Добавил mtu, debug ppp author ничего не показывает.deb cry isakmp, deb cry ipsec:
*Jan 9 13:43:25.399: ISAKMP:(0): SA request profile is (NULL)
*Jan 9 13:43:25.399: ISAKMP: Created a peer struct for 193.104.149.253, peer port 500
*Jan 9 13:43:25.399: ISAKMP: New peer created peer = 0x313EEFF8 peer_handle = 0x80000089
*Jan 9 13:43:25.399: ISAKMP: Locking peer struct 0x313EEFF8, refcount 1 for isakmp_initiator
*Jan 9 13:43:25.399: ISAKMP: local port 500, remote port 500
*Jan 9 13:43:25.399: ISAKMP: set new node 0 to QM_IDLE
*Jan 9 13:43:25.399: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 314E1C4C
*Jan 9 13:43:25.399: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
*Jan 9 13:43:25.399: ISAKMP:(0):found peer pre-shared key matching 193.104.149.253
*Jan 9 13:43:25.399: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
*Jan 9 13:43:25.399: ISAKMP:(0): constructed NAT-T vendor-07 ID
*Jan 9 13:43:25.399: ISAKMP:(0): constructed NAT-T vendor-03 ID
*Jan 9 13:43:25.399: ISAKMP:(0): constructed NAT-T vendor-02 ID
*Jan 9 13:43:25.399: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
*Jan 9 13:43:25.399: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1
*Jan 9 13:43:25.399: ISAKMP:(0): beginning Main Mode exchange
*Jan 9 13:43:25.399: ISAKMP:(0): sending packet to 193.104.149.253 my_port 500 peer_port 500 (I) MM_NO_STATE
*Jan 9 13:43:25.399: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Jan 9 13:43:25.403: ISAKMP (0): received packet from 193.104.149.253 dport 500 sport 500 Global (I) MM_NO_STATE
*Jan 9 13:43:25.403: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 9 13:43:25.403: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM2
*Jan 9 13:43:25.403: ISAKMP:(0): processing SA payload. message ID = 0
*Jan 9 13:43:25.403: ISAKMP:(0): processing vendor id payload
*Jan 9 13:43:25.403: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
*Jan 9 13:43:25.403: ISAKMP:(0): vendor ID is NAT-T v2
*Jan 9 13:43:25.403: ISAKMP:(0): processing vendor id payload
*Jan 9 13:43:25.403: ISAKMP:(0): processing IKE frag vendor id payload
*Jan 9 13:43:25.403: ISAKMP:(0):Support for IKE Fragmentation not enabled
*Jan 9 13:43:25.403: ISAKMP:(0):found peer pre-shared key matching 193.104.149.253
*Jan 9 13:43:25.403: ISAKMP:(0): local preshared key found
*Jan 9 13:43:25.403: ISAKMP : Scanning profiles for xauth ...
*Jan 9 13:43:25.403: ISAKMP:(0):Checking ISAKMP transform 1 against priority 100 policy
*Jan 9 13:43:25.403: ISAKMP: encryption 3DES-CBC
*Jan 9 13:43:25.403: ISAKMP: hash MD5
*Jan 9 13:43:25.403: ISAKMP: default group 2
*Jan 9 13:43:25.403: ISAKMP: auth pre-share
*Jan 9 13:43:25.403: ISAKMP: life type in seconds
*Jan 9 13:43:25.403: ISAKMP: life duration (basic) of 28000
*Jan 9 13:43:25.403: ISAKMP:(0):atts are acceptable. Next payload is 0
*Jan 9 13:43:25.403: ISAKMP:(0):Acceptable atts:actual life: 0
*Jan 9 13:43:25.403: ISAKMP:(0):Acceptable atts:life: 0
*Jan 9 13:43:25.403: ISAKMP:(0):Basic life_in_seconds:28000
*Jan 9 13:43:25.407: ISAKMP:(0):Returning Actual lifetime: 28000
*Jan 9 13:43:25.407: ISAKMP:(0)::Started lifetime timer: 28000.
