Oct 30 18:54:05 vpnserver pluto[20378]: "roadwarrior" #1: initiating Main Mode<br>Oct 30 18:55:15 vpnserver pluto[20378]: "roadwarrior" #1: max number of retransmissions (2) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message<br>
Oct 30 18:55:15 vpnserver pluto[20378]: "roadwarrior" #1: starting keying attempt 2 of at most 3, but releasing whack<br>Oct 30 18:55:15 vpnserver pluto[20378]: "roadwarrior" #2: initiating Main Mode to replace #1<br>
Oct 30 18:55:20 vpnserver pluto[20378]: packet from <a href="http://219.93.36.194:31764">219.93.36.194:31764</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]<br>Oct 30 18:55:20 vpnserver pluto[20378]: packet from <a href="http://219.93.36.194:31764">219.93.36.194:31764</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106 <br>
Oct 30 18:55:20 vpnserver pluto[20378]: packet from <a href="http://219.93.36.194:31764">219.93.36.194:31764</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108 <br>Oct 30 18:55:20 vpnserver pluto[20378]: packet from <a href="http://219.93.36.194:31764">219.93.36.194:31764</a>: received Vendor ID payload [RFC 3947] method set to=110 <br>
Oct 30 18:55:20 vpnserver pluto[20378]: packet from <a href="http://219.93.36.194:31764">219.93.36.194:31764</a>: received Vendor ID payload [Dead Peer Detection]<br>Oct 30 18:55:20 vpnserver pluto[20378]: packet from <a href="http://219.93.36.194:31764">219.93.36.194:31764</a>: initial Aggressive Mode message from <a href="http://219.93.36.194">219.93.36.194</a> but no (wildcard) connection has been configured<br>
Oct 30 18:56:25 vpnserver pluto[20378]: "roadwarrior" #2: max number of retransmissions (2) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message<br>Oct 30 18:56:25 vpnserver pluto[20378]: "roadwarrior" #2: starting keying attempt 3 of at most 3<br>
Oct 30 18:56:25 vpnserver pluto[20378]: "roadwarrior" #3: initiating Main Mode to replace #2<br><br>