I had managed to set up a VPN connection with my Android Tablet using L2TP/IPSec previously. The initial problem was how the password was being sent over. This issue was fixed, but now I am faced with another problem.
When connecting, I get as far as #78: IPsec SA established {ESP=>0x04e19e67
2011:07:20-11:55:27 ASTARO pluto[4950]: packet from 74.X.X.X:49046: received Vendor ID payload [RFC 3947]
2011:07:20-11:55:27 ASTARO pluto[4950]: packet from 74.X.X.X:49046: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2011:07:20-11:55:27 ASTARO pluto[4950]: packet from 74.X.X.X:49046: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2011:07:20-11:55:27 ASTARO pluto[4950]: packet from 74.X.X.X:49046: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2011:07:20-11:55:27 ASTARO pluto[4950]: packet from 74.X.X.X:49046: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2011:07:20-11:55:27 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[55] 74.X.X.X:49046 #75: responding to Main Mode from unknown peer 74.X.X.X:49046
2011:07:20-11:55:27 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[55] 74.X.X.X:49046 #75: NAT-Traversal: Result using RFC 3947: peer is NATed
2011:07:20-11:55:27 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[55] 74.X.X.X:49046 #75: Peer ID is ID_IPV4_ADDR: '192.168.19.6'
2011:07:20-11:55:27 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[56] 74.X.X.X:49046 #75: deleting connection "S_REF_ItiSrGkIxh" instance with peer 74.X.X.X {isakmp=#0/ipsec=#0}
2011:07:20-11:55:27 ASTARO pluto[4950]: | NAT-T: new mapping 74.X.X.X:49046/60984)
2011:07:20-11:55:27 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[56] 74.X.X.X:60984 #75: sent MR3, ISAKMP SA established
2011:07:20-11:55:27 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[56] 74.X.X.X:60984 #75: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2011:07:20-11:55:29 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #76: responding to Quick Mode
2011:07:20-11:55:29 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #76: IPsec SA established {ESP=>0x02b1171b
After running this test, I went for lunch and found this additional log information:
2011:07:20-12:50:59 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #89: initiating Quick Mode PSK+ENCRYPT+DONTREKEY to replace #76 {using isakmp#75}
2011:07:20-12:52:09 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #89: max number of retransmissions (2) reached STATE_QUICK_I1
2011:07:20-12:52:09 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #89: starting keying attempt 2 of at most 3
2011:07:20-12:52:09 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #90: initiating Quick Mode PSK+ENCRYPT+DONTREKEY to replace #89 {using isakmp#75}
2011:07:20-12:53:19 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #90: max number of retransmissions (2) reached STATE_QUICK_I1
2011:07:20-12:53:19 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #90: starting keying attempt 3 of at most 3
2011:07:20-12:53:19 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #91: initiating Quick Mode PSK+ENCRYPT+DONTREKEY to replace #90 {using isakmp#75}
2011:07:20-12:54:29 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #91: max number of retransmissions (2) reached STATE_QUICK_I1
2011:07:20-12:55:29 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984 #76: IPsec SA expired (--dontrekey)
2011:07:20-12:55:29 ASTARO pluto[4950]: "S_REF_ItiSrGkIxh"[19] 74.X.X.X:60984: deleting connection "S_REF_ItiSrGkIxh" instance with peer 74.X.X.X {isakmp=#0/ipsec=#0}
As you can see, this is almost a fill hour after the initial connection request.
Does anybody have idea what is happening? I doubt Astaro is the faulting party since I am able to connect from other devices.
Thank you for your time!