Cisco VPN Client + WRVS4400N

Discussion in 'Cisco' started by AF, Jul 17, 2007.

  1. AF

    AF Guest

    I have a new LinkSys / Cisco WRVS4400N that for the most part is
    working flawlessly... BUT I can not establish a VPN tunnel. The client
    work perfectly everywhere else...

    These are the logs from the client when behind the WRVS

    Cisco Systems VPN Client Version 4.8.02.0010
    Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 5.1.2600 Service Pack 2
    Config file directory: C:\Program Files\Cisco Systems\VPN Client

    1 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    2 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    3 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    4 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    5 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    6 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    7 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    8 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    9 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    10 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    11 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    12 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    13 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    14 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    15 12:33:57.390 07/17/07 Sev=Info/6 GUI/0x63B00011
    Reloaded the Certificates in all Certificate Stores successfully.

    16 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100002
    Begin connection process

    17 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100004
    Establish secure connection

    18 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100024
    Attempt connection with server "nnn.nnn.nnn.nnn"

    19 12:34:07.093 07/17/07 Sev=Info/6 IKE/0x6300003B
    Attempting to establish a connection with nnn.nnn.nnn.nnn.

    20 12:34:07.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
    VID(Unity)) to nnn.nnn.nnn.nnn

    21 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700008
    IPSec driver successfully started

    22 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    23 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000021
    Retransmitting last packet!

    24 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

    25 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000021
    Retransmitting last packet!

    26 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

    27 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000021
    Retransmitting last packet!

    28 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

    29 12:34:27.109 07/17/07 Sev=Info/4 IKE/0x63000017
    Marking IKE SA for deletion (I_Cookie=689E7DFDFDCE29C6
    R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

    30 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x6300004B
    Discarding IKE SA negotiation (I_Cookie=689E7DFDFDCE29C6
    R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

    31 12:34:27.609 07/17/07 Sev=Info/4 CM/0x63100014
    Unable to establish Phase 1 SA with server "nnn.nnn.nnn.nnn" because
    of "DEL_REASON_PEER_NOT_RESPONDING"

    32 12:34:27.609 07/17/07 Sev=Info/5 CM/0x63100025
    Initializing CVPNDrv

    33 12:34:27.609 07/17/07 Sev=Info/6 CM/0x63100046
    Set tunnel established flag in registry to 0.

    34 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x63000001
    IKE received signal to terminate VPN connection

    35 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    36 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    37 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    38 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x6370000A
    IPSec driver successfully stopped
     
    AF, Jul 17, 2007
    #1
    1. Advertising

  2. AF

    Scott Perry Guest

    Some routers and network devices do not permit the bi-directional
    communication as nicely as others. A true Cisco router does permit this
    with basic NAT configuration. Just because Cisco bought Linksys does not
    mean that the Linksys products are now as good as the actual Cisco devices.

    Attempt to connect using your Cisco VPN client with the profile using TCP
    and then with UDP. See if the results are different either way.
    We do not know what your VPN server is configured to allow for its
    connections - TCP or UDP or both.
    Your Cisco VPN client will be probably be transmitting in the UDP
    configuration to destination UDP port 500 and 62515.

    --

    ===========
    Scott Perry
    ===========
    Indianapolis, Indiana
    ________________________________________
    "AF" <> wrote in message
    news:...
    >I have a new LinkSys / Cisco WRVS4400N that for the most part is
    > working flawlessly... BUT I can not establish a VPN tunnel. The client
    > work perfectly everywhere else...
    >
    > These are the logs from the client when behind the WRVS
    >
    > Cisco Systems VPN Client Version 4.8.02.0010
    > Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
    > Client Type(s): Windows, WinNT
    > Running on: 5.1.2600 Service Pack 2
    > Config file directory: C:\Program Files\Cisco Systems\VPN Client
    >
    > 1 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 2 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 3 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 4 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 5 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 6 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 7 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 8 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 9 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 10 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 11 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 12 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 13 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600025
    > Attempting to find a Certificate using Serial Hash.
    >
    > 14 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600026
    > Found a Certificate using Serial Hash.
    >
    > 15 12:33:57.390 07/17/07 Sev=Info/6 GUI/0x63B00011
    > Reloaded the Certificates in all Certificate Stores successfully.
    >
    > 16 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100002
    > Begin connection process
    >
    > 17 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100004
    > Establish secure connection
    >
    > 18 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100024
    > Attempt connection with server "nnn.nnn.nnn.nnn"
    >
    > 19 12:34:07.093 07/17/07 Sev=Info/6 IKE/0x6300003B
    > Attempting to establish a connection with nnn.nnn.nnn.nnn.
    >
    > 20 12:34:07.109 07/17/07 Sev=Info/4 IKE/0x63000013
    > SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
    > VID(Unity)) to nnn.nnn.nnn.nnn
    >
    > 21 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700008
    > IPSec driver successfully started
    >
    > 22 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700014
    > Deleted all keys
    >
    > 23 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000021
    > Retransmitting last packet!
    >
    > 24 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000013
    > SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn
    >
    > 25 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000021
    > Retransmitting last packet!
    >
    > 26 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000013
    > SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn
    >
    > 27 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000021
    > Retransmitting last packet!
    >
    > 28 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000013
    > SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn
    >
    > 29 12:34:27.109 07/17/07 Sev=Info/4 IKE/0x63000017
    > Marking IKE SA for deletion (I_Cookie=689E7DFDFDCE29C6
    > R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
    >
    > 30 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x6300004B
    > Discarding IKE SA negotiation (I_Cookie=689E7DFDFDCE29C6
    > R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
    >
    > 31 12:34:27.609 07/17/07 Sev=Info/4 CM/0x63100014
    > Unable to establish Phase 1 SA with server "nnn.nnn.nnn.nnn" because
    > of "DEL_REASON_PEER_NOT_RESPONDING"
    >
    > 32 12:34:27.609 07/17/07 Sev=Info/5 CM/0x63100025
    > Initializing CVPNDrv
    >
    > 33 12:34:27.609 07/17/07 Sev=Info/6 CM/0x63100046
    > Set tunnel established flag in registry to 0.
    >
    > 34 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x63000001
    > IKE received signal to terminate VPN connection
    >
    > 35 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    > Deleted all keys
    >
    > 36 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    > Deleted all keys
    >
    > 37 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    > Deleted all keys
    >
    > 38 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x6370000A
    > IPSec driver successfully stopped
    >
     
    Scott Perry, Jul 17, 2007
    #2
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. MP
    Replies:
    2
    Views:
    12,432
  2. jarcar
    Replies:
    0
    Views:
    676
    jarcar
    Feb 12, 2004
  3. Ned
    Replies:
    0
    Views:
    601
  4. walepiper
    Replies:
    0
    Views:
    1,333
    walepiper
    Aug 3, 2010
  5. Jeff
    Replies:
    0
    Views:
    742
Loading...

Share This Page