2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: received Vendor ID payload [RFC 3947] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [4df37928e9fc4fd1b3262170d515c662] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: received Vendor ID payload [XAUTH] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [Cisco-Unity] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: ignoring Vendor ID payload [FRAGMENTATION 80000000] 2013:06:08-07:00:32 post pluto[7209]: packet from 166.137.144.151:54042: received Vendor ID payload [Dead Peer Detection] 2013:06:08-07:00:32 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: responding to Main Mode from unknown peer 166.137.144.151:54042 2013:06:08-07:00:32 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: NAT-Traversal: Result using RFC 3947: peer is NATed 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: ignoring informational payload, type IPSEC_INITIAL_CONTACT 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: Peer ID is ID_DER_ASN1_DN: 'C=us, L=Oklahoma City, O=OurDomain, CN=le maistre, E=MAccount@OurDomain.com' 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: crl not found 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: certificate status unknown 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: deleting connection "D_for astaro to Internal (Network)"[2] instance with peer 166.137.144.151 {isakmp=#0/ipsec=#0} 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: we have a cert and are sending it 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:54042 #39: Dead Peer Detection (RFC 3706) enabled 2013:06:08-07:00:33 post pluto[7209]: | NAT-T: new mapping 166.137.144.151:54042/47829) 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: sent MR3, ISAKMP SA established 2013:06:08-07:00:33 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: sending XAUTH request 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: parsing XAUTH reply 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: extended authentication was successful 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: sending XAUTH status 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: parsing XAUTH ack 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: received XAUTH ack, established 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: parsing ModeCfg request 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: unknown attribute type (28683) 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: peer requested virtual IP %any 2013:06:08-07:00:34 post pluto[7209]: acquired new lease for address 10.242.5.2 in pool 'VPN Pool (Cisco)' 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: assigning virtual IP 10.242.5.2 to peer 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: sending ModeCfg reply 2013:06:08-07:00:34 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #39: sent ModeCfg reply, established 2013:06:08-07:00:35 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #40: responding to Quick Mode 2013:06:08-07:00:35 post pluto[7209]: id="2201" severity="info" sys="SecureNet" sub="vpn" event="Connection started" username="MyAccount" variant="ipsec" srcip="166.137.144.151" virtual_ip="10.242.5.2" 2013:06:08-07:00:36 post pluto[7209]: "D_for astaro to Internal (Network)"[2] 166.137.144.151:47829 #40: IPsec SA established {ESP=>0x063cad8f <0xeb9df92b NATOA=0.0.0.0 DPD}