Jun 16 18:13:28 racoon: [Self]: INFO: IPsec-SA established: ESP 68.109.226.37[500]->174.231.68.139[500] spi=44713849(0x2aa4779) Jun 16 18:13:28 racoon: [Self]: INFO: IPsec-SA established: ESP 68.109.226.37[500]->174.231.68.139[500] spi=49539060(0x2f3e7f4) Jun 16 18:13:28 racoon: INFO: Adjusting peer's encmode UDP-Tunnel(3)->Tunnel(1) Jun 16 18:13:28 racoon: INFO: Adjusting my encmode UDP-Tunnel->Tunnel Jun 16 18:13:28 racoon: INFO: Update the generated policy : 10.123.13.1/32[0] 10.123.12.0/24[0] proto=any dir=in Jun 16 18:13:28 racoon: [Self]: INFO: respond new phase 2 negotiation: 68.109.226.37[4500]<=>174.231.68.139[64636] Jun 16 18:13:27 racoon: WARNING: Ignored attribute 28683 Jun 16 18:13:27 racoon: WARNING: Ignored attribute INTERNAL_ADDRESS_EXPIRY Jun 16 18:13:27 racoon: INFO: login succeeded for user "rmh1" Jun 16 18:13:27 racoon: INFO: Using port 0 Jun 16 18:13:26 racoon: [Self]: INFO: ISAKMP-SA established 68.109.226.37[4500]-174.231.68.139[64636] spi:bb8359d6e0e4afe3:31710d0f0a1cc37a Jun 16 18:13:26 racoon: INFO: Sending Xauth request Jun 16 18:13:26 racoon: INFO: NAT detected: ME PEER Jun 16 18:13:26 racoon: [174.231.68.139] ERROR: notification INITIAL-CONTACT received in aggressive exchange. Jun 16 18:13:26 racoon: INFO: NAT-D payload #1 doesn't match Jun 16 18:13:26 racoon: INFO: NAT-D payload #0 doesn't match Jun 16 18:13:26 racoon: [Self]: INFO: NAT-T: ports changed to: 174.231.68.139[64636]<->68.109.226.37[4500] Jun 16 18:13:26 racoon: INFO: Adding xauth VID payload. Jun 16 18:13:26 racoon: [Self]: [68.109.226.37] INFO: Hashing 68.109.226.37[500] with algo #2 (NAT-T forced) Jun 16 18:13:26 racoon: [174.231.68.139] INFO: Hashing 174.231.68.139[22508] with algo #2 (NAT-T forced) Jun 16 18:13:26 racoon: INFO: Adding remote and local NAT-D payloads. Jun 16 18:13:26 racoon: [174.231.68.139] INFO: Selected NAT-T version: RFC 3947 Jun 16 18:13:26 racoon: INFO: received Vendor ID: DPD Jun 16 18:13:26 racoon: INFO: received Vendor ID: CISCO-UNITY Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-04 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-05 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-06 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-07 Jun 16 18:13:26 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-08 Jun 16 18:13:26 racoon: INFO: received Vendor ID: RFC 3947 Jun 16 18:13:26 racoon: INFO: received broken Microsoft ID: FRAGMENTATION Jun 16 18:13:26 racoon: INFO: begin Aggressive mode. Jun 16 18:13:26 racoon: [Self]: INFO: respond new phase 1 negotiation: 68.109.226.37[500]<=>174.231.68.139[22508]