same same ..
14/11/2013 20:40:38.193 racoon[198]: Connecting.
14/11/2013 20:40:38.193 racoon[198]: IPSec Phase 1 started (Initiated by peer).
14/11/2013 20:40:38.193 racoon[198]: IKE Packet: receive success. (Responder, Main-Mode message 1).
14/11/2013 20:40:38.194 racoon[198]: >>>>> phase change status = Phase 1 started by us
14/11/2013 20:40:38.194 racoon[198]: IKE Packet: transmit success. (Responder, Main-Mode message 2).
14/11/2013 20:40:38.229 racoon[198]: IKE Packet: receive success. (Responder, Main-Mode message 3).
14/11/2013 20:40:38.247 racoon[198]: IKE Packet: transmit success. (Responder, Main-Mode message 4).
14/11/2013 20:40:38.283 racoon[198]: Connecting.
14/11/2013 20:40:41.480 racoon[198]: IKE Packet: transmit success. (Phase 1 Retransmit).
14/11/2013 20:40:44.778 racoon[198]: IKE Packet: transmit success. (Phase 1 Retransmit).
14/11/2013 20:40:48.052 racoon[198]: IKE Packet: transmit success. (Phase 1 Retransmit).
14/11/2013 20:41:01.209 racoon[198]: IKE Packet: transmit success. (Phase 1 Retransmit).
However - If i connect the client to a 3rd party l2tp VPN first, and then connect to my OS X server l2tp VPN, it connects ..
14/11/2013 20:45:30.616 racoon[198]: Connecting.
14/11/2013 20:45:30.616 racoon[198]: IPSec Phase 1 started (Initiated by peer).
14/11/2013 20:45:30.616 racoon[198]: IKE Packet: receive success. (Responder, Main-Mode message 1).
14/11/2013 20:45:30.617 racoon[198]: >>>>> phase change status = Phase 1 started by us
14/11/2013 20:45:30.617 racoon[198]: IKE Packet: transmit success. (Responder, Main-Mode message 2).
14/11/2013 20:45:30.644 racoon[198]: IKE Packet: receive success. (Responder, Main-Mode message 3).
14/11/2013 20:45:30.661 racoon[198]: IKE Packet: transmit success. (Responder, Main-Mode message 4).
14/11/2013 20:45:30.684 racoon[198]: Ignore INITIAL-CONTACT notification, because it is only accepted after Phase 1.
14/11/2013 20:45:30.684 racoon[198]: IKEv1 Phase 1 AUTH: success. (Responder, Main-Mode Message 5).
14/11/2013 20:45:30.684 racoon[198]: IKE Packet: receive success. (Responder, Main-Mode message 5).
14/11/2013 20:45:30.684 racoon[198]: IKEv1 Phase 1 Responder: success. (Responder, Main-Mode).
14/11/2013 20:45:30.684 racoon[198]: IKE Packet: transmit success. (Responder, Main-Mode message 6).
14/11/2013 20:45:30.685 racoon[198]: IKE Packet: transmit success. (Information message).
14/11/2013 20:45:30.685 racoon[198]: IKEv1 Information-Notice: transmit success. (ISAKMP-SA).
14/11/2013 20:45:30.685 racoon[198]: IPSec Phase 1 established (Initiated by peer).
14/11/2013 20:45:31.709 racoon[198]: IPSec Phase 2 started (Initiated by peer).
14/11/2013 20:45:31.709 racoon[198]: IKE Packet: receive success. (Responder, Quick-Mode message 1).
14/11/2013 20:45:31.709 racoon[198]: >>>>> phase change status = Phase 2 started
14/11/2013 20:45:31.710 racoon[198]: IKE Packet: transmit success. (Responder, Quick-Mode message 2).
14/11/2013 20:45:31.731 racoon[198]: IKE Packet: receive success. (Responder, Quick-Mode message 3).
14/11/2013 20:45:31.731 racoon[198]: IKEv1 Phase 2 Responder: success. (Responder, Quick-Mode).
14/11/2013 20:45:31.731 racoon[198]: IPSec Phase 2 established (Initiated by peer).
14/11/2013 20:45:31.732 racoon[198]: >>>>> phase change status = Phase 2 established
Closing the 3rd party VPN tunnel, obviously, closes both tunnels!
There's clearly not a NAT or Firewall issue on the client network as the 3rd party l2tp VPN connection wouldn't work either!
And there's not a clash of subnets. The client network is 10.20.101 ... and my home network where my OS X server lives is 192.168.60 .. and the 3rd party VPN service I connect to dishes out 192.168.80 .. ..
The 3rd party VPN connection is also NAT'd ........
FKA