cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1523
Views
0
Helpful
0
Replies

Cisco VPN Client For WIndows 64 bit

Bought a new Dell XPN 15 with Windows 10 Home edition installed. Installed VPN client using work provided installer. Tried to connect. Connects and disconnects in about 30 seconds with Reason: 442. Log of the VPN client is below. It is a bit verbose but I didn't want to omit any details. The events around disconnection are in bold+italics. About 3/4 of the way down. 

 

Really puzzled. Worked on Windows 7 for last 10 years without any problems. Any help will be greatly appreciated.

 

Thanks

 

Cisco Systems VPN Client Version 5.0.07.0290
Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.2.9200

451 11:36:52.769 02/22/21 Sev=Info/4 CM/0x63100002
Begin connection process

452 11:36:52.782 02/22/21 Sev=Info/4 CM/0x63100004
Establish secure connection

453 11:36:52.782 02/22/21 Sev=Info/4 CM/0x63100024
Attempt connection with server "173.68.151.26"

454 11:36:52.789 02/22/21 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 173.68.151.26.

455 11:36:52.791 02/22/21 Sev=Info/4 IKE/0x63000001
Starting IKE Phase 1 Negotiation

456 11:36:52.800 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 173.68.151.26

457 11:36:52.884 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

458 11:36:52.894 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 173.68.151.26

459 11:36:52.894 02/22/21 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer

460 11:36:52.894 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH

461 11:36:52.894 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports DPD

462 11:36:52.895 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T

463 11:36:52.895 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads

464 11:36:52.896 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text

465 11:36:52.902 02/22/21 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful

466 11:36:52.902 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 173.68.151.26

467 11:36:52.904 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

468 11:36:52.904 02/22/21 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0xEA89, Remote Port = 0x1194

469 11:36:52.905 02/22/21 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device

470 11:36:52.905 02/22/21 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

471 11:36:52.929 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

472 11:36:52.929 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 173.68.151.26

473 11:36:52.929 02/22/21 Sev=Info/4 CM/0x63100015
Launch xAuth application

474 11:36:52.941 02/22/21 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started

475 11:36:52.941 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

476 11:36:52.942 02/22/21 Sev=Info/6 IPSEC/0x6370002C
Sent 298 packets, 0 were fragmented.

477 11:36:52.948 02/22/21 Sev=Info/6 GUI/0x63B00012
Authentication request attributes is Ah.

478 11:37:03.190 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

479 11:37:13.383 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

480 11:37:17.011 02/22/21 Sev=Info/4 CM/0x63100017
xAuth application returned

481 11:37:17.012 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 173.68.151.26

482 11:37:19.515 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

483 11:37:19.515 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 173.68.151.26

484 11:37:19.515 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 173.68.151.26

485 11:37:19.516 02/22/21 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

486 11:37:19.522 02/22/21 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator

487 11:37:19.523 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 173.68.151.26

488 11:37:19.589 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

489 11:37:19.589 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 173.68.151.26

490 11:37:19.589 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 172.16.201.121

491 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.0

492 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.13.37.190

493 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.13.37.120

494 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = You are authorized to use this system for approved business purposes only. Use for any other pupose is prohibited. Authorized and unauthorized activities maybe monitored!


495 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000

496 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000

497 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc ASA5515 Version 9.6(4)36 built by builders on Thu 07-Nov-19 13:37 PST

498 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SMARTCARD_REMOVAL_DISCONNECT: , value = 0x00000001

499 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194

500 11:37:19.599 02/22/21 Sev=Info/4 CM/0x63100019
Mode Config data received

501 11:37:19.605 02/22/21 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 172.16.201.121, GW IP = 173.68.151.26, Remote IP = 0.0.0.0

502 11:37:19.605 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 173.68.151.26

503 11:37:19.656 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

504 11:37:19.656 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 173.68.151.26

505 11:37:19.656 02/22/21 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds

506 11:37:19.669 02/22/21 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 27 seconds, setting expiry to 86373 seconds from now

507 11:37:19.675 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

508 11:37:19.675 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 173.68.151.26

509 11:37:19.675 02/22/21 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds

510 11:37:19.683 02/22/21 Sev=Info/5 IKE/0x63000046
RESPONDER-LIFETIME notify has value of 4608000 kb

511 11:37:19.683 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 173.68.151.26

