IP sec negociation error

Hi

Trying to setup a site to site VPN and despite what I believe to be similar settings on both ends (Mikrotik to Zywall 110) the negociation fails.

04:47:41 ipsec,info initiate new phase 1 (Identity Protection): *.*.*.*[500]<=>*.*.*.*[500] 
04:47:41 ipsec,debug new cookie: 
04:47:41 ipsec,debug 774122eeae510ced 
04:47:41 ipsec,debug add payload of len 168, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 13 
04:47:41 ipsec,debug add payload of len 16, next type 0 
04:47:41 ipsec,debug 460 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:41 ipsec,debug 1 times of 460 bytes message will be sent to *.*.*.*[500] 
04:47:41 ipsec,debug,packet 774122ee ae510ced 00000000 00000000 01100200 00000000 000001cc 0d0000ac 
04:47:41 ipsec,debug,packet 00000001 00000001 000000a0 01010004 03000028 01010000 800b0001 000c0004 
04:47:41 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 8004000e 03000028 02010000 
04:47:41 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040002 
04:47:41 ipsec,debug,packet 03000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020002 
04:47:41 ipsec,debug,packet 8004000e 00000024 04010000 800b0001 000c0004 00015180 80010005 80030001 
04:47:41 ipsec,debug,packet 80020002 80040002 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 
04:47:41 ipsec,debug,packet 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 
04:47:41 ipsec,debug,packet eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d 
04:47:41 ipsec,debug,packet ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 
04:47:41 ipsec,debug,packet 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 
04:47:41 ipsec,debug,packet 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014 
04:47:41 ipsec,debug,packet 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 4485152d 18b6bbcd 0be8a846 
04:47:41 ipsec,debug,packet 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 
04:47:41 ipsec,debug,packet 68a1f1c9 6b8696fc 77570100 
04:47:41 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:0000000000000000 
04:47:41 ipsec,debug ===== received 260 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 01100200 00000000 00000104 0d000038 
04:47:41 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 000c0004 
04:47:41 ipsec,debug,packet 00015180 80010005 80030001 80020002 80040002 0d000014 f758f226 68750f03 
04:47:41 ipsec,debug,packet b08df6eb e1d00403 0d000012 afcad713 68a1f1c9 6b8696fc 77570d00 0014cd60 
04:47:41 ipsec,debug,packet 464335df 21f87cfd b2fc68b6 a4480d00 001490cb 80913ebb 696e0863 81b5ec42 
04:47:41 ipsec,debug,packet 7b1f0d00 00147d94 19a65310 ca6f2c17 9d921552 9d560d00 00144a13 1c810703 
04:47:41 ipsec,debug,packet 58455c57 28f20e95 452f0d00 0014afca d71368a1 f1c96b86 96fc7757 01000d00 
04:47:41 ipsec,debug,packet 0012afca d71368a1 f1c96b86 96fc7757 00000014 12f5f28c 457168a9 702d9fe2 
04:47:41 ipsec,debug,packet 74cc0100 
04:47:41 ipsec,debug begin. 
04:47:41 ipsec,debug seen nptype=1(sa) len=56 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug seen nptype=13(vid) len=18 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug seen nptype=13(vid) len=18 
04:47:41 ipsec,debug seen nptype=13(vid) len=20 
04:47:41 ipsec,debug succeed. 
04:47:41 ipsec,debug received unknown Vendor ID 
04:47:41 ipsec,debug f758f226 68750f03 b08df6eb e1d00403 
04:47:41 ipsec,debug received unknown Vendor ID 
04:47:41 ipsec,debug afcad713 68a1f1c9 6b8696fc 7757 
04:47:41 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
04:47:41 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n 
04:47:41 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 
04:47:41 ipsec received Vendor ID: RFC 3947 
04:47:41 ipsec received Vendor ID: DPD 
04:47:41 ipsec,debug remote supports DPD 
04:47:41 ipsec,debug received unknown Vendor ID 
04:47:41 ipsec,debug afcad713 68a1f1c9 6b8696fc 7757 
04:47:41 ipsec received Vendor ID: CISCO-UNITY 
04:47:41 ipsec *.*.*.* Selected NAT-T version: RFC 3947 
04:47:41 ipsec,debug total SA len=52 
04:47:41 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 000c0004 
04:47:41 ipsec,debug 00015180 80010005 80030001 80020002 80040002 
04:47:41 ipsec,debug begin. 
04:47:41 ipsec,debug seen nptype=2(prop) len=44 
04:47:41 ipsec,debug succeed. 
04:47:41 ipsec,debug proposal #1 len=44 
04:47:41 ipsec,debug begin. 
04:47:41 ipsec,debug seen nptype=3(trns) len=36 
04:47:41 ipsec,debug succeed. 
04:47:41 ipsec,debug transform #4 len=36 
04:47:41 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
04:47:41 ipsec,debug type=Life Duration, flag=0x0000, lorv=4 
04:47:41 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
04:47:41 ipsec,debug,packet encryption(3des) 
04:47:41 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
04:47:41 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
04:47:41 ipsec,debug dh(modp1024) 
04:47:41 ipsec,debug pair 1: 
04:47:41 ipsec,debug  0x4a23a0: next=(nil) tnext=(nil) 
04:47:41 ipsec,debug proposal #1: 1 transform 
04:47:41 ipsec,debug -checking with pre-shared key auth- 
04:47:41 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 
04:47:41 ipsec,debug trns#=4, trns-id=IKE 
04:47:41 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
04:47:41 ipsec,debug type=Life Duration, flag=0x0000, lorv=4 
04:47:41 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
04:47:41 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
04:47:41 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
04:47:41 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
04:47:41 ipsec,debug -compare proposal #1: Local:Peer 
04:47:41 ipsec,debug (lifetime = 86400:86400) 
04:47:41 ipsec,debug (lifebyte = 0:0) 
04:47:41 ipsec,debug enctype = AES-CBC:3DES-CBC 
04:47:41 ipsec,debug (encklen = 128:0) 
04:47:41 ipsec,debug hashtype = SHA:SHA 
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key 
04:47:41 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group 
04:47:41 ipsec,debug -compare proposal #2: Local:Peer 
04:47:41 ipsec,debug (lifetime = 86400:86400) 
04:47:41 ipsec,debug (lifebyte = 0:0) 
04:47:41 ipsec,debug enctype = AES-CBC:3DES-CBC 
04:47:41 ipsec,debug (encklen = 128:0) 
04:47:41 ipsec,debug hashtype = SHA:SHA 
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key 
04:47:41 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group 
04:47:41 ipsec,debug -compare proposal #3: Local:Peer 
04:47:41 ipsec,debug (lifetime = 86400:86400) 
04:47:41 ipsec,debug (lifebyte = 0:0) 
04:47:41 ipsec,debug enctype = 3DES-CBC:3DES-CBC 
04:47:41 ipsec,debug (encklen = 0:0) 
04:47:41 ipsec,debug hashtype = SHA:SHA 
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key 
04:47:41 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group 
04:47:41 ipsec,debug -compare proposal #4: Local:Peer 
04:47:41 ipsec,debug (lifetime = 86400:86400) 
04:47:41 ipsec,debug (lifebyte = 0:0) 
04:47:41 ipsec,debug enctype = 3DES-CBC:3DES-CBC 
04:47:41 ipsec,debug (encklen = 0:0) 
04:47:41 ipsec,debug hashtype = SHA:SHA 
04:47:41 ipsec,debug authmethod = pre-shared key:pre-shared key 
04:47:41 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group 
04:47:41 ipsec,debug -an acceptable proposal found- 
04:47:41 ipsec,debug dh(modp1024) 
04:47:41 ipsec,debug -agreed on pre-shared key auth- 
04:47:41 ipsec,debug === 
04:47:41 ipsec,debug dh(modp1024) 
04:47:41 ipsec,debug,packet compute DH's private. 
04:47:41 ipsec,debug,packet 6bf05d17 0dd9b0d8 d7da8ad2 0eaa61dc 167b994d 52433839 515f3bf1 ee87ee22 
04:47:41 ipsec,debug,packet 97f50239 042fd370 0fedcfac 6a5480ee f0b10586 5bfb18b4 4ab9b7a9 de2a99b8 
04:47:41 ipsec,debug,packet d5c9db64 43811bc5 7875233b 6a4468b0 d3b85e64 ae3f98c6 2a683208 91b2f19b 
04:47:41 ipsec,debug,packet eaa5815a 085f15df 27774dac 8bcf457d 7241f103 a3253222 6c5345f9 896be679 
04:47:41 ipsec,debug,packet compute DH's public. 
04:47:41 ipsec,debug,packet b1463674 132c0bf1 8c0277ae 56475cd5 7ddeb7d7 e0cbd768 4446970b aa792a6a 
04:47:41 ipsec,debug,packet c82c8fc2 c8782091 93629401 501cf0a9 21d83269 7a4a9338 abd08ecf 1b2ccb20 
04:47:41 ipsec,debug,packet 0421e784 9afbb23d e3d67855 6bb16322 d4afdf19 6dcf83c1 dd1aac3c 02653e58 
04:47:41 ipsec,debug,packet ccc108a4 f93ffc0c 1fc2cab0 63cc4a11 bd635137 b7aba85e ba33e121 ebb7d4a8 
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec Adding remote and local NAT-D payloads. 
04:47:41 ipsec,debug add payload of len 128, next type 10 
04:47:41 ipsec,debug add payload of len 24, next type 20 
04:47:41 ipsec,debug add payload of len 20, next type 20 
04:47:41 ipsec,debug add payload of len 20, next type 0 
04:47:41 ipsec,debug 236 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:41 ipsec,debug 1 times of 236 bytes message will be sent to *.*.*.*[500] 
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 04100200 00000000 000000ec 0a000084 
04:47:41 ipsec,debug,packet b1463674 132c0bf1 8c0277ae 56475cd5 7ddeb7d7 e0cbd768 4446970b aa792a6a 
04:47:41 ipsec,debug,packet c82c8fc2 c8782091 93629401 501cf0a9 21d83269 7a4a9338 abd08ecf 1b2ccb20 
04:47:41 ipsec,debug,packet 0421e784 9afbb23d e3d67855 6bb16322 d4afdf19 6dcf83c1 dd1aac3c 02653e58 
04:47:41 ipsec,debug,packet ccc108a4 f93ffc0c 1fc2cab0 63cc4a11 bd635137 b7aba85e ba33e121 ebb7d4a8 
04:47:41 ipsec,debug,packet 1400001c e9c55410 1d66046a 824d15b2 2f1bdf2d e3836fbe ebdf351e 14000018 
04:47:41 ipsec,debug,packet 48be2a0a b42ee115 0c0b736a 65cbfba6 22a503e5 00000018 50006dbb a0886b0c 
04:47:41 ipsec,debug,packet 5e288b75 15bf05cf 4d450da4 
04:47:41 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:47:41 ipsec,debug ===== received 228 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 04100200 00000000 000000e4 0a000084 
04:47:41 ipsec,debug,packet 21ed2c0a 7834dc3f a4f7006e e3b534fc e2a0b2da 14a19e71 697caef3 a59c69ca 
04:47:41 ipsec,debug,packet d5fc66db ae528b40 d9a432c5 049dbdc8 9792d99e b5c4f64c 23e86c6e 5ff058d2 
04:47:41 ipsec,debug,packet 34caf433 214bc942 7160f0dc 0a3433c6 81bce8bd 65cc62b6 47dac5f4 1c5d4e19 
04:47:41 ipsec,debug,packet e3077b88 afc90c19 9d9e7207 878ee7b3 02144673 ea3667d4 5d66d52d a61f27c7 
04:47:41 ipsec,debug,packet 14000014 6e0313d4 5470b7d4 31e426dc 5abf6afe 14000018 50006dbb a0886b0c 
04:47:41 ipsec,debug,packet 5e288b75 15bf05cf 4d450da4 00000018 48be2a0a b42ee115 0c0b736a 65cbfba6 
04:47:41 ipsec,debug,packet 22a503e5 
04:47:41 ipsec,debug begin. 
04:47:41 ipsec,debug seen nptype=4(ke) len=132 
04:47:41 ipsec,debug seen nptype=10(nonce) len=20 
04:47:41 ipsec,debug seen nptype=20(nat-d) len=24 
04:47:41 ipsec,debug seen nptype=20(nat-d) len=24 
04:47:41 ipsec,debug succeed. 
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec NAT-D payload #0 verified 
04:47:41 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec NAT-D payload #1 verified 
04:47:41 ipsec NAT not detected  
04:47:41 ipsec,debug === 
04:47:41 ipsec,debug dh(modp1024) 
04:47:41 ipsec,debug,packet compute DH's shared. 
04:47:41 ipsec,debug,packet 
04:47:41 ipsec,debug,packet 414985bc 23c0a861 fd1e6afb f703ded6 26656c4d 92cba0a2 5a36181c f437dcda 
04:47:41 ipsec,debug,packet 946ec9ac 62d980aa c8135621 51de2773 eccac719 139d48fb ab97eee5 a1daceb6 
04:47:41 ipsec,debug,packet 60e4d1be 353e9896 b3f37f75 39819487 5e73d88e 5681495f 78fbc001 74dc90a4 
04:47:41 ipsec,debug,packet 873e5ba4 c0c58b06 872a0a47 696ec6c1 71ebba07 2a72d5be 1d20be9e e8fb6f0b 
04:47:41 ipsec,debug nonce 1:  
04:47:41 ipsec,debug e9c55410 1d66046a 824d15b2 2f1bdf2d e3836fbe ebdf351e 
04:47:41 ipsec,debug nonce 2:  
04:47:41 ipsec,debug 6e0313d4 5470b7d4 31e426dc 5abf6afe 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug SKEYID computed: 
04:47:41 ipsec,debug d9f63d6b c0ba44d3 954c2010 2d65c077 91811d19 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug SKEYID_d computed: 
04:47:41 ipsec,debug cf965e37 2a60537e b8ddcc1c 2f725b26 8cfb950b 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug SKEYID_a computed: 
04:47:41 ipsec,debug bbb80bbf c6d432b9 4f0ad64a b151a2c0 1eaf839d 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug SKEYID_e computed: 
04:47:41 ipsec,debug d482415f d86268d8 3feec92c 4c3db984 744a99ad 
04:47:41 ipsec,debug,packet encryption(3des) 
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...) 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug compute intermediate encryption key K1 
04:47:41 ipsec,debug 00 
04:47:41 ipsec,debug 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug compute intermediate encryption key K2 
04:47:41 ipsec,debug 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e 
04:47:41 ipsec,debug f1b3a35f 7ce1a050 8126ad1b d45e5055 2bdfcb2f 
04:47:41 ipsec,debug final encryption key computed: 
04:47:41 ipsec,debug 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e f1b3a35f 
04:47:41 ipsec,debug hash(sha1) 
04:47:41 ipsec,debug,packet encryption(3des) 
04:47:41 ipsec,debug IV computed: 
04:47:41 ipsec,debug 6488ee21 ef768c51 
04:47:41 ipsec,debug use ID type of IPv4_address 
04:47:41 ipsec,debug,packet HASH with: 
04:47:41 ipsec,debug,packet b1463674 132c0bf1 8c0277ae 56475cd5 7ddeb7d7 e0cbd768 4446970b aa792a6a 
04:47:41 ipsec,debug,packet c82c8fc2 c8782091 93629401 501cf0a9 21d83269 7a4a9338 abd08ecf 1b2ccb20 
04:47:41 ipsec,debug,packet 0421e784 9afbb23d e3d67855 6bb16322 d4afdf19 6dcf83c1 dd1aac3c 02653e58 
04:47:41 ipsec,debug,packet ccc108a4 f93ffc0c 1fc2cab0 63cc4a11 bd635137 b7aba85e ba33e121 ebb7d4a8 
04:47:41 ipsec,debug,packet 21ed2c0a 7834dc3f a4f7006e e3b534fc e2a0b2da 14a19e71 697caef3 a59c69ca 
04:47:41 ipsec,debug,packet d5fc66db ae528b40 d9a432c5 049dbdc8 9792d99e b5c4f64c 23e86c6e 5ff058d2 
04:47:41 ipsec,debug,packet 34caf433 214bc942 7160f0dc 0a3433c6 81bce8bd 65cc62b6 47dac5f4 1c5d4e19 
04:47:41 ipsec,debug,packet e3077b88 afc90c19 9d9e7207 878ee7b3 02144673 ea3667d4 5d66d52d a61f27c7 
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 00000001 00000001 000000a0 01010004 
04:47:41 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 
04:47:41 ipsec,debug,packet 80020002 8004000e 03000028 02010000 800b0001 000c0004 00015180 80010007 
04:47:41 ipsec,debug,packet 800e0080 80030001 80020002 80040002 03000024 03010000 800b0001 000c0004 
04:47:41 ipsec,debug,packet 00015180 80010005 80030001 80020002 8004000e 00000024 04010000 800b0001 
04:47:41 ipsec,debug,packet 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 55c3eff1 
04:47:41 ipsec,debug,packet hmac(hmac_sha1) 
04:47:41 ipsec,debug,packet HASH computed: 
04:47:41 ipsec,debug,packet 905bece8 c9b89c9f abe6fba6 127a8c14 4ab2058a 
04:47:41 ipsec,debug add payload of len 8, next type 8 
04:47:41 ipsec,debug add payload of len 20, next type 0 
04:47:41 ipsec,debug,packet begin encryption. 
04:47:41 ipsec,debug,packet encryption(3des) 
04:47:41 ipsec,debug,packet pad length = 4 
04:47:41 ipsec,debug,packet 0800000c 011101f4 55c3eff1 00000018 905bece8 c9b89c9f abe6fba6 127a8c14 
04:47:41 ipsec,debug,packet 4ab2058a 751dd703 
04:47:41 ipsec,debug,packet encryption(3des) 
04:47:41 ipsec,debug,packet with key: 
04:47:41 ipsec,debug,packet 8e07e014 2175a0e5 c4e4a158 cebb1515 15b4d07e f1b3a35f 
04:47:41 ipsec,debug,packet encrypted payload by IV: 
04:47:41 ipsec,debug,packet 6488ee21 ef768c51 
04:47:41 ipsec,debug,packet save IV for next: 
04:47:41 ipsec,debug,packet 09fc4289 a7e70bb3 
04:47:41 ipsec,debug,packet encrypted. 
04:47:41 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:41 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6 
04:47:41 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289 
04:47:41 ipsec,debug,packet a7e70bb3 
04:47:41 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:47:41 ipsec,debug ===== received 173 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:41 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 0b100500 f3fe0dc3 000000ad 00000091 
04:47:41 ipsec,debug,packet 00000001 01100001 774122ee ae510ced 93bdab8b cd026b1c 800c0001 80030035 
04:47:41 ipsec,debug,packet 00030028 35f4dada bd8c63f9 ed719438 929913f7 3c7e7629 fae2e438 7c122903 
04:47:41 ipsec,debug,packet fa0b6e85 83a4795a 68990aaa 80050000 00060035 496e636f 72726563 74207072 
04:47:41 ipsec,debug,packet 652d7368 61726564 206b6579 2028496e 76616c69 64206e65 78742070 61796c6f 
04:47:41 ipsec,debug,packet 61642076 616c7565 29800800 00 
04:47:41 ipsec,debug receive Information. 
04:47:41 ipsec *.*.*.* none message must be encrypted 
04:47:43 sstp,packet Takacs4 recv control packet type: echo request 
04:47:43 sstp,packet 10 01 00 08 00 08 00 00  
04:47:43 sstp,packet Takacs4 sent control packet type: echo response 
04:47:43 sstp,packet 10 01 00 08 00 09 00 00  
04:47:43 sstp,packet Takacs4 sent control packet type: echo request 
04:47:43 sstp,packet 10 01 00 08 00 08 00 00  
04:47:43 sstp,packet Takacs4 recv control packet type: echo response 
04:47:43 sstp,packet 10 01 00 08 00 09 00 00  
04:47:51 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:47:51 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
04:47:51 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6 
04:47:51 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289 
04:47:51 ipsec,debug,packet a7e70bb3 
04:47:51 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:48:01 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:48:01 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
04:48:01 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6 
04:48:01 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289 
04:48:01 ipsec,debug,packet a7e70bb3 
04:48:01 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:48:11 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:48:11 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
04:48:11 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6 
04:48:11 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289 
04:48:11 ipsec,debug,packet a7e70bb3 
04:48:11 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:48:21 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:48:21 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
04:48:21 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6 
04:48:21 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289 
04:48:21 ipsec,debug,packet a7e70bb3 
04:48:21 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:48:31 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
04:48:31 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
04:48:31 ipsec,debug,packet 774122ee ae510ced 93bdab8b cd026b1c 05100201 00000000 00000044 b35677d6 
04:48:31 ipsec,debug,packet a9744402 93c055c3 1d8ae468 d3d48f14 8b3999e0 de0fa740 d05d5c81 09fc4289 
04:48:31 ipsec,debug,packet a7e70bb3 
04:48:31 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c 
04:48:41 ipsec,error phase1 negotiation failed due to time up *.*.*.*[500]<=>*.*.*.*[500] 774122eeae510ced:93bdab8bcd026b1c



Anything obvious for the more expert eyes… ? Thanks !

I am probably blind. Where does it say that it fails?

From my own experience - you should check logs on both sides. They might not say anything in one side, but will specify where is the issue on the other side.

EDIT: Your blurred IP is still readable :smiley:

I am probably blind. Where does it say that it fails?

See last line “error phase1 negotiation failed due to time up

Also during the whole “handshake” phase it stays on




From my own experience - you should check logs on both sides. They might not say anything in one side, but will specify where is the issue on the other side.

Will try to get access to it (unfortunately the remote Zyxel device is not under my control). In the meantime screenshots of settings on both ends, if anyone can pinpoint the error…

Mikrotik

Zywall




EDIT: Your blurred IP is still readable :smiley:

thanks for pointing out - screenshot replaced with actual log output :slight_smile:

  1. Does Zyxel belong to Sonicwall? Those screenshots looks extremely familiar last when I worked on Sonicwall in 2014.
  2. I believe you are still showing the WAN address on the Zyxel side
  3. Not sure if is your problem, but you have key group set on DH5 at Zyxel side, I believe this translates to 1536 MODP, this is not selected at Mikrotik side

Thanks - good catch on both points. Corrected - still not conencting, athough the hadshake seem to work ok. I can’t pinpoint at what step if actually fails…

13:32:58 ipsec,debug === 
13:32:58 ipsec,info initiate new phase 1 (Identity Protection): *.*.*.*[500]<=>*.*.*.*[500] 
13:32:58 ipsec,debug new cookie: 
13:32:58 ipsec,debug cc2b1d815effccd1 
13:32:58 ipsec,debug add payload of len 168, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 13 
13:32:58 ipsec,debug add payload of len 16, next type 0 
13:32:58 ipsec,debug 460 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:32:58 ipsec,debug 1 times of 460 bytes message will be sent to *.*.*.*[500] 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 00000000 00000000 01100200 00000000 000001cc 0d0000ac 
13:32:58 ipsec,debug,packet 00000001 00000001 000000a0 01010004 03000028 01010000 800b0001 000c0004 
13:32:58 ipsec,debug,packet 00015180 80010007 800e0080 80030001 80020002 8004000e 03000028 02010000 
13:32:58 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020002 80040002 
13:32:58 ipsec,debug,packet 03000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020002 
13:32:58 ipsec,debug,packet 8004000e 00000024 04010000 800b0001 000c0004 00015180 80010005 80030001 
13:32:58 ipsec,debug,packet 80020002 80040002 0d000014 4a131c81 07035845 5c5728f2 0e95452f 0d000014 
13:32:58 ipsec,debug,packet 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8 ba676c4c 7737ae22 
13:32:58 ipsec,debug,packet eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285 0d000014 80d0bb3d 
13:32:58 ipsec,debug,packet ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65 73de52ac e952fa6b 
13:32:58 ipsec,debug,packet 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014 cd604643 35df21f8 
13:32:58 ipsec,debug,packet 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5 ec427b1f 0d000014 
13:32:58 ipsec,debug,packet 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 4485152d 18b6bbcd 0be8a846 
13:32:58 ipsec,debug,packet 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100 00000014 afcad713 
13:32:58 ipsec,debug,packet 68a1f1c9 6b8696fc 77570100 
13:32:58 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:0000000000000000 
13:32:58 ipsec,debug ===== received 260 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 01100200 00000000 00000104 0d000038 
13:32:58 ipsec,debug,packet 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 000c0004 
13:32:58 ipsec,debug,packet 00015180 80010005 80030001 80020002 80040002 0d000014 f758f226 68750f03 
13:32:58 ipsec,debug,packet b08df6eb e1d00403 0d000012 afcad713 68a1f1c9 6b8696fc 77570d00 0014cd60 
13:32:58 ipsec,debug,packet 464335df 21f87cfd b2fc68b6 a4480d00 001490cb 80913ebb 696e0863 81b5ec42 
13:32:58 ipsec,debug,packet 7b1f0d00 00147d94 19a65310 ca6f2c17 9d921552 9d560d00 00144a13 1c810703 
13:32:58 ipsec,debug,packet 58455c57 28f20e95 452f0d00 0014afca d71368a1 f1c96b86 96fc7757 01000d00 
13:32:58 ipsec,debug,packet 0012afca d71368a1 f1c96b86 96fc7757 00000014 12f5f28c 457168a9 702d9fe2 
13:32:58 ipsec,debug,packet 74cc0100 
13:32:58 ipsec,debug begin. 
13:32:58 ipsec,debug seen nptype=1(sa) len=56 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug seen nptype=13(vid) len=18 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug seen nptype=13(vid) len=18 
13:32:58 ipsec,debug seen nptype=13(vid) len=20 
13:32:58 ipsec,debug succeed. 
13:32:58 ipsec,debug received unknown Vendor ID 
13:32:58 ipsec,debug f758f226 68750f03 b08df6eb e1d00403 
13:32:58 ipsec,debug received unknown Vendor ID 
13:32:58 ipsec,debug afcad713 68a1f1c9 6b8696fc 7757 
13:32:58 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02 
13:32:58 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n 
13:32:58 ipsec received Vendor ID: draft-ietf-ipsec-nat-t-ike-03 
13:32:58 ipsec received Vendor ID: RFC 3947 
13:32:58 ipsec received Vendor ID: DPD 
13:32:58 ipsec,debug remote supports DPD 
13:32:58 ipsec,debug received unknown Vendor ID 
13:32:58 ipsec,debug afcad713 68a1f1c9 6b8696fc 7757 
13:32:58 ipsec received Vendor ID: CISCO-UNITY 
13:32:58 ipsec *.*.*.* Selected NAT-T version: RFC 3947 
13:32:58 ipsec,debug total SA len=52 
13:32:58 ipsec,debug 00000001 00000001 0000002c 01010001 00000024 04010000 800b0001 000c0004 
13:32:58 ipsec,debug 00015180 80010005 80030001 80020002 80040002 
13:32:58 ipsec,debug begin. 
13:32:58 ipsec,debug seen nptype=2(prop) len=44 
13:32:58 ipsec,debug succeed. 
13:32:58 ipsec,debug proposal #1 len=44 
13:32:58 ipsec,debug begin. 
13:32:58 ipsec,debug seen nptype=3(trns) len=36 
13:32:58 ipsec,debug succeed. 
13:32:58 ipsec,debug transform #4 len=36 
13:32:58 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
13:32:58 ipsec,debug type=Life Duration, flag=0x0000, lorv=4 
13:32:58 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
13:32:58 ipsec,debug,packet encryption(3des) 
13:32:58 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
13:32:58 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
13:32:58 ipsec,debug dh(modp1024) 
13:32:58 ipsec,debug pair 1: 
13:32:58 ipsec,debug  0x4a0e70: next=(nil) tnext=(nil) 
13:32:58 ipsec,debug proposal #1: 1 transform 
13:32:58 ipsec,debug -checking with pre-shared key auth- 
13:32:58 ipsec,debug prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1 
13:32:58 ipsec,debug trns#=4, trns-id=IKE 
13:32:58 ipsec,debug type=Life Type, flag=0x8000, lorv=seconds 
13:32:58 ipsec,debug type=Life Duration, flag=0x0000, lorv=4 
13:32:58 ipsec,debug type=Encryption Algorithm, flag=0x8000, lorv=3DES-CBC 
13:32:58 ipsec,debug type=Authentication Method, flag=0x8000, lorv=pre-shared key 
13:32:58 ipsec,debug type=Hash Algorithm, flag=0x8000, lorv=SHA 
13:32:58 ipsec,debug type=Group Description, flag=0x8000, lorv=1024-bit MODP group 
13:32:58 ipsec,debug -compare proposal #1: Local:Peer 
13:32:58 ipsec,debug (lifetime = 86400:86400) 
13:32:58 ipsec,debug (lifebyte = 0:0) 
13:32:58 ipsec,debug enctype = AES-CBC:3DES-CBC 
13:32:58 ipsec,debug (encklen = 128:0) 
13:32:58 ipsec,debug hashtype = SHA:SHA 
13:32:58 ipsec,debug authmethod = pre-shared key:pre-shared key 
13:32:58 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group 
13:32:58 ipsec,debug -compare proposal #2: Local:Peer 
13:32:58 ipsec,debug (lifetime = 86400:86400) 
13:32:58 ipsec,debug (lifebyte = 0:0) 
13:32:58 ipsec,debug enctype = AES-CBC:3DES-CBC 
13:32:58 ipsec,debug (encklen = 128:0) 
13:32:58 ipsec,debug hashtype = SHA:SHA 
13:32:58 ipsec,debug authmethod = pre-shared key:pre-shared key 
13:32:58 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group 
13:32:58 ipsec,debug -compare proposal #3: Local:Peer 
13:32:58 ipsec,debug (lifetime = 86400:86400) 
13:32:58 ipsec,debug (lifebyte = 0:0) 
13:32:58 ipsec,debug enctype = 3DES-CBC:3DES-CBC 
13:32:58 ipsec,debug (encklen = 0:0) 
13:32:58 ipsec,debug hashtype = SHA:SHA 
13:32:58 ipsec,debug authmethod = pre-shared key:pre-shared key 
13:32:58 ipsec,debug dh_group = 2048-bit MODP group:1024-bit MODP group 
13:32:58 ipsec,debug -compare proposal #4: Local:Peer 
13:32:58 ipsec,debug (lifetime = 86400:86400) 
13:32:58 ipsec,debug (lifebyte = 0:0) 
13:32:58 ipsec,debug enctype = 3DES-CBC:3DES-CBC 
13:32:58 ipsec,debug (encklen = 0:0) 
13:32:58 ipsec,debug hashtype = SHA:SHA 
13:32:58 ipsec,debug authmethod = pre-shared key:pre-shared key 
13:32:58 ipsec,debug dh_group = 1024-bit MODP group:1024-bit MODP group 
13:32:58 ipsec,debug -an acceptable proposal found- 
13:32:58 ipsec,debug dh(modp1024) 
13:32:58 ipsec,debug -agreed on pre-shared key auth- 
13:32:58 ipsec,debug === 
13:32:58 ipsec,debug dh(modp1024) 
13:32:58 ipsec,debug,packet compute DH's private. 
13:32:58 ipsec,debug,packet 5ad6fd3a 9c6d111c d00aaf00 639992ed 4d173975 8f9d2df9 660e4118 ae6f0bcc 
13:32:58 ipsec,debug,packet 7696ee76 d4f7b3d1 e9e52748 62e1b79b e907a249 f2db04b5 e9da3953 a02078a3 
13:32:58 ipsec,debug,packet 8e57c6be 463e5750 d1692e00 fb8df5df ff79fbf1 47af9f05 4b0244e0 ac24fde0 
13:32:58 ipsec,debug,packet 604bc8dc 3d39ac67 82e00aba 291e8396 d6cb2147 6b1165d7 68decd42 6e02d6b5 
13:32:58 ipsec,debug,packet compute DH's public. 
13:32:58 ipsec,debug,packet edbbc98b 77a673f4 d842568b 083d70b4 cc574720 b991d727 00f979e2 6ca4969c 
13:32:58 ipsec,debug,packet f8ce7f1b ceaa3544 6992bcc3 81de3c60 0ec3a379 0a685507 aebd49e5 d3bc34d8 
13:32:58 ipsec,debug,packet 8405bd7b 5f963ce6 c3cc0914 ebbb1730 036ddca3 d6896e24 1cd7e6ad d29a2464 
13:32:58 ipsec,debug,packet abcc236e fde59d10 45b4580a da22218f ce3c8470 4630f3e2 e2e2691e 1f48fed8 
13:32:58 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec Adding remote and local NAT-D payloads. 
13:32:58 ipsec,debug add payload of len 128, next type 10 
13:32:58 ipsec,debug add payload of len 24, next type 20 
13:32:58 ipsec,debug add payload of len 20, next type 20 
13:32:58 ipsec,debug add payload of len 20, next type 0 
13:32:58 ipsec,debug 236 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:32:58 ipsec,debug 1 times of 236 bytes message will be sent to *.*.*.*[500] 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 04100200 00000000 000000ec 0a000084 
13:32:58 ipsec,debug,packet edbbc98b 77a673f4 d842568b 083d70b4 cc574720 b991d727 00f979e2 6ca4969c 
13:32:58 ipsec,debug,packet f8ce7f1b ceaa3544 6992bcc3 81de3c60 0ec3a379 0a685507 aebd49e5 d3bc34d8 
13:32:58 ipsec,debug,packet 8405bd7b 5f963ce6 c3cc0914 ebbb1730 036ddca3 d6896e24 1cd7e6ad d29a2464 
13:32:58 ipsec,debug,packet abcc236e fde59d10 45b4580a da22218f ce3c8470 4630f3e2 e2e2691e 1f48fed8 
13:32:58 ipsec,debug,packet 1400001c ed08b101 a3758c91 907ec351 efdff4de 87445898 5a72ea24 14000018 
13:32:58 ipsec,debug,packet 4de46e1a 3ca869e4 d1793dce 4b2a0b94 a3a215ae 00000018 7965d379 6a4fd093 
13:32:58 ipsec,debug,packet e2fd7380 bc1de6ed 42d72d9a 
13:32:58 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:32:58 ipsec,debug ===== received 228 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 04100200 00000000 000000e4 0a000084 
13:32:58 ipsec,debug,packet 99a4b3e7 0754e2d4 f5a883e0 9bae2a3f 8cd19357 7f3c7f3b 597a720e 5eeb89d9 
13:32:58 ipsec,debug,packet 4cd0cb97 f3f20b37 6f818daf eb3611e5 eb32ace6 4acd9520 46b10606 bda1ff76 
13:32:58 ipsec,debug,packet 0700af7e a42dbb9c 666f1b79 29b51723 25d39e63 76878f4f 8f3fa2e8 a2ddaeda 
13:32:58 ipsec,debug,packet e91a560d 09883ace 0585164e a1153355 ccf08115 ca2fca9e 3a1bce6d 5eb16d52 
13:32:58 ipsec,debug,packet 14000014 d92a5689 35fc3489 b1a48b59 e56f1337 14000018 7965d379 6a4fd093 
13:32:58 ipsec,debug,packet e2fd7380 bc1de6ed 42d72d9a 00000018 4de46e1a 3ca869e4 d1793dce 4b2a0b94 
13:32:58 ipsec,debug,packet a3a215ae 
13:32:58 ipsec,debug begin. 
13:32:58 ipsec,debug seen nptype=4(ke) len=132 
13:32:58 ipsec,debug seen nptype=10(nonce) len=20 
13:32:58 ipsec,debug seen nptype=20(nat-d) len=24 
13:32:58 ipsec,debug seen nptype=20(nat-d) len=24 
13:32:58 ipsec,debug succeed. 
13:32:58 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec NAT-D payload #0 verified 
13:32:58 ipsec *.*.*.* Hashing *.*.*.*[500] with algo #2  
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec NAT-D payload #1 verified 
13:32:58 ipsec NAT not detected  
13:32:58 ipsec,debug === 
13:32:58 ipsec,debug dh(modp1024) 
13:32:58 ipsec,debug,packet compute DH's shared. 
13:32:58 ipsec,debug,packet 
13:32:58 ipsec,debug,packet 1cbc3259 95c56412 4ee424a8 2292c835 0faa1b54 85f0aace 3a2bfaf6 dacca843 
13:32:58 ipsec,debug,packet dadbe043 59633f1c 9e64707a 09904d89 b29f7286 53b4aac5 6fda8bd8 b8eddff8 
13:32:58 ipsec,debug,packet 01907f81 9f62f24d 2343b110 66c7e2e7 c420d76e f4aa3dca 09d0135a 0e26255d 
13:32:58 ipsec,debug,packet 52b730f3 48113c02 216f5361 3bfb52a7 e2557928 c0028772 c21eff24 4b2597b5 
13:32:58 ipsec,debug nonce 1:  
13:32:58 ipsec,debug ed08b101 a3758c91 907ec351 efdff4de 87445898 5a72ea24 
13:32:58 ipsec,debug nonce 2:  
13:32:58 ipsec,debug d92a5689 35fc3489 b1a48b59 e56f1337 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug SKEYID computed: 
13:32:58 ipsec,debug ee587986 b019ad06 69dd1dfa e149154f 6168635e 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug SKEYID_d computed: 
13:32:58 ipsec,debug bd0b0579 64e3e5c3 9f329297 1dd07a2b 5232f866 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug SKEYID_a computed: 
13:32:58 ipsec,debug 87778eb5 d8f86030 96c8c631 81afa7df a2e31021 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug SKEYID_e computed: 
13:32:58 ipsec,debug ef2a31e9 69781b8a 5c2106b1 7568bb7a c77f9469 
13:32:58 ipsec,debug,packet encryption(3des) 
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec,debug len(SKEYID_e) < len(Ka) (20 < 24), generating long key (Ka = K1 | K2 | ...) 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug compute intermediate encryption key K1 
13:32:58 ipsec,debug 00 
13:32:58 ipsec,debug cf5e4caa 1444b794 97a0af7a b82ea5b9 de9312a7 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug compute intermediate encryption key K2 
13:32:58 ipsec,debug cf5e4caa 1444b794 97a0af7a b82ea5b9 de9312a7 
13:32:58 ipsec,debug 2ab63198 96ab03b6 3bbb3b87 db4d235a 8042bab0 
13:32:58 ipsec,debug final encryption key computed: 
13:32:58 ipsec,debug cf5e4caa 1444b794 97a0af7a b82ea5b9 de9312a7 2ab63198 
13:32:58 ipsec,debug hash(sha1) 
13:32:58 ipsec,debug,packet encryption(3des) 
13:32:58 ipsec,debug IV computed: 
13:32:58 ipsec,debug 7386b783 f656b24f 
13:32:58 ipsec,debug use ID type of IPv4_address 
13:32:58 ipsec,debug,packet HASH with: 
13:32:58 ipsec,debug,packet edbbc98b 77a673f4 d842568b 083d70b4 cc574720 b991d727 00f979e2 6ca4969c 
13:32:58 ipsec,debug,packet f8ce7f1b ceaa3544 6992bcc3 81de3c60 0ec3a379 0a685507 aebd49e5 d3bc34d8 
13:32:58 ipsec,debug,packet 8405bd7b 5f963ce6 c3cc0914 ebbb1730 036ddca3 d6896e24 1cd7e6ad d29a2464 
13:32:58 ipsec,debug,packet abcc236e fde59d10 45b4580a da22218f ce3c8470 4630f3e2 e2e2691e 1f48fed8 
13:32:58 ipsec,debug,packet 99a4b3e7 0754e2d4 f5a883e0 9bae2a3f 8cd19357 7f3c7f3b 597a720e 5eeb89d9 
13:32:58 ipsec,debug,packet 4cd0cb97 f3f20b37 6f818daf eb3611e5 eb32ace6 4acd9520 46b10606 bda1ff76 
13:32:58 ipsec,debug,packet 0700af7e a42dbb9c 666f1b79 29b51723 25d39e63 76878f4f 8f3fa2e8 a2ddaeda 
13:32:58 ipsec,debug,packet e91a560d 09883ace 0585164e a1153355 ccf08115 ca2fca9e 3a1bce6d 5eb16d52 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 00000001 00000001 000000a0 01010004 
13:32:58 ipsec,debug,packet 03000028 01010000 800b0001 000c0004 00015180 80010007 800e0080 80030001 
13:32:58 ipsec,debug,packet 80020002 8004000e 03000028 02010000 800b0001 000c0004 00015180 80010007 
13:32:58 ipsec,debug,packet 800e0080 80030001 80020002 80040002 03000024 03010000 800b0001 000c0004 
13:32:58 ipsec,debug,packet 00015180 80010005 80030001 80020002 8004000e 00000024 04010000 800b0001 
13:32:58 ipsec,debug,packet 000c0004 00015180 80010005 80030001 80020002 80040002 011101f4 55c3eff1 
