initial connect entires
ubnt@ubnt:~$ sudo ipsec up peer-sombody.no-ip.org-tunnel-1 initiating Main Mode IKE_SA peer-sombody.no-ip.org-tunnel-1[3] to their.ip.xx generating ID_PROT request 0 [ SA V V V V ] sending packet: from my.ip.xx[500] to their.ip.xx[500] (156 bytes) received packet: from their.ip.xx[500] to my.ip.xx[500] (128 bytes) parsed ID_PROT response 0 [ SA V V ] received NAT-T (RFC 3947) vendor ID received FRAGMENTATION vendor ID generating ID_PROT request 0 [ KE No NAT-D NAT-D ] sending packet: from my.ip.xx[500] to their.ip.xx[500] (244 bytes) received packet: from their.ip.xx[500] to my.ip.xx[500] (304 bytes) parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ] received Cisco Unity vendor ID received XAuth vendor ID received unknown vendor ID: 72:12:45:76:1f:53:9c:74:5a:85:47:9b:1c:03:c2:2e received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00 generating ID_PROT request 0 [ ID HASH ] sending packet: from my.ip.xx[500] to their.ip.xx[500] (76 bytes) received packet: from their.ip.xx[500] to my.ip.xx[500] (92 bytes) parsed ID_PROT response 0 [ ID HASH V ] received DPD vendor ID IKE_SA peer-sombody.no-ip.org-tunnel-1[3] established between my.ip.xx[my.ip.xx]...their.ip.xx[their.ip.xx] scheduling reauthentication in 28070s maximum IKE_SA lifetime 28610s generating QUICK_MODE request 2767369791 [ HASH SA No ID ID ] sending packet: from my.ip.xx[500] to their.ip.xx[500] (172 bytes) received packet: from their.ip.xx[500] to my.ip.xx[500] (188 bytes) parsed QUICK_MODE response 2767369791 [ HASH SA No ID ID N((24576)) ] connection 'peer-sombody.no-ip.org-tunnel-1' established successfully