512 11:37:19.683 02/22/21 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=AFDCF37F OUTBOUND SPI = 0x17595D01 INBOUND SPI = 0x81AEFB9D)

513 11:37:19.683 02/22/21 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x17595D01

514 11:37:19.684 02/22/21 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0x81AEFB9D

515 11:37:19.707 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 50
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
169.254.0.0 255.255.0.0 169.254.204.215 169.254.204.215 291
169.254.204.215 255.255.255.255 169.254.204.215 169.254.204.215 291
169.254.255.255 255.255.255.255 169.254.204.215 169.254.204.215 291
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 306
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 169.254.204.215 169.254.204.215 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 306
255.255.255.255 255.255.255.255 169.254.204.215 169.254.204.215 291


516 11:37:19.771 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0

517 11:37:20.082 02/22/21 Sev=Info/6 CVPND/0x63400001
Launch VAInst64 to control IPSec Virtual Adapter

518 11:37:20.766 02/22/21 Sev=Info/6 CVPND/0x63400001
Launch VAInst64 to control IPSec Virtual Adapter

519 11:37:30.801 02/22/21 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=172.16.201.121/255.255.255.0
DNS=10.13.37.190,10.13.37.120
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=

520 11:37:30.801 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 50
0.0.0.0 0.0.0.0 172.16.201.1 169.254.204.215 36
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 306
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 0.0.0.0 169.254.204.215 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 306
255.255.255.255 255.255.255.255 0.0.0.0 169.254.204.215 291


521 11:37:34.891 02/22/21 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route with metric of 0: code 160
Destination 169.254.255.255
Netmask 255.255.255.255
Gateway 172.16.201.1
Interface 172.16.201.121

522 11:37:34.900 02/22/21 Sev=Warning/2 CM/0xA3100024
Unable to add route. Network: a9feffff, Netmask: ffffffff, Interface: ac10c979, Gateway: ac10c901.

523 11:37:34.900 02/22/21 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route with metric of 0: code 160
Destination 192.168.1.0
Netmask 255.255.255.0
Gateway 172.16.201.1
Interface 172.16.201.121

524 11:37:34.901 02/22/21 Sev=Warning/2 CM/0xA3100024
Unable to add route. Network: c0a80100, Netmask: ffffff00, Interface: ac10c979, Gateway: ac10c901.

525 11:37:34.901 02/22/21 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route with metric of 0: code 160
Destination 192.168.1.2
Netmask 255.255.255.255
Gateway 172.16.201.1
Interface 172.16.201.121

526 11:37:34.901 02/22/21 Sev=Warning/2 CM/0xA3100024
Unable to add route. Network: c0a80102, Netmask: ffffffff, Interface: ac10c979, Gateway: ac10c901.

527 11:37:34.905 02/22/21 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.

528 11:37:34.906 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 50
0.0.0.0 0.0.0.0 172.16.201.1 172.16.201.121 36
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
169.254.0.0 255.255.0.0 172.16.201.1 172.16.201.121 306
172.16.201.0 255.255.255.0 172.16.201.121 172.16.201.121 291
172.16.201.121 255.255.255.255 172.16.201.121 172.16.201.121 291
172.16.201.255 255.255.255.255 172.16.201.121 172.16.201.121 291
173.68.151.26 255.255.255.255 192.168.1.1 192.168.1.2 100
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 306
192.168.1.1 255.255.255.255 192.168.1.2 192.168.1.2 100
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 172.16.201.1 172.16.201.121 2727
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 172.16.201.121 172.16.201.121 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 306
255.255.255.255 255.255.255.255 172.16.201.121 172.16.201.121 291


529 11:37:34.907 02/22/21 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter

530 11:37:34.916 02/22/21 Sev=Warning/2 CM/0xE3100002
OpenService

531 11:37:34.926 02/22/21 Sev=Info/4 CM/0x6310001A
One secure connection established

532 11:37:34.927 02/22/21 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.2. Current hostname: SVERMA-XPS15, Current address(es): 172.16.201.121, 192.168.1.2.

533 11:37:34.929 02/22/21 Sev=Info/4 CM/0x6310003B
Address watch added for 172.16.201.121. Current hostname: SVERMA-XPS15, Current address(es): 172.16.201.121, 192.168.1.2.

534 11:37:34.929 02/22/21 Sev=Info/5 CM/0x63100001
Did not find the Smartcard to watch for removal

535 11:37:34.929 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

536 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x63700010
Created a new key structure

537 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x015d5917 into key list

538 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x63700010
Created a new key structure

539 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x9dfbae81 into key list

540 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 172.16.201.121

541 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x63700037
Configure public interface: 192.168.1.2. SG: 173.68.151.26

542 11:37:34.931 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

543 11:37:37.067 02/22/21 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 1.

544 11:37:37.630 02/22/21 Sev=Info/4 IPSEC/0x63700019
Activate outbound key with SPI=0x015d5917 for inbound key with SPI=0x9dfbae81

545 11:37:50.189 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 173.68.151.26

546 11:37:50.190 02/22/21 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 173.68.151.26, our seq# = 2161866051

547 11:37:50.242 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

548 11:37:50.251 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 173.68.151.26

549 11:37:50.251 02/22/21 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 173.68.151.26, seq# received = 2161866051, seq# expected = 2161866051

550 11:38:00.750 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 173.68.151.26

551 11:38:00.751 02/22/21 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 173.68.151.26, our seq# = 2161866052

552 11:38:00.804 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26

553 11:38:00.804 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 173.68.151.26

554 11:38:00.804 02/22/21 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 173.68.151.26, seq# received = 2161866052, seq# expected = 2161866052

555 11:38:10.381 02/22/21 Sev=Warning/3 CM/0xA3100027
Adapter address 192.168.1.2 has changed or not detected. Current address(es): 172.16.201.121.

556 11:38:10.382 02/22/21 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection

557 11:38:10.382 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 173.68.151.26

558 11:38:10.383 02/22/21 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 17595D01 INBOUND SPI = 81AEFB9D)

559 11:38:10.384 02/22/21 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=AFDCF37F

560 11:38:10.385 02/22/21 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=33002231A4E95EE1 R_Cookie=AFD2D2C0BA09C594) reason = DEL_REASON_ADDRESS_CHANGE

561 11:38:10.385 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 173.68.151.26

562 11:38:10.403 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.201.1 172.16.201.121 36
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
169.254.0.0 255.255.0.0 172.16.201.1 172.16.201.121 306
172.16.201.0 255.255.255.0 172.16.201.121 172.16.201.121 291
172.16.201.121 255.255.255.255 172.16.201.121 172.16.201.121 291
172.16.201.255 255.255.255.255 172.16.201.121 172.16.201.121 291
192.168.1.255 255.255.255.255 172.16.201.1 172.16.201.121 2727
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 172.16.201.121 172.16.201.121 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 172.16.201.121 172.16.201.121 291


563 11:38:12.439 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1168

564 11:38:12.439 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1168

565 11:38:12.439 02/22/21 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter

566 11:38:12.518 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CheckUpVASettings: Found IPADDR entry addr=172.16.201.121, error 0

567 11:38:13.532 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0

568 11:38:13.839 02/22/21 Sev=Info/6 CVPND/0x63400001
Launch VAInst64 to control IPSec Virtual Adapter

569 11:38:14.256 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 55
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 311
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 311
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 311
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 311
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 311


570 11:38:14.256 02/22/21 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled

571 11:38:14.256 02/22/21 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=33002231A4E95EE1 R_Cookie=AFD2D2C0BA09C594) reason = DEL_REASON_ADDRESS_CHANGE

572 11:38:14.256 02/22/21 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

573 11:38:14.256 02/22/21 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv

574 11:38:14.275 02/22/21 Sev=Info/6 CM/0x63100031
Tunnel to headend device 173.68.151.26 disconnected: duration: 0 days 0:0:40

575 11:38:14.281 02/22/21 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.

576 11:38:14.292 02/22/21 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv

577 11:38:14.292 02/22/21 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.

578 11:38:14.296 02/22/21 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x9dfbae81

579 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x9dfbae81

580 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x015d5917

581 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x015d5917

582 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700010
Created a new key structure

583 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x6370000B
Key requested

584 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x00000000

585 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

586 11:38:14.298 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

587 11:38:14.298 02/22/21 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped

588 11:38:14.298 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

589 11:38:14.298 02/22/21 Sev=Warning/2 IKE/0xA3000067
Received an IPC message during invalid state (IKE_MAIN:512)

 

0 Replies 0