Still having this issue with no Phase2 connection... Here is the detailed log I have pulled today:
21:52:52 ipsec,debug 87.xxx.xxx.xxx DPD monitoring....
21:52:52 ipsec,debug,packet compute IV for phase2
21:52:52 ipsec,debug,packet phase1 last IV:
21:52:52 ipsec,debug,packet f3601756 f9ee8619 e894d9cc 1e97cbaf cea2c9d8
21:52:52 ipsec,debug hash(sha1)
21:52:52 ipsec,debug,packet encryption(aes)
21:52:52 ipsec,debug,packet phase2 IV computed:
21:52:52 ipsec,debug,packet 09357371 11866813 5a999a32 fd1c7b2b
21:52:52 ipsec,debug,packet HASH with:
21:52:52 ipsec,debug,packet cea2c9d8 00000020 00000001 01108d28 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9
21:52:52 ipsec,debug,packet 0000064f
21:52:52 ipsec,debug,packet hmac(hmac_sha1)
21:52:52 ipsec,debug,packet HASH computed:
21:52:52 ipsec,debug,packet ed7b969c 75874bd2 b9da1341 d125f22b b920efae
21:52:52 ipsec,debug,packet begin encryption.
21:52:52 ipsec,debug,packet encryption(aes)
21:52:52 ipsec,debug,packet pad length = 8
21:52:52 ipsec,debug,packet 0b000018 ed7b969c 75874bd2 b9da1341 d125f22b b920efae 00000020 00000001
21:52:52 ipsec,debug,packet 01108d28 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 0000064f 6b4b119f 5c6d3e07
21:52:52 ipsec,debug,packet encryption(aes)
21:52:52 ipsec,debug,packet with key:
21:52:52 ipsec,debug,packet 2eae441c f1aee2d3 c65beb43 7ea3a18b d86e39f0 54102358 684c880e 616df003
21:52:52 ipsec,debug,packet encrypted payload by IV:
21:52:52 ipsec,debug,packet 09357371 11866813 5a999a32 fd1c7b2b
21:52:52 ipsec,debug,packet save IV for next:
21:52:52 ipsec,debug,packet 45c7ee15 3ac21d22 4d083d53 00940163
21:52:52 ipsec,debug,packet encrypted.
21:52:52 ipsec,debug 92 bytes from 192.168.0.104[4500] to 87.xxx.xxx.xxx[4500]
21:52:52 ipsec,debug 1 times of 96 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:52:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 08100501 cea2c9d8 0000005c 15907233
21:52:52 ipsec,debug,packet 60febaaa dc6970a9 e9612846 95a87809 543ccde5 639ebf87 b4b0fc3f 02dc867a
21:52:52 ipsec,debug,packet 5ca2354c ca52cf96 a968672e 45c7ee15 3ac21d22 4d083d53 00940163
21:52:52 ipsec,debug sendto Information notify.
21:52:52 ipsec,debug 87.xxx.xxx.xxx DPD R-U-There sent (0)
21:52:52 ipsec,debug 87.xxx.xxx.xxx rescheduling send_r_u (5).
21:52:52 ipsec,debug ===== received 92 bytes from 87.xxx.xxx.xxx[4500] to 192.168.0.104[4500]
21:52:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 08100501 cea2c9d8 0000005c 137023c7
21:52:52 ipsec,debug,packet 8ea70679 45b3557f 54e68183 326b3088 0c102b96 595a804d 48a5f685 39842039
21:52:52 ipsec,debug,packet 7c706260 1b55a6e7 926547c1 4cc4385e ebeeace5 ce18cbe6 fd83f821
21:52:52 ipsec,debug receive Information.
21:52:52 ipsec,debug,packet compute IV for phase2
21:52:52 ipsec,debug,packet phase1 last IV:
21:52:52 ipsec,debug,packet f3601756 f9ee8619 e894d9cc 1e97cbaf cea2c9d8
21:52:52 ipsec,debug hash(sha1)
21:52:52 ipsec,debug,packet encryption(aes)
21:52:52 ipsec,debug,packet phase2 IV computed:
21:52:52 ipsec,debug,packet 09357371 11866813 5a999a32 fd1c7b2b
21:52:52 ipsec,debug,packet encryption(aes)
21:52:52 ipsec,debug,packet IV was saved for next processing:
21:52:52 ipsec,debug,packet 4cc4385e ebeeace5 ce18cbe6 fd83f821
21:52:52 ipsec,debug,packet encryption(aes)
21:52:52 ipsec,debug,packet with key:
21:52:52 ipsec,debug,packet 2eae441c f1aee2d3 c65beb43 7ea3a18b d86e39f0 54102358 684c880e 616df003
21:52:52 ipsec,debug,packet decrypted payload by IV:
21:52:52 ipsec,debug,packet 09357371 11866813 5a999a32 fd1c7b2b
21:52:52 ipsec,debug,packet decrypted payload, but not trimed.
