Below is the log from each time the Droid tries to connect from it's L2TP/IPsec PreShared Key profile.
2010:01:23-17:14:03 firewall pluto[29764]: packet from ***.***.***.xx1:500: received Vendor ID payload [RFC 3947]
2010:01:23-17:14:03 firewall pluto[29764]: packet from ***.***.***.xx1:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2010:01:23-17:14:03 firewall pluto[29764]: packet from ***.***.***.xx1:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2010:01:23-17:14:03 firewall pluto[29764]: packet from ***.***.***.xx1:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2010:01:23-17:14:03 firewall pluto[29764]: packet from ***.***.***.xx1:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2010:01:23-17:14:03 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #98: responding to Main Mode from unknown peer ***.***.***.xx1
2010:01:23-17:14:04 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #98: NAT-Traversal: Result using RFC 3947: no NAT detected
2010:01:23-17:14:04 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #98: Peer ID is ID_IPV4_ADDR: '***.***.***.xx1'
2010:01:23-17:14:04 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #98: sent MR3, ISAKMP SA established
2010:01:23-17:14:04 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #98: ignoring informational payload, type IPSEC_INITIAL_CONTACT
2010:01:23-17:14:05 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #99: responding to Quick Mode
2010:01:23-17:14:05 firewall pluto[29764]: "S_REF_TcEYhcYEqO"[2] ***.***.***.xx1 #99: IPsec SA established {ESP=>0x045b6b2e
This thread was automatically locked due to age.