2017 04:55 PM
11-05-2017 10:39 PM
Hi Francesco,
Sorry for my delay.
Let give you a brief update on what happened on Friday 3/11/17. I did first reboot Cisco RV042G firewall/vpn and tried vpn connection from pfsense, and as result the vpn connection between pfsense and cisco got established but unfortunately it didn't last long and got dropped again.
Attached the latest cisco vpn logs taken after the vpn connection got dropped.
Hope these logs will help you a bit to figure it out.
Thank you in advance.
11-06-2017 02:48 PM
11-16-2017 11:03 PM
Hi Francesco,
Sorry for my delay.
Thank you for all your help.
I did restart both Cisco and pfSense and tried vpn ipsec connection from pfSense to Cisco, and as result pfSense keeps trying to established connection as connection keeps going up and down and it couldn't get stabilized by itself.
Here are the latest Cisco vpn logs.
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5663: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5663: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5663: sent MR3, ISAKMP SA established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5663: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: responding to Main Mode |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: sent MR3, ISAKMP SA established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5664: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: responding to Main Mode |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: sent MR3, ISAKMP SA established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5665: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: responding to Main Mode |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: sent MR3, ISAKMP SA established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5666: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: responding to Main Mode |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: sent MR3, ISAKMP SA established |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5667: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5668: responding to Main Mode |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:28 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: sent MR3, ISAKMP SA established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5668: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: responding to Main Mode |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: sent MR3, ISAKMP SA established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5669: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: responding to Main Mode |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: sent MR3, ISAKMP SA established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5670: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: responding to Main Mode |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: sent MR3, ISAKMP SA established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5671: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: responding to Main Mode |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: sent MR3, ISAKMP SA established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5672: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: responding to Main Mode |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: sent MR3, ISAKMP SA established |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5673: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: responding to Main Mode |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:29 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5674: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5674: sent MR3, ISAKMP SA established |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5674: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: responding to Main Mode |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: ignoring informational payload, type IPSEC_INITIAL_CONTACT |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: Peer ID is ID_IPV4_ADDR: '78.130.146.163' |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: sent MR3, ISAKMP SA established |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5675: ISAKMP SA expired (LATEST!) |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [XAUTH] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [Dead Peer Detection] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [4048b7d56ebce88525e7de7f00d6c2d380000000] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: received Vendor ID payload [RFC 3947] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:30 2017 | VPN Log | packet from 78.130.146.163:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet |
Nov 17 08:59:30 2017 | VPN Log | (g2gips5) #5676: responding to Main Mode |
11-17-2017 01:35 AM
Hi Francesco,
Let me give you an update on this.
Finally I've managed to establish vpn ipsec tunnel by changing a negotiation mode from main to aggressive on pfSense as Cisco's negotiation mode was set to aggressive also. I've tried that before and it didn't work but it suddenly started working now, but I'm not sure how long vpn is going to be up and running (note: vpn connection has so far been up and running for more than 2 hours).
An another problem followed by since vpn ipsec tunnel was established and the problem is there is no ping or any packets going through the tunnel. I cannot ping or rdp to remote LAN or other way back.
Here are the ping results:
pfSense side:
pfSense WAN- Cisco WAN- ping test successfull 0% packets lost
pfSense LAN- Cisco WAN IP- ping test successfull 0% packets lost
pfSense LAN- Cisco LAN IP- variable- ping test either failed with 100% packets lost or successful with 0% packets lost
Cisco side:
Cisco WAN- pfSense WAN IP- ping test successfull 0% packets lost
Cisco LAN- pfSense LAN IP- variable- ping test either failed with 100% packets lost or successful with 0% packets lost, or partial 25%/75% packets lost
Do I miss any firewall rules?
What should I do next?
11-17-2017 05:47 PM
08-23-2022 08:41 AM
Hello Nasolsi1, can you help me, i have the same problem but my Encryption Algorithm is AES
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide