Trying to establish site-to-site VPN connection. My sophos utm 9 is present in Remote Peers.
Sophos Ipsec log
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: received Vendor ID payload [RFC 3947]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [16f6ca16e4a4066d83821a0f0aeaa862]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: ignoring Vendor ID payload [Cisco-Unity]
2014:03:25-13:51:30 gw pluto[5907]: packet from mikrotik-ip: received Vendor ID payload [Dead Peer Detection]
2014:03:25-13:51:30 gw pluto[5907]: “S_vgmu<->gw.7733.ru”[18] 37.230.229.228 #9933: responding to Main Mode from unknown peer mikrotik-ip
2014:03:25-13:51:30 gw pluto[5907]: “S_vgmu<->gw.7733.ru”[18] 37.230.229.228 #9933: NAT-Traversal: Result using RFC 3947: no NAT detected
2014:03:25-13:51:30 gw pluto[5907]: “S_vgmu<->gw.7733.ru”[18] 37.230.229.228 #9933: Peer ID is ID_USER_FQDN: ‘mikrotik-id’
2014:03:25-13:51:30 gw pluto[5907]: “S_vgmu<->gw.7733.ru”[19] 37.230.229.228 #9933: Dead Peer Detection (RFC 3706) enabled
2014:03:25-13:51:30 gw pluto[5907]: “S_vgmu<->gw.7733.ru”[19] 37.230.229.228 #9933: sent MR3, ISAKMP SA established
End nothing anymore.
My other remote servers usualy send
Quick Mode messages after that
Mikrotik config:
ip ipsec peer print
Flags: X - disabled
0 address=37.230.229.253/32 local-address=0.0.0.0 passive=no port=500
auth-method=pre-shared-key secret=“GfhjkmLkzGjlrk.xtybzFgntr”
generate-policy=port-override exchange-mode=main
send-initial-contact=yes nat-traversal=yes
my-id-user-fqdn=“VGMU.7733.ru” proposal-check=obey hash-algorithm=md5
enc-algorithm=3des dh-group=modp768 lifetime=1h lifebytes=0
dpd-interval=2m dpd-maximum-failures=5
Flags: X - disabled, * - default
0 * name=“default” auth-algorithms=md5 enc-algorithms=3des lifetime=1h
pfs-group=modp768