...2024-01-23T17:11:56-07:00 Informational charon 14[IKE] <0fa995fb-0f0c-4e64-af3c-481ea320004f|1> maximum IKE_SA lifetime 14550s 2024-01-23T17:11:56-07:00 Informational charon 14[IKE] <0fa995fb-0f0c-4e64-af3c-481ea320004f|1> scheduling rekeying in 13110s 2024-01-23T17:11:56-07:00 Informational charon 14[IKE] <0fa995fb-0f0c-4e64-af3c-481ea320004f|1> IKE_SA 0fa995fb-0f0c-4e64-af3c-481ea320004f[1] established between a.a.a.a[a.a.a.a]...b.b.b.b[b.b.b.b] 2024-01-23T17:11:56-07:00 Informational charon 14[IKE] <0fa995fb-0f0c-4e64-af3c-481ea320004f|1> authentication of 'b.b.b.b' with pre-shared key successful...
2024-01-23T17:11:56-07:00 Informational charon 14[IKE] <0fa995fb-0f0c-4e64-af3c-481ea320004f|1> failed to establish CHILD_SA, keeping IKE_SA 2024-01-23T17:11:56-07:00 Informational charon 14[IKE] <0fa995fb-0f0c-4e64-af3c-481ea320004f|1> received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
In looking through the list for ESP proposal the only thing I saw that seemed like it might match is "aes256-sha512-modp1024 [DH2]" just going off the DH2 primarily (Duffie-Hellman #2?) But choosing that doesn't seem to help.
They are using a Cisco ASA 5505 which seems to be a little dated from what I can tell.
Still it didn't seem far off from the configuration I *think* I'm working against, other than the example seemed to show "group 5" being used (1536 bits) instead of 2.