So it seems I cannot reconnect to the VPN I have after a disconnect (accidental 
or purposeful).

I have the same thing happen from my laptop and my iPhone, and others have t 
happening from their Android devices.

Thanks for the help!

My logs:

Last 500 IPsec log entries
Jul 27 21:31:14 charon: 06[NET] <con1|12> sending packet: from 
firewall_IP[4500] to remote_IP[33561] (172 bytes)
Jul 27 21:31:14 charon: 06[ENC] <con1|12> generating TRANSACTION response 
1229877425 [ HASH CPRP(ADDR SUBNET DNS DNS DNS DNS U_SPLITINC U_DEFDOM 
U_SPLITDNS U_SAVEPWD) ]
Jul 27 21:31:14 charon: 06[IKE] <con1|12> assigning virtual IP 10.51.100.1 to 
peer 'ryan.coleman'
Jul 27 21:31:14 charon: 06[IKE] <con1|12> assigning virtual IP 10.51.100.1 to 
peer 'ryan.coleman'
Jul 27 21:31:14 charon: 06[CFG] <con1|12> reassigning offline lease to 
'ryan.coleman'
Jul 27 21:31:14 charon: 06[IKE] <con1|12> peer requested virtual IP %any
Jul 27 21:31:14 charon: 06[IKE] <con1|12> peer requested virtual IP %any
Jul 27 21:31:14 charon: 06[ENC] <con1|12> parsed TRANSACTION request 1229877425 
[ HASH CPRQ(ADDR MASK DNS NBNS EXP VER U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC 
U_LOCALLAN U_PFS U_SAVEPWD U_FWTYPE U_BKPSRV (28683)) ]
Jul 27 21:31:14 charon: 06[ENC] <con1|12> unknown attribute type (28683)
Jul 27 21:31:14 charon: 06[NET] <con1|12> received packet: from 
remote_IP[33561] to firewall_IP[4500] (172 bytes)
Jul 27 21:31:14 charon: 12[IKE] <con1|12> maximum IKE_SA lifetime -368s
Jul 27 21:31:14 charon: 12[IKE] <con1|12> maximum IKE_SA lifetime -368s
Jul 27 21:31:14 charon: 12[IKE] <con1|12> scheduling reauthentication in -908s
Jul 27 21:31:14 charon: 12[IKE] <con1|12> scheduling reauthentication in -908s
Jul 27 21:31:14 charon: 12[IKE] <con1|12> IKE_SA con1[12] established between 
firewall_IP[firewall_IP]...remote_IP[VPN_group_name]
Jul 27 21:31:14 charon: 12[IKE] <con1|12> IKE_SA con1[12] established between 
firewall_IP[firewall_IP]...remote_IP[VPN_group_name]
Jul 27 21:31:14 charon: 12[ENC] <con1|12> parsed TRANSACTION response 926381044 
[ HASH CPA(X_STATUS) ]
Jul 27 21:31:14 charon: 12[NET] <con1|12> received packet: from 
remote_IP[33561] to firewall_IP[4500] (76 bytes)
Jul 27 21:31:14 charon: 12[NET] <con1|12> sending packet: from 
firewall_IP[4500] to remote_IP[33561] (76 bytes)
Jul 27 21:31:14 charon: 12[ENC] <con1|12> generating TRANSACTION request 
926381044 [ HASH CPS(X_STATUS) ]
Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth authentication of 
'ryan.coleman' successful
Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth authentication of 
'ryan.coleman' successful
Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth-SCRIPT succeeded for user 
'ryan.coleman'.
Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth-SCRIPT succeeded for user 
'ryan.coleman'.
Jul 27 21:31:14 charon: user 'ryan.coleman' authenticated
Jul 27 21:31:14 charon: 12[ENC] <con1|12> parsed TRANSACTION response 547554324 
[ HASH CPRP(X_USER X_PWD) ]
Jul 27 21:31:14 charon: 12[NET] <con1|12> received packet: from 
remote_IP[33561] to firewall_IP[4500] (92 bytes)
Jul 27 21:31:14 charon: 12[NET] <con1|12> sending packet: from 
firewall_IP[4500] to remote_IP[33561] (76 bytes)
Jul 27 21:31:14 charon: 12[ENC] <con1|12> generating TRANSACTION request 
547554324 [ HASH CPRQ(X_USER X_PWD) ]
Jul 27 21:31:14 charon: 12[IKE] <con1|12> remote host is behind NAT
Jul 27 21:31:14 charon: 12[IKE] <con1|12> remote host is behind NAT
Jul 27 21:31:14 charon: 12[ENC] <con1|12> parsed AGGRESSIVE request 0 [ HASH 
NAT-D NAT-D N(INITIAL_CONTACT) ]
Jul 27 21:31:14 charon: 12[NET] <con1|12> received packet: from 
remote_IP[33561] to firewall_IP[4500] (140 bytes)
Jul 27 21:31:14 charon: 14[NET] <con1|12> sending packet: from firewall_IP[500] 
to remote_IP[500] (432 bytes)
Jul 27 21:31:14 charon: 14[ENC] <con1|12> generating AGGRESSIVE response 0 [ SA 
KE No ID NAT-D NAT-D HASH V V V V V ]
Jul 27 21:31:14 charon: 14[CFG] <12> selected peer config "con1"
Jul 27 21:31:14 charon: 14[CFG] <12> looking for XAuthInitPSK peer configs 
matching firewall_IP...remote_IP[VPN_group_name]
Jul 27 21:31:14 charon: 14[IKE] <12> remote_IP is initiating a Aggressive Mode 
IKE_SA
Jul 27 21:31:14 charon: 14[IKE] <12> remote_IP is initiating a Aggressive Mode 
IKE_SA
Jul 27 21:31:14 charon: 14[IKE] <12> received DPD vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received DPD vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received Cisco Unity vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received Cisco Unity vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received XAuth vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received XAuth vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02\n 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02\n 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-03 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-03 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-04 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-04 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-05 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-05 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-06 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-06 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-07 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-07 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-08 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-08 
vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike vendor 
ID
Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike vendor 
ID
Jul 27 21:31:14 charon: 14[IKE] <12> received NAT-T (RFC 3947) vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received NAT-T (RFC 3947) vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received FRAGMENTATION vendor ID
Jul 27 21:31:14 charon: 14[IKE] <12> received FRAGMENTATION vendor ID
Jul 27 21:31:14 charon: 14[ENC] <12> parsed AGGRESSIVE request 0 [ SA KE No ID 
V V V V V V V V V V V V V V ]
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Reply via email to