Jul 8 20:52:26 07[NET] received packet: from 192.168.4.103[60405] to 51.33.222.193[500] (648 bytes)
Jul 8 20:52:26 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
Jul 8 20:52:26 07[IKE] 192.168.4.103 is initiating an IKE_SA
Jul 8 20:52:26 07[IKE] remote host is behind NAT
Jul 8 20:52:26 07[IKE] sending cert request for "C=US, ST=Florida, L=Melbourne, O=Home, CN=Claybaug CA"
Jul 8 20:52:26 07[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ]
Jul 8 20:52:26 07[NET] sending packet: from 51.33.222.193[500] to 192.168.4.103[60405] (465 bytes)
Jul 8 20:52:26 10[NET] received packet: from 192.168.4.103[34764] to 51.33.222.193[4500] (1804 bytes)
Jul 8 20:52:26 10[ENC] parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ AUTH CP(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
Jul 8 20:52:26 10[IKE] received cert request for "C=US, ST=Florida, L=Melbourne, O=Home, CN=Claybaug CA"
Jul 8 20:52:26 10[IKE] received end entity cert "C=US, ST=Florida, O=Home, CN=Claybaugh"
Jul 8 20:52:26 10[CFG] looking for peer configs matching 51.33.222.193[%any]...192.168.4.103[C=US, ST=Florida, O=Home, CN=Claybaugh]
Jul 8 20:52:26 10[CFG] selected peer config 'Android'
Jul 8 20:52:26 10[CFG] using trusted ca certificate "C=US, ST=Florida, L=Melbourne, O=Home, CN=Claybaug CA"
Jul 8 20:52:26 10[CFG] checking certificate status of "C=US, ST=Florida, O=Home, CN=Claybaugh"
Jul 8 20:52:26 10[CFG] certificate status is not available
Jul 8 20:52:26 10[CFG] reached self-signed root ca with a path length of 0
Jul 8 20:52:26 10[CFG] using trusted certificate "C=US, ST=Florida, O=Home, CN=Claybaugh"
Jul 8 20:52:26 10[IKE] authentication of 'C=US, ST=Florida, O=Home, CN=Claybaugh' with RSA signature successful
Jul 8 20:52:26 10[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Jul 8 20:52:26 10[IKE] peer supports MOBIKE
Jul 8 20:52:26 10[IKE] authentication of '51.33.222.193' (myself) with RSA signature successful
Jul 8 20:52:26 10[IKE] IKE_SA Android[15] established between 51.33.222.193[51.33.222.193]...192.168.4.103[C=US, ST=Florida, O=Home, CN=Claybaugh]
Jul 8 20:52:26 10[IKE] sending end entity cert "C=US, ST=Florida, O=Home, CN=Claybaugh"
Jul 8 20:52:26 10[IKE] peer requested virtual IP %any
Jul 8 20:52:26 10[CFG] reassigning offline lease to 'C=US, ST=Florida, O=Home, CN=Claybaugh'
Jul 8 20:52:26 10[IKE] assigning virtual IP 192.168.6.1 to peer 'C=US, ST=Florida, O=Home, CN=Claybaugh'
Jul 8 20:52:26 10[IKE] peer requested virtual IP %any6
Jul 8 20:52:26 10[IKE] no virtual IP found for %any6 requested by 'C=US, ST=Florida, O=Home, CN=Claybaugh'
Jul 8 20:52:26 10[IKE] CHILD_SA Android{11} established with SPIs c51c8619_i 6d1def35_o and TS 0.0.0.0/0 === 192.168.6.1/32
Jul 8 20:52:26 10[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH CP(ADDR DNS) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Jul 8 20:52:26 10[NET] sending packet: from 51.33.222.193[4500] to 192.168.4.103[34764] (1452 bytes)