I am trying to connect to a Sophos XG L2TP VPN from an android device however the VPN will not connect. I have connected to the sophos console and run the command show vpn L2TP-logs which results in the following:
Jun 30 20:21:07 packet from 149.254.56.18:887: received Vendor ID payload [RFC 3947] method set to=1
10
Jun 30 20:21:07 packet from 149.254.56.18:887: received Vendor ID payload [draft-ietf-ipsec-nat-t-ik
e-02] meth=107, but already using method 110
Jun 30 20:21:07 packet from 149.254.56.18:887: received Vendor ID payload [draft-ietf-ipsec-nat-t-ik
e-02_n] meth=106, but already using method 110
Jun 30 20:21:07 packet from 149.254.56.18:887: received Vendor ID payload [draft-ietf-ipsec-nat-t-ik
e-00]
Jun 30 20:21:07 packet from 149.254.56.18:887: ignoring Vendor ID payload [FRAGMENTATION 80000000]
Jun 30 20:21:07 packet from 149.254.56.18:887: received Vendor ID payload [Dead Peer Detection]
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: responding to Main Mode from unknown peer 149.254.56
.18
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: Oakley Transform [OAKLEY_AES_CBC (256), OAKLEY_SHA2_
256, OAKLEY_GROUP_MODP1024] refused due to strict flag
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: Oakley Transform [OAKLEY_AES_CBC (256), OAKLEY_SHA1,
OAKLEY_GROUP_MODP1024] refused due to strict flag
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: Oakley Transform [OAKLEY_AES_CBC (256), OAKLEY_MD5,
OAKLEY_GROUP_MODP1024] refused due to strict flag
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: Oakley Transform [OAKLEY_AES_CBC (128), OAKLEY_SHA2_
256, OAKLEY_GROUP_MODP1024] refused due to strict flag
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: Oakley Transform [OAKLEY_AES_CBC (128), OAKLEY_SHA1,
OAKLEY_GROUP_MODP1024] refused due to strict flag
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: transition from state STATE_MAIN_R0 to state STATE_M
AIN_R1
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: STATE_MAIN_R1: sent MR1, expecting MI2
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: NAT-Traversal: Result using RFC 3947 (NAT-Traversal)
: both are NATed
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: transition from state STATE_MAIN_R1 to state STATE_M
AIN_R2
Jun 30 20:21:07 "l2tp_vpn"[7] 149.254.56.18 #8: STATE_MAIN_R2: sent MR2, expecting MI3
Jun 30 20:22:17 "l2tp_vpn"[7] 149.254.56.18 #8: max number of retransmissions (2) reached STATE_MAIN
_R2
Jun 30 20:22:17 "l2tp_vpn"[7] 149.254.56.18: deleting connection "l2tp_vpn" instance with peer 149.2
54.56.18 {isakmp=#0/ipsec=#0}
Any idea what is going on?
This thread was automatically locked due to age.