Cisco VPN Client + WRVS4400N

Discussion in 'Cisco' started by AF, Jul 17, 2007.

  1. AF

    AF Guest

    I have a new LinkSys / Cisco WRVS4400N that for the most part is
    working flawlessly... BUT I can not establish a VPN tunnel. The client
    work perfectly everywhere else...

    These are the logs from the client when behind the WRVS

    Cisco Systems VPN Client Version 4.8.02.0010
    Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 5.1.2600 Service Pack 2
    Config file directory: C:\Program Files\Cisco Systems\VPN Client

    1 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    2 12:33:57.328 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    3 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    4 12:33:57.343 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    5 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    6 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    7 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    8 12:33:57.359 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    9 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    10 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    11 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    12 12:33:57.375 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    13 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600025
    Attempting to find a Certificate using Serial Hash.

    14 12:33:57.390 07/17/07 Sev=Info/6 CERT/0x63600026
    Found a Certificate using Serial Hash.

    15 12:33:57.390 07/17/07 Sev=Info/6 GUI/0x63B00011
    Reloaded the Certificates in all Certificate Stores successfully.

    16 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100002
    Begin connection process

    17 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100004
    Establish secure connection

    18 12:34:07.093 07/17/07 Sev=Info/4 CM/0x63100024
    Attempt connection with server "nnn.nnn.nnn.nnn"

    19 12:34:07.093 07/17/07 Sev=Info/6 IKE/0x6300003B
    Attempting to establish a connection with nnn.nnn.nnn.nnn.

    20 12:34:07.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
    VID(Unity)) to nnn.nnn.nnn.nnn

    21 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700008
    IPSec driver successfully started

    22 12:34:07.109 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    23 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000021
    Retransmitting last packet!

    24 12:34:12.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

    25 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000021
    Retransmitting last packet!

    26 12:34:17.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

    27 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000021
    Retransmitting last packet!

    28 12:34:22.109 07/17/07 Sev=Info/4 IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to nnn.nnn.nnn.nnn

    29 12:34:27.109 07/17/07 Sev=Info/4 IKE/0x63000017
    Marking IKE SA for deletion (I_Cookie=689E7DFDFDCE29C6
    R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

    30 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x6300004B
    Discarding IKE SA negotiation (I_Cookie=689E7DFDFDCE29C6
    R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

    31 12:34:27.609 07/17/07 Sev=Info/4 CM/0x63100014
    Unable to establish Phase 1 SA with server "nnn.nnn.nnn.nnn" because
    of "DEL_REASON_PEER_NOT_RESPONDING"

    32 12:34:27.609 07/17/07 Sev=Info/5 CM/0x63100025
    Initializing CVPNDrv

    33 12:34:27.609 07/17/07 Sev=Info/6 CM/0x63100046
    Set tunnel established flag in registry to 0.

    34 12:34:27.609 07/17/07 Sev=Info/4 IKE/0x63000001
    IKE received signal to terminate VPN connection

    35 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    36 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    37 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x63700014
    Deleted all keys

    38 12:34:27.609 07/17/07 Sev=Info/4 IPSEC/0x6370000A
    IPSec driver successfully stopped
     
    AF, Jul 17, 2007
    #1
    1. Advertisements

  2. AF

    Scott Perry Guest

    Some routers and network devices do not permit the bi-directional
    communication as nicely as others. A true Cisco router does permit this
    with basic NAT configuration. Just because Cisco bought Linksys does not
    mean that the Linksys products are now as good as the actual Cisco devices.

    Attempt to connect using your Cisco VPN client with the profile using TCP
    and then with UDP. See if the results are different either way.
    We do not know what your VPN server is configured to allow for its
    connections - TCP or UDP or both.
    Your Cisco VPN client will be probably be transmitting in the UDP
    configuration to destination UDP port 500 and 62515.

    --

    ===========
    Scott Perry
    ===========
    Indianapolis, Indiana
    ________________________________________
     
    Scott Perry, Jul 17, 2007
    #2
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.