So it seems I cannot reconnect to the VPN I have after a disconnect (accidental or purposeful).
I have the same thing happen from my laptop and my iPhone, and others have t happening from their Android devices. Thanks for the help! My logs: Last 500 IPsec log entries Jul 27 21:31:14 charon: 06[NET] <con1|12> sending packet: from firewall_IP[4500] to remote_IP[33561] (172 bytes) Jul 27 21:31:14 charon: 06[ENC] <con1|12> generating TRANSACTION response 1229877425 [ HASH CPRP(ADDR SUBNET DNS DNS DNS DNS U_SPLITINC U_DEFDOM U_SPLITDNS U_SAVEPWD) ] Jul 27 21:31:14 charon: 06[IKE] <con1|12> assigning virtual IP 10.51.100.1 to peer 'ryan.coleman' Jul 27 21:31:14 charon: 06[IKE] <con1|12> assigning virtual IP 10.51.100.1 to peer 'ryan.coleman' Jul 27 21:31:14 charon: 06[CFG] <con1|12> reassigning offline lease to 'ryan.coleman' Jul 27 21:31:14 charon: 06[IKE] <con1|12> peer requested virtual IP %any Jul 27 21:31:14 charon: 06[IKE] <con1|12> peer requested virtual IP %any Jul 27 21:31:14 charon: 06[ENC] <con1|12> parsed TRANSACTION request 1229877425 [ HASH CPRQ(ADDR MASK DNS NBNS EXP VER U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN U_PFS U_SAVEPWD U_FWTYPE U_BKPSRV (28683)) ] Jul 27 21:31:14 charon: 06[ENC] <con1|12> unknown attribute type (28683) Jul 27 21:31:14 charon: 06[NET] <con1|12> received packet: from remote_IP[33561] to firewall_IP[4500] (172 bytes) Jul 27 21:31:14 charon: 12[IKE] <con1|12> maximum IKE_SA lifetime -368s Jul 27 21:31:14 charon: 12[IKE] <con1|12> maximum IKE_SA lifetime -368s Jul 27 21:31:14 charon: 12[IKE] <con1|12> scheduling reauthentication in -908s Jul 27 21:31:14 charon: 12[IKE] <con1|12> scheduling reauthentication in -908s Jul 27 21:31:14 charon: 12[IKE] <con1|12> IKE_SA con1[12] established between firewall_IP[firewall_IP]...remote_IP[VPN_group_name] Jul 27 21:31:14 charon: 12[IKE] <con1|12> IKE_SA con1[12] established between firewall_IP[firewall_IP]...remote_IP[VPN_group_name] Jul 27 21:31:14 charon: 12[ENC] <con1|12> parsed TRANSACTION response 926381044 [ HASH CPA(X_STATUS) ] Jul 27 21:31:14 charon: 12[NET] <con1|12> received packet: from remote_IP[33561] to firewall_IP[4500] (76 bytes) Jul 27 21:31:14 charon: 12[NET] <con1|12> sending packet: from firewall_IP[4500] to remote_IP[33561] (76 bytes) Jul 27 21:31:14 charon: 12[ENC] <con1|12> generating TRANSACTION request 926381044 [ HASH CPS(X_STATUS) ] Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth authentication of 'ryan.coleman' successful Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth authentication of 'ryan.coleman' successful Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth-SCRIPT succeeded for user 'ryan.coleman'. Jul 27 21:31:14 charon: 12[IKE] <con1|12> XAuth-SCRIPT succeeded for user 'ryan.coleman'. Jul 27 21:31:14 charon: user 'ryan.coleman' authenticated Jul 27 21:31:14 charon: 12[ENC] <con1|12> parsed TRANSACTION response 547554324 [ HASH CPRP(X_USER X_PWD) ] Jul 27 21:31:14 charon: 12[NET] <con1|12> received packet: from remote_IP[33561] to firewall_IP[4500] (92 bytes) Jul 27 21:31:14 charon: 12[NET] <con1|12> sending packet: from firewall_IP[4500] to remote_IP[33561] (76 bytes) Jul 27 21:31:14 charon: 12[ENC] <con1|12> generating TRANSACTION request 547554324 [ HASH CPRQ(X_USER X_PWD) ] Jul 27 21:31:14 charon: 12[IKE] <con1|12> remote host is behind NAT Jul 27 21:31:14 charon: 12[IKE] <con1|12> remote host is behind NAT Jul 27 21:31:14 charon: 12[ENC] <con1|12> parsed AGGRESSIVE request 0 [ HASH NAT-D NAT-D N(INITIAL_CONTACT) ] Jul 27 21:31:14 charon: 12[NET] <con1|12> received packet: from remote_IP[33561] to firewall_IP[4500] (140 bytes) Jul 27 21:31:14 charon: 14[NET] <con1|12> sending packet: from firewall_IP[500] to remote_IP[500] (432 bytes) Jul 27 21:31:14 charon: 14[ENC] <con1|12> generating AGGRESSIVE response 0 [ SA KE No ID NAT-D NAT-D HASH V V V V V ] Jul 27 21:31:14 charon: 14[CFG] <12> selected peer config "con1" Jul 27 21:31:14 charon: 14[CFG] <12> looking for XAuthInitPSK peer configs matching firewall_IP...remote_IP[VPN_group_name] Jul 27 21:31:14 charon: 14[IKE] <12> remote_IP is initiating a Aggressive Mode IKE_SA Jul 27 21:31:14 charon: 14[IKE] <12> remote_IP is initiating a Aggressive Mode IKE_SA Jul 27 21:31:14 charon: 14[IKE] <12> received DPD vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received DPD vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received Cisco Unity vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received Cisco Unity vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received XAuth vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received XAuth vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-02 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-03 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-03 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-04 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-04 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-05 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-05 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-06 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-06 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-07 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-07 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-08 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike-08 vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received draft-ietf-ipsec-nat-t-ike vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received NAT-T (RFC 3947) vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received NAT-T (RFC 3947) vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received FRAGMENTATION vendor ID Jul 27 21:31:14 charon: 14[IKE] <12> received FRAGMENTATION vendor ID Jul 27 21:31:14 charon: 14[ENC] <12> parsed AGGRESSIVE request 0 [ SA KE No ID V V V V V V V V V V V V V V ] _______________________________________________ pfSense mailing list https://lists.pfsense.org/mailman/listinfo/list Support the project with Gold! https://pfsense.org/gold
