Jun 29 18:22:16 charon: 16[IKE] CHILD_SA con1{11} established with SPIs c9ace458_i 0cc0e0bf_o and TS INSIDE_SUBNET === VPN_CLIENT_VIRTUAL_IPJun 29 18:22:16 charon: 16[IKE] <con1|11> CHILD_SA con1{11} established with SPIs c9ace458_i 0cc0e0bf_o and TS INSIDE_SUBNET === VPN_CLIENT_VIRTUAL_IPJun 29 18:22:16 charon: 16[ENC] parsed QUICK_MODE request 3201133312 [ HASH ]Jun 29 18:22:16 charon: 16[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (92 bytes)Jun 29 18:22:14 charon: 16[NET] sending packet: from FW_WAN_IP[500] to VPN_CLIENT_PUB_IP[500] (188 bytes)Jun 29 18:22:14 charon: 16[ENC] generating QUICK_MODE response 3201133312 [ HASH SA No ID ID ]Jun 29 18:22:14 charon: 16[IKE] received 28800s lifetime, configured 3600sJun 29 18:22:14 charon: 16[IKE] <con1|11> received 28800s lifetime, configured 3600sJun 29 18:22:14 charon: 16[ENC] parsed QUICK_MODE request 3201133312 [ HASH SA No ID ID ]Jun 29 18:22:14 charon: 16[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (476 bytes)Jun 29 18:22:13 charon: 07[NET] sending packet: from FW_WAN_IP[500] to VPN_CLIENT_PUB_IP[500] (124 bytes)Jun 29 18:22:13 charon: 07[ENC] generating TRANSACTION response 3950866675 [ HASH CPRP(ADDR SUBNET U_SPLITINC U_SAVEPWD) ]Jun 29 18:22:13 charon: 07[IKE] assigning virtual IP VPN_CLIENT_VIRTUAL_IP to peer 'VPN_CLIENT_HOSTNAME'Jun 29 18:22:13 charon: 07[IKE] <con1|11> assigning virtual IP VPN_CLIENT_VIRTUAL_IP to peer 'VPN_CLIENT_HOSTNAME'Jun 29 18:22:13 charon: 07[CFG] reassigning offline lease to 'VPN_CLIENT_HOSTNAME'Jun 29 18:22:13 charon: 07[IKE] peer requested virtual IP %anyJun 29 18:22:13 charon: 07[IKE] <con1|11> peer requested virtual IP %anyJun 29 18:22:13 charon: 07[ENC] parsed TRANSACTION request 3950866675 [ HASH CPRQ(ADDR MASK DNS NBNS U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN VER) ]Jun 29 18:22:13 charon: 07[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (140 bytes)Jun 29 18:22:13 charon: 16[IKE] maximum IKE_SA lifetime 28464sJun 29 18:22:13 charon: 16[IKE] <con1|11> maximum IKE_SA lifetime 28464sJun 29 18:22:13 charon: 16[IKE] scheduling reauthentication in 27924sJun 29 18:22:13 charon: 16[IKE] <con1|11> scheduling reauthentication in 27924sJun 29 18:22:13 charon: 16[IKE] IKE_SA con1[11] established between FW_WAN_IP[WAN_IP]...VPN_CLIENT_PUB_IP[VPN_PEER_ID]Jun 29 18:22:13 charon: 16[IKE] <con1|11> IKE_SA con1[11] established between FW_WAN_IP[WAN_IP]...VPN_CLIENT_PUB_IP[VPN_PEER_ID]Jun 29 18:22:13 charon: 16[ENC] parsed TRANSACTION response 3153971281 [ HASH CPA(X_STATUS) ]Jun 29 18:22:13 charon: 16[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (108 bytes)Jun 29 18:22:13 charon: 16[NET] sending packet: from FW_WAN_IP[500] to VPN_CLIENT_PUB_IP[500] (92 bytes)Jun 29 18:22:13 charon: 16[ENC] generating TRANSACTION request 3153971281 [ HASH CPS(X_STATUS) ]Jun 29 18:22:13 charon: 16[IKE] XAuth authentication of 'VPN_CLIENT_HOSTNAME' successfulJun 29 18:22:13 charon: 16[IKE] <con1|11> XAuth authentication of 'VPN_CLIENT_HOSTNAME' successfulJun 29 18:22:13 charon: 16[IKE] XAuth-SCRIPT succeeded for user 'VPN_CLIENT_HOSTNAME'.Jun 29 18:22:13 charon: 16[IKE] <con1|11> XAuth-SCRIPT succeeded for user 'VPN_CLIENT_HOSTNAME'.Jun 29 18:22:13 charon: user 'VPN_CLIENT_HOSTNAME' authenticatedJun 29 18:22:12 charon: 16[ENC] parsed TRANSACTION response 4167000247 [ HASH CPRP(X_USER X_PWD) ]Jun 29 18:22:12 charon: 16[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (124 bytes)Jun 29 18:22:12 charon: 16[ENC] parsed INFORMATIONAL_V1 request 2958006015 [ HASH N(INITIAL_CONTACT) ]Jun 29 18:22:12 charon: 16[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (124 bytes)Jun 29 18:22:12 charon: 06[NET] sending packet: from FW_WAN_IP[500] to VPN_CLIENT_PUB_IP[500] (92 bytes)Jun 29 18:22:12 charon: 06[ENC] generating TRANSACTION request 4167000247 [ HASH CPRQ(X_USER X_PWD) ]Jun 29 18:22:12 charon: 06[ENC] parsed AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]Jun 29 18:22:12 charon: 06[NET] received packet: from VPN_CLIENT_PUB_IP[500] to FW_WAN_IP[500] (136 bytes)Jun 29 18:22:11 charon: 06[NET] sending packet: from FW_WAN_IP[500] to VPN_CLIENT_PUB_IP[500] (468 bytes)Jun 29 18:22:11 charon: 06[ENC] generating AGGRESSIVE response 0 [ SA KE No ID V V V V V NAT-D NAT-D HASH ]Jun 29 18:22:11 charon: 06[CFG] selected peer config "con1"Jun 29 18:22:11 charon: 06[CFG] looking for XAuthInitPSK peer configs matching FW_WAN_IP...VPN_CLIENT_PUB_IP[VPN_PEER_ID]Jun 29 18:22:11 charon: 06[IKE] VPN_CLIENT_PUB_IP is initiating a Aggressive Mode IKE_SAJun 29 18:22:11 charon: 06[IKE] <11> VPN_CLIENT_PUB_IP is initiating a Aggressive Mode IKE_SAJun 29 18:22:11 charon: 06[IKE] received DPD vendor IDJun 29 18:22:11 charon: 06[IKE] <11> received DPD vendor ID
I see at "VPN" -> "IPsec" -> "mobile clients" on the first page an option "network list", did you check this?