13:32:58 ipsec,debug,packet hmac(hmac_sha1) 
13:32:58 ipsec,debug,packet HASH computed: 
13:32:58 ipsec,debug,packet 25a41dc6 9f976ebf 5aa3a942 29596d00 c26e4c1d 
13:32:58 ipsec,debug add payload of len 8, next type 8 
13:32:58 ipsec,debug add payload of len 20, next type 0 
13:32:58 ipsec,debug,packet begin encryption. 
13:32:58 ipsec,debug,packet encryption(3des) 
13:32:58 ipsec,debug,packet pad length = 4 
13:32:58 ipsec,debug,packet 0800000c 011101f4 55c3eff1 00000018 25a41dc6 9f976ebf 5aa3a942 29596d00 
13:32:58 ipsec,debug,packet c26e4c1d e11d2703 
13:32:58 ipsec,debug,packet encryption(3des) 
13:32:58 ipsec,debug,packet with key: 
13:32:58 ipsec,debug,packet cf5e4caa 1444b794 97a0af7a b82ea5b9 de9312a7 2ab63198 
13:32:58 ipsec,debug,packet encrypted payload by IV: 
13:32:58 ipsec,debug,packet 7386b783 f656b24f 
13:32:58 ipsec,debug,packet save IV for next: 
13:32:58 ipsec,debug,packet 4d0d1cb6 dbbc16fc 
13:32:58 ipsec,debug,packet encrypted. 
13:32:58 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:32:58 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 05100201 00000000 00000044 cf9f3023 
13:32:58 ipsec,debug,packet 69d967f6 feaa34de aa22f444 b2d5726d d9d56093 617d3d5a df4bace6 4d0d1cb6 
13:32:58 ipsec,debug,packet dbbc16fc 
13:32:58 ipsec sent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:32:58 ipsec,debug ===== received 173 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:32:58 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 0b100500 f8021337 000000ad 00000091 
13:32:58 ipsec,debug,packet 00000001 01100001 cc2b1d81 5effccd1 741495b6 87f97796 800c0001 800300d4 
13:32:58 ipsec,debug,packet 00030028 d406270a 273fc0ba e3fcf4ce 5a1deb58 dcbd70a3 5a63a3ef fe918cee 
13:32:58 ipsec,debug,packet afbcf36d 8407d6d4 9be2f839 80050000 00060035 496e636f 72726563 74207072 
13:32:58 ipsec,debug,packet 652d7368 61726564 206b6579 2028496e 76616c69 64206e65 78742070 61796c6f 
13:32:58 ipsec,debug,packet 61642076 616c7565 29800800 00 
13:32:58 ipsec,debug receive Information. 
13:32:58 ipsec *.*.*.* none message must be encrypted 
13:33:08 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:33:08 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
13:33:08 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 05100201 00000000 00000044 cf9f3023 
13:33:08 ipsec,debug,packet 69d967f6 feaa34de aa22f444 b2d5726d d9d56093 617d3d5a df4bace6 4d0d1cb6 
13:33:08 ipsec,debug,packet dbbc16fc 
13:33:08 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:33:18 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:33:18 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
13:33:18 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 05100201 00000000 00000044 cf9f3023 
13:33:18 ipsec,debug,packet 69d967f6 feaa34de aa22f444 b2d5726d d9d56093 617d3d5a df4bace6 4d0d1cb6 
13:33:18 ipsec,debug,packet dbbc16fc 
13:33:18 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:33:28 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:33:28 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
13:33:28 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 05100201 00000000 00000044 cf9f3023 
13:33:28 ipsec,debug,packet 69d967f6 feaa34de aa22f444 b2d5726d d9d56093 617d3d5a df4bace6 4d0d1cb6 
13:33:28 ipsec,debug,packet dbbc16fc 
13:33:28 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:33:38 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:33:38 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
13:33:38 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 05100201 00000000 00000044 cf9f3023 
13:33:38 ipsec,debug,packet 69d967f6 feaa34de aa22f444 b2d5726d d9d56093 617d3d5a df4bace6 4d0d1cb6 
13:33:38 ipsec,debug,packet dbbc16fc 
13:33:38 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:33:48 ipsec,debug 68 bytes from *.*.*.*[500] to *.*.*.*[500] 
13:33:48 ipsec,debug 1 times of 68 bytes message will be sent to *.*.*.*[500] 
13:33:48 ipsec,debug,packet cc2b1d81 5effccd1 741495b6 87f97796 05100201 00000000 00000044 cf9f3023 
13:33:48 ipsec,debug,packet 69d967f6 feaa34de aa22f444 b2d5726d d9d56093 617d3d5a df4bace6 4d0d1cb6 
13:33:48 ipsec,debug,packet dbbc16fc 
13:33:48 ipsec resent phase1 packet *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796 
13:33:58 ipsec,error phase1 negotiation failed due to time up *.*.*.*[500]<=>*.*.*.*[500] cc2b1d815effccd1:741495b687f97796

If I am reading this correctly, the Mikrotik is sending, so you will have to get access to the logs / packet capture on the other side to see what the problem is, maybe the packet never reaches it, etc

Thanks - yes it seems I will need both ends of the conversation.

That being said I see

04:47:41 ipsec,debug -an acceptable proposal found- 
04:47:41 ipsec,debug dh(modp1024) 
04:47:41 ipsec,debug -agreed on pre-shared key auth-

so there is some handshake going on.