21:52:52 ipsec,debug,packet 0b000018 fe4a7221 ea9849d0 599b7072 859b5edf f40fc3bd 00000020 00000001
21:52:52 ipsec,debug,packet 01108d29 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 0000064f 00000000 00000000
21:52:52 ipsec,debug,packet padding len=1
21:52:52 ipsec,debug,packet skip to trim padding.
21:52:52 ipsec,debug,packet decrypted.
21:52:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 08100501 cea2c9d8 0000005c 0b000018
21:52:52 ipsec,debug,packet fe4a7221 ea9849d0 599b7072 859b5edf f40fc3bd 00000020 00000001 01108d29
21:52:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 0000064f 00000000 00000000
21:52:52 ipsec,debug,packet HASH with:
21:52:52 ipsec,debug,packet cea2c9d8 00000020 00000001 01108d29 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9
21:52:52 ipsec,debug,packet 0000064f
21:52:52 ipsec,debug,packet hmac(hmac_sha1)
21:52:52 ipsec,debug,packet HASH computed:
21:52:52 ipsec,debug,packet fe4a7221 ea9849d0 599b7072 859b5edf f40fc3bd
21:52:52 ipsec,debug hash validated.
21:52:52 ipsec,debug begin.
21:52:52 ipsec,debug seen nptype=8(hash) len=24
21:52:52 ipsec,debug seen nptype=11(notify) len=32
21:52:52 ipsec,debug succeed.
21:52:52 ipsec,debug 87.xxx.xxx.xxx notify: R_U_THERE_ACK
21:52:52 ipsec,debug 87.xxx.xxx.xxx DPD R-U-There-Ack received
21:52:52 ipsec,debug received an R-U-THERE-ACK
21:53:02 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:53:02 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:53:02 ipsec,debug,packet ff
21:53:22 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:53:22 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:53:22 ipsec,debug,packet ff
21:53:42 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:53:42 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:53:42 ipsec,debug,packet ff
21:54:02 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:54:02 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:54:02 ipsec,debug,packet ff
21:54:22 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:54:22 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:54:22 ipsec,debug,packet ff
21:54:42 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:54:42 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:54:42 ipsec,debug,packet ff
21:54:52 ipsec,debug 87.xxx.xxx.xxx DPD monitoring....
21:54:52 ipsec,debug,packet compute IV for phase2
21:54:52 ipsec,debug,packet phase1 last IV:
21:54:52 ipsec,debug,packet f3601756 f9ee8619 e894d9cc 1e97cbaf cb482dbf
21:54:52 ipsec,debug hash(sha1)
21:54:52 ipsec,debug,packet encryption(aes)
21:54:52 ipsec,debug,packet phase2 IV computed:
21:54:52 ipsec,debug,packet 52eac2eb 7c32910b 70f5eaaf 674a3622
21:54:52 ipsec,debug,packet HASH with:
21:54:52 ipsec,debug,packet cb482dbf 00000020 00000001 01108d28 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9
21:54:52 ipsec,debug,packet 00000650
21:54:52 ipsec,debug,packet hmac(hmac_sha1)
21:54:52 ipsec,debug,packet HASH computed:
21:54:52 ipsec,debug,packet 5806838c ea30c60f bbd48d08 f9a790dd 8978405d
21:54:52 ipsec,debug,packet begin encryption.
21:54:52 ipsec,debug,packet encryption(aes)
21:54:52 ipsec,debug,packet pad length = 8
21:54:52 ipsec,debug,packet 0b000018 5806838c ea30c60f bbd48d08 f9a790dd 8978405d 00000020 00000001
21:54:52 ipsec,debug,packet 01108d28 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 00000650 bd959a99 f66aaa07
21:54:52 ipsec,debug,packet encryption(aes)
21:54:52 ipsec,debug,packet with key:
21:54:52 ipsec,debug,packet 2eae441c f1aee2d3 c65beb43 7ea3a18b d86e39f0 54102358 684c880e 616df003
21:54:52 ipsec,debug,packet encrypted payload by IV:
21:54:52 ipsec,debug,packet 52eac2eb 7c32910b 70f5eaaf 674a3622
21:54:52 ipsec,debug,packet save IV for next:
21:54:52 ipsec,debug,packet 73447ddb 8c81e914 4160e61a 88479062
21:54:52 ipsec,debug,packet encrypted.
