I updated to firmware version 9.113001 last night
Now the Site to Site VPN using IPSec is not working
In the logs i am seeing UDP 500 is getting dropped
I have edited the IP in the log to 137.117.***.***:
The VPN dropped at 10:55 today.
![]()
014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: initiating Main Mode
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Vendor ID payload [RFC 3947]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [FRAGMENTATION]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [IKE CGA version 1]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: enabling possible NAT-traversal with method 3
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: NAT-Traversal: Result using RFC 3947: i am NATed
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: Peer ID is ID_IPV4_ADDR: '137.117.***.***'
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ISAKMP SA established
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#414}
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: sent QI2, IPsec SA established {ESP=>0x63e2d568 <0x7d5dfdc6 NATOA=0.0.0.0}
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: sending encrypted notification INVALID_PAYLOAD_TYPE to 137.117.***.***:4500
2014:07:09-09:14:56 vpn-0 pluto[6012]: packet from 137.117.***.***:4500: Informational Exchange is for an unknown (expired?) SA
2014:07:09-10:01:19 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #415 {using isakmp#414}
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: sent QI2, IPsec SA established {ESP=>0x2977f5ba <0x0efa2ef4 NATOA=0.0.0.0}
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: sending encrypted notification INVALID_PAYLOAD_TYPE to 137.117.***.***:4500
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Delete SA(0x63e2d568) payload: deleting IPSEC State #415
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #416 {using isakmp#414}
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: sent QI2, IPsec SA established {ESP=>0xc2491e3a <0x48fa4030 NATOA=0.0.0.0}
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: sending encrypted notification INVALID_PAYLOAD_TYPE to 137.117.***.***:4500
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Delete SA(0x2977f5ba) payload: deleting IPSEC State #416
2014:07:09-10:55:04 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Delete SA payload: replace IPSEC State #417 in 10 seconds
2014:07:09-10:55:14 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #418: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #417 {using isakmp#414}
2014:07:09-10:55:15 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #418: sendto on eth0 to 137.117.***.***:4500 failed in quick_outI1. Errno 1: Operation not permitted
*2014:07:09-10:55:25 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: IPsec SA expired (LATEST!)
2014:07:09-10:55:25 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #417: sendto on eth0 to 137.117.***.***:4500 failed in delete notify. Errno 1: Operation not permitted
2014:07:09-10:55:25 vpn-0 pluto[6012]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitAzureVpn" address="10.1.1.1" local_net="10.1.0.0/21" remote_net="10.1.8.0/21"
2014:07:09-10:55:25 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #418: sendto on eth0 to 137.117.***.***:4500 failed in EVENT_RETRANSMIT. Errno 1: Operation not permitted
2014:07:09-10:55:45 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #418: sendto on eth0 to 137.117.***.***:4500 failed in EVENT_RETRANSMIT. Errno 1: Operation not permitted
Now the Site to Site VPN using IPSec is not working
In the logs i am seeing UDP 500 is getting dropped
I have edited the IP in the log to 137.117.***.***:
The VPN dropped at 10:55 today.

014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: initiating Main Mode
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Vendor ID payload [RFC 3947]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [FRAGMENTATION]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ignoring Vendor ID payload [IKE CGA version 1]
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: enabling possible NAT-traversal with method 3
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: NAT-Traversal: Result using RFC 3947: i am NATed
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: Peer ID is ID_IPV4_ADDR: '137.117.***.***'
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: ISAKMP SA established
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#414}
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: sent QI2, IPsec SA established {ESP=>0x63e2d568 <0x7d5dfdc6 NATOA=0.0.0.0}
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014:07:09-09:14:56 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #415: sending encrypted notification INVALID_PAYLOAD_TYPE to 137.117.***.***:4500
2014:07:09-09:14:56 vpn-0 pluto[6012]: packet from 137.117.***.***:4500: Informational Exchange is for an unknown (expired?) SA
2014:07:09-10:01:19 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #415 {using isakmp#414}
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: sent QI2, IPsec SA established {ESP=>0x2977f5ba <0x0efa2ef4 NATOA=0.0.0.0}
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #416: sending encrypted notification INVALID_PAYLOAD_TYPE to 137.117.***.***:4500
2014:07:09-10:01:20 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Delete SA(0x63e2d568) payload: deleting IPSEC State #415
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #416 {using isakmp#414}
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: sent QI2, IPsec SA established {ESP=>0xc2491e3a <0x48fa4030 NATOA=0.0.0.0}
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: IKE message has the Commit Flag set but Pluto doesn't implement this feature; ignoring flag
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: message ignored because it contains an unexpected payload type (ISAKMP_NEXT_HASH)
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: sending encrypted notification INVALID_PAYLOAD_TYPE to 137.117.***.***:4500
2014:07:09-10:43:47 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Delete SA(0x2977f5ba) payload: deleting IPSEC State #416
2014:07:09-10:55:04 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #414: received Delete SA payload: replace IPSEC State #417 in 10 seconds
2014:07:09-10:55:14 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #418: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP to replace #417 {using isakmp#414}
2014:07:09-10:55:15 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #418: sendto on eth0 to 137.117.***.***:4500 failed in quick_outI1. Errno 1: Operation not permitted
*2014:07:09-10:55:25 vpn-0 pluto[6012]: "S_REF_IpsSitAzureVpn_1" #417: IPsec SA expired (LATEST!)
2014:07:09-10:55:25 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #417: sendto on eth0 to 137.117.***.***:4500 failed in delete notify. Errno 1: Operation not permitted
2014:07:09-10:55:25 vpn-0 pluto[6012]: id="2204" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN down" variant="ipsec" connection="REF_IpsSitAzureVpn" address="10.1.1.1" local_net="10.1.0.0/21" remote_net="10.1.8.0/21"
2014:07:09-10:55:25 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #418: sendto on eth0 to 137.117.***.***:4500 failed in EVENT_RETRANSMIT. Errno 1: Operation not permitted
2014:07:09-10:55:45 vpn-0 pluto[6012]: ERROR: "S_REF_IpsSitAzureVpn_1" #418: sendto on eth0 to 137.117.***.***:4500 failed in EVENT_RETRANSMIT. Errno 1: Operation not permitted