*Jan 9 13:43:25.407: ISAKMP:(0): processing vendor id payload
*Jan 9 13:43:25.407: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
*Jan 9 13:43:25.407: ISAKMP:(0): vendor ID is NAT-T v2
*Jan 9 13:43:25.407: ISAKMP:(0): processing vendor id payload
*Jan 9 13:43:25.407: ISAKMP:(0): processing IKE frag vendor id payload
*Jan 9 13:43:25.407: ISAKMP:(0):Support for IKE Fragmentation not enabled
*Jan 9 13:43:25.407: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Jan 9 13:43:25.407: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM2
*Jan 9 13:43:25.407: ISAKMP:(0): sending packet to 193.104.149.253 my_port 500 peer_port 500 (I) MM_SA_SETUP
*Jan 9 13:43:25.407: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Jan 9 13:43:25.407: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Jan 9 13:43:25.407: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM3
*Jan 9 13:43:25.411: ISAKMP (0): received packet from 193.104.149.253 dport 500 sport 500 Global (I) MM_SA_SETUP
*Jan 9 13:43:25.411: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 9 13:43:25.411: ISAKMP:(0):Old State = IKE_I_MM3 New State = IKE_I_MM4
*Jan 9 13:43:25.411: ISAKMP:(0): processing KE payload. message ID = 0
*Jan 9 13:43:25.435: ISAKMP:(0): processing NONCE payload. message ID = 0
*Jan 9 13:43:25.435: ISAKMP:(0):found peer pre-shared key matching 193.104.149.253
*Jan 9 13:43:25.435: ISAKMP:(1120): processing vendor id payload
*Jan 9 13:43:25.435: ISAKMP:(1120): vendor ID is Unity
*Jan 9 13:43:25.435: ISAKMP:(1120): processing vendor id payload
*Jan 9 13:43:25.439: ISAKMP:(1120): vendor ID seems Unity/DPD but major 20 mismatch
*Jan 9 13:43:25.439: ISAKMP:(1120): vendor ID is XAUTH
*Jan 9 13:43:25.439: ISAKMP:(1120): processing vendor id payload
*Jan 9 13:43:25.439: ISAKMP:(1120): speaking to another IOS box!
*Jan 9 13:43:25.439: ISAKMP:(1120): processing vendor id payload
*Jan 9 13:43:25.439: ISAKMP:(1120):vendor ID seems Unity/DPD but hash mismatch
*Jan 9 13:43:25.439: ISAKMP:received payload type 20
*Jan 9 13:43:25.439: ISAKMP (1120): His hash no match - this node outside NAT
*Jan 9 13:43:25.439: ISAKMP:received payload type 20
*Jan 9 13:43:25.439: ISAKMP (1120): No NAT Found for self or peer
*Jan 9 13:43:25.439: ISAKMP:(1120):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Jan 9 13:43:25.439: ISAKMP:(1120):Old State = IKE_I_MM4 New State = IKE_I_MM4
*Jan 9 13:43:25.439: ISAKMP:(1120):Send initial contact
*Jan 9 13:43:25.439: ISAKMP:(1120):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
*Jan 9 13:43:25.439: ISAKMP (1120): ID payload
next-payload : 8
type : 1
address : 81.25.57.189
protocol : 17
port : 500
length : 12
*Jan 9 13:43:25.439: ISAKMP:(1120):Total payload length: 12
*Jan 9 13:43:25.439: ISAKMP:(1120): sending packet to 193.104.149.253 my_port 500 peer_port 500 (I) MM_KEY_EXCH
*Jan 9 13:43:25.439: ISAKMP:(1120):Sending an IKE IPv4 Packet.
*Jan 9 13:43:25.439: ISAKMP:(1120):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Jan 9 13:43:25.439: ISAKMP:(1120):Old State = IKE_I_MM4 New State = IKE_I_MM5
*Jan 9 13:43:25.443: ISAKMP (1120): received packet from 193.104.149.253 dport 500 sport 500 Global (I) MM_KEY_EXCH
*Jan 9 13:43:25.443: ISAKMP:(1120): processing ID payload. message ID = 0
*Jan 9 13:43:25.443: ISAKMP (1120): ID payload
next-payload : 8
type : 1
address : 193.104.149.253
protocol : 17
port : 0
length : 12
*Jan 9 13:43:25.443: ISAKMP:(0):: peer matches *none* of the profiles
*Jan 9 13:43:25.443: ISAKMP:(1120): processing HASH payload. message ID = 0
*Jan 9 13:43:25.443: ISAKMP:received payload type 17
*Jan 9 13:43:25.443: ISAKMP:(1120): processing vendor id payload
*Jan 9 13:43:25.443: ISAKMP:(1120): vendor ID is DPD
*Jan 9 13:43:25.443: ISAKMP:(1120):SA authentication status:
authenticated
*Jan 9 13:43:25.443: ISAKMP:(1120):SA has been authenticated with 193.104.149.253
*Jan 9 13:43:25.443: ISAKMP: Trying to insert a peer 81.25.57.189/193.104.149.253/500/, and inserted successfully 313EEFF8.
*Jan 9 13:43:25.443: ISAKMP:(1120):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 9 13:43:25.443: ISAKMP:(1120):Old State = IKE_I_MM5 New State = IKE_I_MM6
*Jan 9 13:43:25.443: ISAKMP:(1120):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Jan 9 13:43:25.443: ISAKMP:(1120):Old State = IKE_I_MM6 New State = IKE_I_MM6
*Jan 9 13:43:25.443: ISAKMP:(1120):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Jan 9 13:43:25.443: ISAKMP:(1120):Old State = IKE_I_MM6 New State = IKE_P1_COMPLETE
*Jan 9 13:43:25.443: ISAKMP:(1120):beginning Quick Mode exchange, M-ID of 2712072553
*Jan 9 13:43:25.443: ISAKMP:(1120):QM Initiator gets spi
*Jan 9 13:43:25.443: ISAKMP:(1120): sending packet to 193.104.149.253 my_port 500 peer_port 500 (I) QM_IDLE
*Jan 9 13:43:25.443: ISAKMP:(1120):Sending an IKE IPv4 Packet.
*Jan 9 13:43:25.443: ISAKMP:(1120):Node 2712072553, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
*Jan 9 13:43:25.443: ISAKMP:(1120):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
*Jan 9 13:43:25.443: ISAKMP:(1120):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Jan 9 13:43:25.443: ISAKMP:(1120):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Jan 9 13:43:25.451: ISAKMP (1120): received packet from 193.104.149.253 dport 500 sport 500 Global (I) QM_IDLE
*Jan 9 13:43:25.451: ISAKMP: set new node -361918668 to QM_IDLE
*Jan 9 13:43:25.451: ISAKMP:(1120): processing HASH payload. message ID = 3933048628
*Jan 9 13:43:25.451: ISAKMP:(1120): processing NOTIFY PROPOSAL_NOT_CHOSEN protocol 3
spi 0, message ID = 3933048628, sa = 0x314E1C4C
*Jan 9 13:43:25.451: ISAKMP:(1120):deleting node -361918668 error FALSE reason "Informational (in) state 1"
*Jan 9 13:43:25.451: ISAKMP:(1120):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Jan 9 13:43:25.451: ISAKMP:(1120):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Jan 9 13:43:25.451: ISAKMP (1120): received packet from 193.104.149.253 dport 500 sport 500 Global (I) QM_IDLE
*Jan 9 13:43:25.451: ISAKMP: set new node 1260810866 to QM_IDLE
*Jan 9 13:43:25.451: ISAKMP:(1120): processing HASH payload. message ID = 1260810866
*Jan 9 13:43:25.451: ISAKMP:(1120): processing DELETE payload. message ID = 1260810866
*Jan 9 13:43:25.451: ISAKMP:(1120):peer does not do paranoid keepalives.
*Jan 9 13:43:25.451: ISAKMP:(1120):deleting SA reason "No reason" state (I) QM_IDLE (peer 193.104.149.253)
*Jan 9 13:43:25.451: ISAKMP:(1120):deleting node 1260810866 error FALSE reason "Informational (in) state 1"
*Jan 9 13:43:25.451: ISAKMP: set new node -735100589 to QM_IDLE
*Jan 9 13:43:25.451: ISAKMP:(1120): sending packet to 193.104.149.253 my_port 500 peer_port 500 (I) QM_IDLE
*Jan 9 13:43:25.451: ISAKMP:(1120):Sending an IKE IPv4 Packet.
*Jan 9 13:43:25.451: ISAKMP:(1120):purging node -735100589
*Jan 9 13:43:25.451: ISAKMP:(1120):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
*Jan 9 13:43:25.451: ISAKMP:(1120):Old State = IKE_P1_COMPLETE New State = IKE_DEST_SA
*Jan 9 13:43:25.451: ISAKMP:(1120):deleting SA reason "No reason" state (I) QM_IDLE (peer 193.104.149.253)
*Jan 9 13:43:25.451: ISAKMP: Unlocking peer struct 0x313EEFF8 for isadb_mark_sa_deleted(), count 0
*Jan 9 13:43:25.451: ISAKMP: Deleting peer node by peer_reap for 193.104.149.253: 313EEFF8
*Jan 9 13:43:25.451: ISAKMP:(1120):deleting node -1582894743 error FALSE reason "IKE deleted"
*Jan 9 13:43:25.451: ISAKMP:(1120):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jan 9 13:43:25.451: ISAKMP:(1120):Old State = IKE_DEST_SA New State = IKE_DEST_SA
*Jan 9 13:43:25.451: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*Jan 9 13:43:43.371: ISAKMP:(1119):purging node 422040271
*Jan 9 13:43:43.371: ISAKMP:(1119):purging node 736202911
*Jan 9 13:43:43.371: ISAKMP:(1119):purging node 849488443
*Jan 9 13:43:53.371: ISAKMP:(1119):purging SA., sa=3138E0BC, delme=3138E0BC
*Jan 9 13:43:55.399: IPSEC(key_engine): request timer fired: count = 1,
(identity) local= 81.25.57.189:0, remote= 193.104.149.253:0,
local_proxy= 81.25.57.189/255.255.255.255/17/1701 (type=1),
remote_proxy= 193.104.149.253/255.255.255.255/17/1701 (type=1)
*Jan 9 13:43:55.399: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 81.25.57.189:500, remote= 193.104.149.253:500,
local_proxy= 81.25.57.189/255.255.255.255/17/1701 (type=1),
remote_proxy= 193.104.149.253/255.255.255.255/17/1701 (type=1),
protocol= ESP, transform= esp-3des esp-md5-hmac (Transport),
lifedur= 3600s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0