21:54:52 ipsec,debug 92 bytes from 192.168.0.104[4500] to 87.xxx.xxx.xxx[4500]
21:54:52 ipsec,debug 1 times of 96 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:54:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 08100501 cb482dbf 0000005c 2b65c25e
21:54:52 ipsec,debug,packet be57e1a6 55e02d1b 90a135fd 2095c64e c88f0e8d e27e89b0 cfde8e05 ebba8f73
21:54:52 ipsec,debug,packet 43e86139 8da53dd6 683114b4 73447ddb 8c81e914 4160e61a 88479062
21:54:52 ipsec,debug sendto Information notify.
21:54:52 ipsec,debug 87.xxx.xxx.xxx DPD R-U-There sent (0)
21:54:52 ipsec,debug 87.xxx.xxx.xxx rescheduling send_r_u (5).
21:54:52 ipsec,debug ===== received 92 bytes from 87.xxx.xxx.xxx[4500] to 192.168.0.104[4500]
21:54:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 08100501 cb482dbf 0000005c dbbc4a10
21:54:52 ipsec,debug,packet 6ff8c1d8 3fa38ba7 37a1a792 c9f5b85d 7efe7489 25906a39 acd1c947 13fe4602
21:54:52 ipsec,debug,packet eaed1a58 31e5e4ae 4033d6b4 7ab341dc 2724bb2a 81c5148f 4de7bd75
21:54:52 ipsec,debug receive Information.
21:54:52 ipsec,debug,packet compute IV for phase2
21:54:52 ipsec,debug,packet phase1 last IV:
21:54:52 ipsec,debug,packet f3601756 f9ee8619 e894d9cc 1e97cbaf cb482dbf
21:54:52 ipsec,debug hash(sha1)
21:54:52 ipsec,debug,packet encryption(aes)
21:54:52 ipsec,debug,packet phase2 IV computed:
21:54:52 ipsec,debug,packet 52eac2eb 7c32910b 70f5eaaf 674a3622
21:54:52 ipsec,debug,packet encryption(aes)
21:54:52 ipsec,debug,packet IV was saved for next processing:
21:54:52 ipsec,debug,packet 7ab341dc 2724bb2a 81c5148f 4de7bd75
21:54:52 ipsec,debug,packet encryption(aes)
21:54:52 ipsec,debug,packet with key:
21:54:52 ipsec,debug,packet 2eae441c f1aee2d3 c65beb43 7ea3a18b d86e39f0 54102358 684c880e 616df003
21:54:52 ipsec,debug,packet decrypted payload by IV:
21:54:52 ipsec,debug,packet 52eac2eb 7c32910b 70f5eaaf 674a3622
21:54:52 ipsec,debug,packet decrypted payload, but not trimed.
21:54:52 ipsec,debug,packet 0b000018 df96e319 eff7ca7c deba3a45 95fd9fdd 214dab51 00000020 00000001
21:54:52 ipsec,debug,packet 01108d29 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 00000650 00000000 00000000
21:54:52 ipsec,debug,packet padding len=1
21:54:52 ipsec,debug,packet skip to trim padding.
21:54:52 ipsec,debug,packet decrypted.
21:54:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 08100501 cb482dbf 0000005c 0b000018
21:54:52 ipsec,debug,packet df96e319 eff7ca7c deba3a45 95fd9fdd 214dab51 00000020 00000001 01108d29
21:54:52 ipsec,debug,packet 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9 00000650 00000000 00000000
21:54:52 ipsec,debug,packet HASH with:
21:54:52 ipsec,debug,packet cb482dbf 00000020 00000001 01108d29 7c8dbe7b 3ad2ff3f ae5e7dda 825a17d9
21:54:52 ipsec,debug,packet 00000650
21:54:52 ipsec,debug,packet hmac(hmac_sha1)
21:54:52 ipsec,debug,packet HASH computed:
21:54:52 ipsec,debug,packet df96e319 eff7ca7c deba3a45 95fd9fdd 214dab51
21:54:52 ipsec,debug hash validated.
21:54:52 ipsec,debug begin.
21:54:52 ipsec,debug seen nptype=8(hash) len=24
21:54:52 ipsec,debug seen nptype=11(notify) len=32
21:54:52 ipsec,debug succeed.
21:54:52 ipsec,debug 87.xxx.xxx.xxx notify: R_U_THERE_ACK
21:54:52 ipsec,debug 87.xxx.xxx.xxx DPD R-U-There-Ack received
21:54:52 ipsec,debug received an R-U-THERE-ACK
21:55:02 ipsec,debug KA: 192.168.0.104[4500]->87.xxx.xxx.xxx[4500]
21:55:02 ipsec,debug 1 times of 1 bytes message will be sent to 87.xxx.xxx.xxx[4500]
21:55:02 ipsec,debug,packet ff
And the current config with the MiktoTik connected to a router with IPSec passthrough set: