Problems connecting with Cisco VPN client

Discussion in 'Cisco' started by BB, Sep 28, 2006.

  1. BB

    BB Guest

    First, let me say I'm in not very well versed in network issues.

    I'm trying to connect to a client's network through the Cisco VPN
    Client which they sent along with the configuration file. My network
    is behind a Linksys router. I have 2 XP machines (desktop and laptop).
    The laptop connects without any problems, but the desktop will not.
    I've attached the Cisco log files for both connections below. Their
    network administrator tells me that the reason I'm not connecting is
    because of authentication, but that doesn't make sense since the laptop
    can connect without any issues. My guess is that there is a setting
    issue of some kind on the desktop which I can't figure out.

    I do not use XP firewall, have Norton AV and have disabled the Worm
    Protection (though on the laptop it is not disabled and works fine).

    Any ideas/help would be greatly appreciated. If you need me to post
    additional info, please be considerate of my limited knowledge when
    asking.

    B

    ************************ DESKTOP LOG ************************
    Cisco Systems VPN Client Version 4.8.01.0300
    Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 5.1.2600 Service Pack 2
    Config file directory: C:\Program Files\Cisco Systems\VPN Client\

    1 17:17:58.015 09/27/06 Sev=Warning/3 GUI/0xA3B0000B
    Reloaded the Certificates in all Certificate Stores successfully.

    2 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100002
    Begin connection process

    3 17:18:06.281 09/27/06 Sev=Info/4 CVPND/0xE3400001
    Microsoft IPSec Policy Agent service stopped successfully

    4 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100004
    Establish secure connection using Ethernet

    5 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100024
    Attempt connection with server "vpn.edensandavant.com"

    6 17:18:07.281 09/27/06 Sev=Info/6 IKE/0x6300003B
    Attempting to establish a connection with 72.159.147.130.

    7 17:18:07.281 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
    VID(Frag), VID(Nat-T), VID(Unity)) to 72.159.147.130

    8 17:18:07.281 09/27/06 Sev=Info/4 IPSEC/0x63700008
    IPSec driver successfully started

    9 17:18:07.281 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    10 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    11 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity),
    VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from
    72.159.147.130

    12 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer is a Cisco-Unity compliant peer

    13 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports XAUTH

    14 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports DPD

    15 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports NAT-T

    16 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports IKE fragmentation payloads

    17 17:18:07.359 09/27/06 Sev=Info/6 IKE/0x63000001
    IOS Vendor ID Contruction successful

    18 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D,
    NAT-D, VID(?), VID(Unity)) to 72.159.147.130

    19 17:18:07.359 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    20 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000083
    IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

    21 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000072
    Automatic NAT Detection Status:
    Remote end is NOT behind a NAT device
    This end IS behind a NAT device

    22 17:18:07.359 09/27/06 Sev=Info/4 CM/0x6310000E
    Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated
    IKE SA in the system

    23 17:18:17.359 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    24 17:18:27.359 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    25 17:18:37.484 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    26 17:18:47.484 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    27 17:18:57.484 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    28 17:19:07.484 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    29 17:19:17.484 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    30 17:19:27.484 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    31 17:19:37.703 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    32 17:19:47.734 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    33 17:19:57.734 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    34 17:20:07.734 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    35 17:20:17.843 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    36 17:20:27.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    37 17:20:37.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    38 17:20:47.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    39 17:20:57.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    40 17:21:07.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    41 17:21:17.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    42 17:21:27.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    43 17:21:37.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    44 17:21:47.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    45 17:21:57.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    46 17:22:07.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    47 17:22:17.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    48 17:22:27.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    49 17:22:37.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    50 17:22:47.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    51 17:22:57.859 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    52 17:23:07.359 09/27/06 Sev=Info/4 IKE/0x63000017
    Marking IKE SA for deletion (I_Cookie=56E32B7363621FF7
    R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH

    53 17:23:07.359 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130

    54 17:23:07.859 09/27/06 Sev=Info/4 IKE/0x6300004B
    Discarding IKE SA negotiation (I_Cookie=56E32B7363621FF7
    R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH

    55 17:23:07.859 09/27/06 Sev=Info/4 CM/0x63100014
    Unable to establish Phase 1 SA with server "vpn.edensandavant.com"
    because of "DEL_REASON_CANNOT_AUTH"

    56 17:23:07.859 09/27/06 Sev=Info/5 CM/0x63100025
    Initializing CVPNDrv

    57 17:23:07.875 09/27/06 Sev=Info/6 CM/0x63100046
    Set tunnel established flag in registry to 0.

    58 17:23:07.875 09/27/06 Sev=Info/4 IKE/0x63000001
    IKE received signal to terminate VPN connection

    59 17:23:07.890 09/27/06 Sev=Info/4 IKE/0x63000086
    Microsoft IPSec Policy Agent service started successfully

    60 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    61 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    62 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    63 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x6370000A
    IPSec driver successfully stopped


    ************************ LAPTOP LOG ************************
    Cisco Systems VPN Client Version 4.8.01.0300
    Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 5.1.2600 Service Pack 2
    Config file directory: C:\Program Files\Cisco Systems\VPN Client\

    1 17:09:17.656 09/27/06 Sev=Warning/3 GUI/0xA3B0000B
    Reloaded the Certificates in all Certificate Stores successfully.

    2 17:09:18.734 09/27/06 Sev=Info/4 CM/0x63100002
    Begin connection process

    3 17:09:18.750 09/27/06 Sev=Info/4 CVPND/0xE3400001
    Microsoft IPSec Policy Agent service stopped successfully

    4 17:09:18.750 09/27/06 Sev=Info/4 CM/0x63100004
    Establish secure connection using Ethernet

    5 17:09:18.750 09/27/06 Sev=Info/4 CM/0x63100024
    Attempt connection with server "vpn.edensandavant.com"

    6 17:09:18.781 09/27/06 Sev=Info/6 IKE/0x6300003B
    Attempting to establish a connection with 72.159.147.130.

    7 17:09:18.812 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
    VID(Frag), VID(Nat-T), VID(Unity)) to 72.159.147.130

    8 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    9 17:09:18.875 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity),
    VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from
    72.159.147.130

    10 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer is a Cisco-Unity compliant peer

    11 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports XAUTH

    12 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports DPD

    13 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports NAT-T

    14 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x63000001
    Peer supports IKE fragmentation payloads

    15 17:09:18.906 09/27/06 Sev=Info/6 IKE/0x63000001
    IOS Vendor ID Contruction successful

    16 17:09:18.906 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D,
    NAT-D, VID(?), VID(Unity)) to 72.159.147.130

    17 17:09:18.906 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    18 17:09:18.906 09/27/06 Sev=Info/4 IKE/0x63000083
    IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

    19 17:09:18.906 09/27/06 Sev=Info/5 IKE/0x63000072
    Automatic NAT Detection Status:
    Remote end is NOT behind a NAT device
    This end IS behind a NAT device

    20 17:09:18.906 09/27/06 Sev=Info/4 CM/0x6310000E
    Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated
    IKE SA in the system

    21 17:09:18.906 09/27/06 Sev=Info/4 IPSEC/0x63700008
    IPSec driver successfully started

    22 17:09:18.906 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    23 17:09:18.906 09/27/06 Sev=Info/6 IPSEC/0x6370002C
    Sent 1116 packets, 0 were fragmented.

    24 17:09:18.953 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    25 17:09:18.953 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 72.159.147.130

    26 17:09:18.953 09/27/06 Sev=Info/4 CM/0x63100015
    Launch xAuth application

    27 17:09:18.984 09/27/06 Sev=Info/4 CM/0x63100017
    xAuth application returned

    28 17:09:18.984 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.130

    29 17:09:19.046 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    30 17:09:19.046 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 72.159.147.130

    31 17:09:19.046 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.130

    32 17:09:19.046 09/27/06 Sev=Info/4 CM/0x6310000E
    Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated
    IKE SA in the system

    33 17:09:19.062 09/27/06 Sev=Info/5 IKE/0x6300005E
    Client sending a firewall request to concentrator

    34 17:09:19.062 09/27/06 Sev=Info/5 IKE/0x6300005D
    Firewall Policy: Product=Cisco Systems Integrated Client Firewall,
    Capability= (Centralized Protection Policy).

    35 17:09:19.062 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.130

    36 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    37 17:09:19.125 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 72.159.147.130

    38 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x63000010
    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value =
    192.168.50.250

    39 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x63000010
    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value =
    255.255.255.0

    40 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x63000010
    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value =
    192.168.20.21

    41 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x63000010
    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : ,
    value = 192.168.20.21

    42 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000001

    43 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of
    split_nets), value = 0x00000004

    44 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000F
    SPLIT_NET #1
    subnet = 192.168.9.0
    mask = 255.255.255.0
    protocol = 0
    src port = 0
    dest port=0

    45 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000F
    SPLIT_NET #2
    subnet = 192.168.10.0
    mask = 255.255.255.0
    protocol = 0
    src port = 0
    dest port=0

    46 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000F
    SPLIT_NET #3
    subnet = 192.168.20.0
    mask = 255.255.255.0
    protocol = 0
    src port = 0
    dest port=0

    47 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000F
    SPLIT_NET #4
    subnet = 192.168.30.0
    mask = 255.255.255.0
    protocol = 0
    src port = 0
    dest port=0

    48 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000

    49 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000E
    MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems,
    Inc ASA5510 Version 7.0(4) built by builders on Thu 13-Oct-05 21:43

    50 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = Received and using NAT-T port number ,
    value = 0x00001194

    51 17:09:19.125 09/27/06 Sev=Info/4 CM/0x63100019
    Mode Config data received

    52 17:09:19.140 09/27/06 Sev=Info/4 IKE/0x63000056
    Received a key request from Driver: Local IP = 192.168.50.250, GW IP =
    72.159.147.130, Remote IP = 0.0.0.0

    53 17:09:19.140 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 72.159.147.130

    54 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    55 17:09:19.218 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from
    72.159.147.130

    56 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x63000045
    RESPONDER-LIFETIME notify has value of 86400 seconds

    57 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x63000047
    This SA has already been alive for 1 seconds, setting expiry to 86399
    seconds from now

    58 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    59 17:09:19.218 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID,
    NOTIFY:STATUS_RESP_LIFETIME) from 72.159.147.130

    60 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x63000045
    RESPONDER-LIFETIME notify has value of 28800 seconds

    61 17:09:19.218 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK QM *(HASH) to 72.159.147.130

    62 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x63000059
    Loading IPsec SA (MsgID=2A699BE2 OUTBOUND SPI = 0x7B12D7C2 INBOUND SPI
    = 0x39E7F88B)

    63 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x63000025
    Loaded OUTBOUND ESP SPI: 0x7B12D7C2

    64 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x63000026
    Loaded INBOUND ESP SPI: 0x39E7F88B

    65 17:09:19.328 09/27/06 Sev=Info/5 CVPND/0x63400013
    Destination Netmask Gateway Interface
    Metric
    0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102
    20
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1
    1
    169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102
    20
    192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102
    20
    224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102
    20
    255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0
    1
    255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102
    1


    66 17:09:19.968 09/27/06 Sev=Info/4 CM/0x63100034
    The Virtual Adapter was enabled:
    IP=192.168.50.250/255.255.255.0
    DNS=192.168.20.21,0.0.0.0
    WINS=192.168.20.21,0.0.0.0
    Domain=
    Split DNS Names=

    67 17:09:19.968 09/27/06 Sev=Info/5 CVPND/0x63400013
    Destination Netmask Gateway Interface
    Metric
    0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102
    20
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1
    1
    169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102
    20
    192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102
    20
    192.168.50.0 255.255.255.0 192.168.50.250 192.168.50.250
    20
    192.168.50.250 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.50.255 255.255.255.255 192.168.50.250 192.168.50.250
    20
    224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102
    20
    224.0.0.0 240.0.0.0 192.168.50.250 192.168.50.250
    20
    255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102
    1
    255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0
    1
    255.255.255.255 255.255.255.255 192.168.50.250 192.168.50.250
    1


    68 17:09:19.968 09/27/06 Sev=Warning/2 CVPND/0xE3400013
    AddRoute failed to add a route: code 87
    Destination 192.168.20.255
    Netmask 255.255.255.255
    Gateway 192.168.50.250
    Interface 192.168.50.250

    69 17:09:19.968 09/27/06 Sev=Warning/2 CM/0xA3100024
    Unable to add route. Network: c0a814ff, Netmask: ffffffff, Interface:
    c0a832fa, Gateway: c0a832fa.

    70 17:09:19.968 09/27/06 Sev=Info/4 CM/0x63100038
    Successfully saved route changes to file.

    71 17:09:19.984 09/27/06 Sev=Info/5 CVPND/0x63400013
    Destination Netmask Gateway Interface
    Metric
    0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102
    20
    72.159.147.130 255.255.255.255 192.168.20.1 192.168.20.102
    1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1
    1
    169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.9.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.10.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102
    20
    192.168.20.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.20.1 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102
    20
    192.168.30.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.50.0 255.255.255.0 192.168.50.250 192.168.50.250
    20
    192.168.50.250 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.50.255 255.255.255.255 192.168.50.250 192.168.50.250
    20
    224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102
    20
    224.0.0.0 240.0.0.0 192.168.50.250 192.168.50.250
    20
    255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102
    1
    255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0
    1
    255.255.255.255 255.255.255.255 192.168.50.250 192.168.50.250
    1


    72 17:09:19.984 09/27/06 Sev=Info/6 CM/0x63100036
    The routing table was updated for the Virtual Adapter

    73 17:09:20.000 09/27/06 Sev=Info/4 CM/0x6310001A
    One secure connection established

    74 17:09:20.093 09/27/06 Sev=Info/4 CM/0x6310003B
    Address watch added for 192.168.20.102. Current hostname: DELL_D610,
    Current address(es): 192.168.50.250, 192.168.20.102.

    75 17:09:20.109 09/27/06 Sev=Info/4 CM/0x6310003B
    Address watch added for 192.168.50.250. Current hostname: DELL_D610,
    Current address(es): 192.168.50.250, 192.168.20.102.

    76 17:09:20.109 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    77 17:09:20.109 09/27/06 Sev=Info/4 IPSEC/0x63700010
    Created a new key structure

    78 17:09:20.109 09/27/06 Sev=Info/4 IPSEC/0x6370000F
    Added key with SPI=0xc2d7127b into key list

    79 17:09:20.109 09/27/06 Sev=Info/4 IPSEC/0x63700010
    Created a new key structure

    80 17:09:20.109 09/27/06 Sev=Info/4 IPSEC/0x6370000F
    Added key with SPI=0x8bf8e739 into key list

    81 17:09:20.109 09/27/06 Sev=Info/4 IPSEC/0x6370002F
    Assigned VA private interface addr 192.168.50.250

    82 17:09:20.109 09/27/06 Sev=Info/6 CM/0x63100046
    Set tunnel established flag in registry to 1.

    83 17:09:21.968 09/27/06 Sev=Info/4 IPSEC/0x63700019
    Activate outbound key with SPI=0xc2d7127b for inbound key with
    SPI=0x8bf8e739

    84 17:10:04.468 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to
    72.159.147.130

    85 17:10:04.468 09/27/06 Sev=Info/6 IKE/0x6300003D
    Sending DPD request to 72.159.147.130, our seq# = 205082945

    86 17:10:04.515 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    87 17:10:04.515 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from
    72.159.147.130

    88 17:10:04.515 09/27/06 Sev=Info/5 IKE/0x63000040
    Received DPD ACK from 72.159.147.130, seq# received = 205082945, seq#
    expected = 205082945

    89 17:10:19.968 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to
    72.159.147.130

    90 17:10:19.968 09/27/06 Sev=Info/6 IKE/0x6300003D
    Sending DPD request to 72.159.147.130, our seq# = 205082946

    91 17:10:20.015 09/27/06 Sev=Info/5 IKE/0x6300002F
    Received ISAKMP packet: peer = 72.159.147.130

    92 17:10:20.015 09/27/06 Sev=Info/4 IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from
    72.159.147.130

    93 17:10:20.015 09/27/06 Sev=Info/5 IKE/0x63000040
    Received DPD ACK from 72.159.147.130, seq# received = 205082946, seq#
    expected = 205082946

    94 17:10:28.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    95 17:10:38.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    96 17:10:48.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    97 17:10:58.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    98 17:11:18.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    99 17:11:28.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    100 17:11:38.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    101 17:11:58.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    102 17:12:08.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    103 17:12:28.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    104 17:12:38.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    105 17:12:58.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    106 17:13:08.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    107 17:13:18.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    108 17:13:38.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    109 17:13:48.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    110 17:14:08.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    111 17:14:18.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    112 17:14:28.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    113 17:14:48.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    114 17:14:58.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    115 17:15:18.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    116 17:15:28.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    117 17:15:58.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    118 17:16:08.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    119 17:16:28.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    120 17:16:38.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    121 17:16:58.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    122 17:17:08.968 09/27/06 Sev=Info/6 IKE/0x63000055
    Sent a keepalive on the IPSec SA

    123 17:17:09.625 09/27/06 Sev=Info/6 GUI/0x63B0000D
    Disconnecting VPN connection.

    124 17:17:09.625 09/27/06 Sev=Info/4 CM/0x6310000A
    Secure connections terminated

    125 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000001
    IKE received signal to terminate VPN connection

    126 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130

    127 17:17:09.625 09/27/06 Sev=Info/5 IKE/0x63000018
    Deleting IPsec SA: (OUTBOUND SPI = 7B12D7C2 INBOUND SPI = 39E7F88B)

    128 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000049
    Discarding IPsec SA negotiation, MsgID=2A699BE2

    129 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000017
    Marking IKE SA for deletion (I_Cookie=64AAF2FD5DA2CB65
    R_Cookie=BB643A0F26D3EED6) reason = DEL_REASON_RESET_SADB

    130 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130

    131 17:17:09.625 09/27/06 Sev=Info/5 CVPND/0x63400013
    Destination Netmask Gateway Interface
    Metric
    0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102
    20
    72.159.147.130 255.255.255.255 192.168.20.1 192.168.20.102
    1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1
    1
    169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.9.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.10.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102
    20
    192.168.20.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.20.1 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102
    20
    192.168.30.0 255.255.255.0 192.168.50.250 192.168.50.250
    1
    192.168.50.0 255.255.255.0 192.168.50.250 192.168.50.250
    20
    192.168.50.250 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.50.255 255.255.255.255 192.168.50.250 192.168.50.250
    20
    224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102
    20
    224.0.0.0 240.0.0.0 192.168.50.250 192.168.50.250
    20
    255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102
    1
    255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0
    1
    255.255.255.255 255.255.255.255 192.168.50.250 192.168.50.250
    1


    132 17:17:09.640 09/27/06 Sev=Info/6 CM/0x63100037
    The routing table was returned to original state prior to Virtual
    Adapter

    133 17:17:11.187 09/27/06 Sev=Info/5 CVPND/0x63400013
    Destination Netmask Gateway Interface
    Metric
    0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102
    20
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1
    1
    169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102
    1
    192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102
    20
    192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1
    20
    192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102
    20
    224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102
    20
    255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0
    1
    255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102
    1


    134 17:17:11.187 09/27/06 Sev=Info/4 CM/0x63100035
    The Virtual Adapter was disabled

    135 17:17:11.187 09/27/06 Sev=Info/4 IKE/0x6300004B
    Discarding IKE SA negotiation (I_Cookie=64AAF2FD5DA2CB65
    R_Cookie=BB643A0F26D3EED6) reason = DEL_REASON_RESET_SADB

    136 17:17:11.187 09/27/06 Sev=Info/4 CM/0x63100013
    Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE
    SA, 0 User Authenticated IKE SA in the system

    137 17:17:11.187 09/27/06 Sev=Info/5 CM/0x63100025
    Initializing CVPNDrv

    138 17:17:11.187 09/27/06 Sev=Info/6 CM/0x63100031
    Tunnel to headend device vpn.edensandavant.com disconnected: duration:
    0 days 0:7:51

    139 17:17:11.203 09/27/06 Sev=Info/6 CM/0x63100046
    Set tunnel established flag in registry to 0.

    140 17:17:11.203 09/27/06 Sev=Info/4 IKE/0x63000086
    Microsoft IPSec Policy Agent service started successfully

    141 17:17:11.203 09/27/06 Sev=Info/5 CM/0x63100025
    Initializing CVPNDrv

    142 17:17:11.218 09/27/06 Sev=Info/6 CM/0x63100046
    Set tunnel established flag in registry to 0.

    143 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700013
    Delete internal key with SPI=0x8bf8e739

    144 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000C
    Key deleted by SPI 0x8bf8e739

    145 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700013
    Delete internal key with SPI=0xc2d7127b

    146 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000C
    Key deleted by SPI 0xc2d7127b

    147 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    148 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    149 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000A
    IPSec driver successfully stopped

    150 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys
    BB, Sep 28, 2006
    #1
    1. Advertising

  2. BB <> wrote:
    > Not running Microsoft Firewall and have disabled Norton Antivirus.


    Try to use UDP encapsulation (NAT-T), or better yet TCP
    encapsulation (if configured on the concentrator end)
    instead of pure IPSEC. On both your home computers.

    --
    andrei
    Andrei Ivanov, Oct 2, 2006
    #2
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. MP
    Replies:
    2
    Views:
    12,232
  2. Lars Bebensee
    Replies:
    0
    Views:
    984
    Lars Bebensee
    Feb 12, 2004
  3. jarcar
    Replies:
    0
    Views:
    579
    jarcar
    Feb 12, 2004
  4. Mark
    Replies:
    2
    Views:
    1,236
  5. Ned
    Replies:
    0
    Views:
    540
Loading...

Share This Page