02-22-2021 08:57 AM
Bought a new Dell XPN 15 with Windows 10 Home edition installed. Installed VPN client using work provided installer. Tried to connect. Connects and disconnects in about 30 seconds with Reason: 442. Log of the VPN client is below. It is a bit verbose but I didn't want to omit any details. The events around disconnection are in bold+italics. About 3/4 of the way down.
Really puzzled. Worked on Windows 7 for last 10 years without any problems. Any help will be greatly appreciated.
Thanks
Cisco Systems VPN Client Version 5.0.07.0290
Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.2.9200
451 11:36:52.769 02/22/21 Sev=Info/4 CM/0x63100002
Begin connection process
452 11:36:52.782 02/22/21 Sev=Info/4 CM/0x63100004
Establish secure connection
453 11:36:52.782 02/22/21 Sev=Info/4 CM/0x63100024
Attempt connection with server "173.68.151.26"
454 11:36:52.789 02/22/21 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 173.68.151.26.
455 11:36:52.791 02/22/21 Sev=Info/4 IKE/0x63000001
Starting IKE Phase 1 Negotiation
456 11:36:52.800 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 173.68.151.26
457 11:36:52.884 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
458 11:36:52.894 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 173.68.151.26
459 11:36:52.894 02/22/21 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
460 11:36:52.894 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
461 11:36:52.894 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports DPD
462 11:36:52.895 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
463 11:36:52.895 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
464 11:36:52.896 02/22/21 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
465 11:36:52.902 02/22/21 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
466 11:36:52.902 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 173.68.151.26
467 11:36:52.904 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
468 11:36:52.904 02/22/21 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0xEA89, Remote Port = 0x1194
469 11:36:52.905 02/22/21 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
470 11:36:52.905 02/22/21 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
471 11:36:52.929 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
472 11:36:52.929 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 173.68.151.26
473 11:36:52.929 02/22/21 Sev=Info/4 CM/0x63100015
Launch xAuth application
474 11:36:52.941 02/22/21 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
475 11:36:52.941 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
476 11:36:52.942 02/22/21 Sev=Info/6 IPSEC/0x6370002C
Sent 298 packets, 0 were fragmented.
477 11:36:52.948 02/22/21 Sev=Info/6 GUI/0x63B00012
Authentication request attributes is Ah.
478 11:37:03.190 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
479 11:37:13.383 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
480 11:37:17.011 02/22/21 Sev=Info/4 CM/0x63100017
xAuth application returned
481 11:37:17.012 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 173.68.151.26
482 11:37:19.515 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
483 11:37:19.515 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 173.68.151.26
484 11:37:19.515 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 173.68.151.26
485 11:37:19.516 02/22/21 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
486 11:37:19.522 02/22/21 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
487 11:37:19.523 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 173.68.151.26
488 11:37:19.589 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
489 11:37:19.589 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 173.68.151.26
490 11:37:19.589 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 172.16.201.121
491 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.0
492 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.13.37.190
493 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.13.37.120
494 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = You are authorized to use this system for approved business purposes only. Use for any other pupose is prohibited. Authorized and unauthorized activities maybe monitored!
495 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000
496 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
497 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc ASA5515 Version 9.6(4)36 built by builders on Thu 07-Nov-19 13:37 PST
498 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SMARTCARD_REMOVAL_DISCONNECT: , value = 0x00000001
499 11:37:19.594 02/22/21 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
500 11:37:19.599 02/22/21 Sev=Info/4 CM/0x63100019
Mode Config data received
501 11:37:19.605 02/22/21 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 172.16.201.121, GW IP = 173.68.151.26, Remote IP = 0.0.0.0
502 11:37:19.605 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 173.68.151.26
503 11:37:19.656 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
504 11:37:19.656 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 173.68.151.26
505 11:37:19.656 02/22/21 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
506 11:37:19.669 02/22/21 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 27 seconds, setting expiry to 86373 seconds from now
507 11:37:19.675 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
508 11:37:19.675 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 173.68.151.26
509 11:37:19.675 02/22/21 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds
510 11:37:19.683 02/22/21 Sev=Info/5 IKE/0x63000046
RESPONDER-LIFETIME notify has value of 4608000 kb
511 11:37:19.683 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 173.68.151.26
512 11:37:19.683 02/22/21 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=AFDCF37F OUTBOUND SPI = 0x17595D01 INBOUND SPI = 0x81AEFB9D)
513 11:37:19.683 02/22/21 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x17595D01
514 11:37:19.684 02/22/21 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0x81AEFB9D
515 11:37:19.707 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 50
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
169.254.0.0 255.255.0.0 169.254.204.215 169.254.204.215 291
169.254.204.215 255.255.255.255 169.254.204.215 169.254.204.215 291
169.254.255.255 255.255.255.255 169.254.204.215 169.254.204.215 291
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 306
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 169.254.204.215 169.254.204.215 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 306
255.255.255.255 255.255.255.255 169.254.204.215 169.254.204.215 291
516 11:37:19.771 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0
517 11:37:20.082 02/22/21 Sev=Info/6 CVPND/0x63400001
Launch VAInst64 to control IPSec Virtual Adapter
518 11:37:20.766 02/22/21 Sev=Info/6 CVPND/0x63400001
Launch VAInst64 to control IPSec Virtual Adapter
519 11:37:30.801 02/22/21 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=172.16.201.121/255.255.255.0
DNS=10.13.37.190,10.13.37.120
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=
520 11:37:30.801 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 50
0.0.0.0 0.0.0.0 172.16.201.1 169.254.204.215 36
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 306
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 0.0.0.0 169.254.204.215 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 306
255.255.255.255 255.255.255.255 0.0.0.0 169.254.204.215 291
521 11:37:34.891 02/22/21 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route with metric of 0: code 160
Destination 169.254.255.255
Netmask 255.255.255.255
Gateway 172.16.201.1
Interface 172.16.201.121
522 11:37:34.900 02/22/21 Sev=Warning/2 CM/0xA3100024
Unable to add route. Network: a9feffff, Netmask: ffffffff, Interface: ac10c979, Gateway: ac10c901.
523 11:37:34.900 02/22/21 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route with metric of 0: code 160
Destination 192.168.1.0
Netmask 255.255.255.0
Gateway 172.16.201.1
Interface 172.16.201.121
524 11:37:34.901 02/22/21 Sev=Warning/2 CM/0xA3100024
Unable to add route. Network: c0a80100, Netmask: ffffff00, Interface: ac10c979, Gateway: ac10c901.
525 11:37:34.901 02/22/21 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route with metric of 0: code 160
Destination 192.168.1.2
Netmask 255.255.255.255
Gateway 172.16.201.1
Interface 172.16.201.121
526 11:37:34.901 02/22/21 Sev=Warning/2 CM/0xA3100024
Unable to add route. Network: c0a80102, Netmask: ffffffff, Interface: ac10c979, Gateway: ac10c901.
527 11:37:34.905 02/22/21 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.
528 11:37:34.906 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 50
0.0.0.0 0.0.0.0 172.16.201.1 172.16.201.121 36
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
169.254.0.0 255.255.0.0 172.16.201.1 172.16.201.121 306
172.16.201.0 255.255.255.0 172.16.201.121 172.16.201.121 291
172.16.201.121 255.255.255.255 172.16.201.121 172.16.201.121 291
172.16.201.255 255.255.255.255 172.16.201.121 172.16.201.121 291
173.68.151.26 255.255.255.255 192.168.1.1 192.168.1.2 100
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 306
192.168.1.1 255.255.255.255 192.168.1.2 192.168.1.2 100
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 306
192.168.1.255 255.255.255.255 172.16.201.1 172.16.201.121 2727
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 306
224.0.0.0 240.0.0.0 172.16.201.121 172.16.201.121 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 306
255.255.255.255 255.255.255.255 172.16.201.121 172.16.201.121 291
529 11:37:34.907 02/22/21 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter
530 11:37:34.916 02/22/21 Sev=Warning/2 CM/0xE3100002
OpenService
531 11:37:34.926 02/22/21 Sev=Info/4 CM/0x6310001A
One secure connection established
532 11:37:34.927 02/22/21 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.2. Current hostname: SVERMA-XPS15, Current address(es): 172.16.201.121, 192.168.1.2.
533 11:37:34.929 02/22/21 Sev=Info/4 CM/0x6310003B
Address watch added for 172.16.201.121. Current hostname: SVERMA-XPS15, Current address(es): 172.16.201.121, 192.168.1.2.
534 11:37:34.929 02/22/21 Sev=Info/5 CM/0x63100001
Did not find the Smartcard to watch for removal
535 11:37:34.929 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
536 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
537 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x015d5917 into key list
538 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
539 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x9dfbae81 into key list
540 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 172.16.201.121
541 11:37:34.930 02/22/21 Sev=Info/4 IPSEC/0x63700037
Configure public interface: 192.168.1.2. SG: 173.68.151.26
542 11:37:34.931 02/22/21 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
543 11:37:37.067 02/22/21 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 1.
544 11:37:37.630 02/22/21 Sev=Info/4 IPSEC/0x63700019
Activate outbound key with SPI=0x015d5917 for inbound key with SPI=0x9dfbae81
545 11:37:50.189 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 173.68.151.26
546 11:37:50.190 02/22/21 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 173.68.151.26, our seq# = 2161866051
547 11:37:50.242 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
548 11:37:50.251 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 173.68.151.26
549 11:37:50.251 02/22/21 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 173.68.151.26, seq# received = 2161866051, seq# expected = 2161866051
550 11:38:00.750 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 173.68.151.26
551 11:38:00.751 02/22/21 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 173.68.151.26, our seq# = 2161866052
552 11:38:00.804 02/22/21 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 173.68.151.26
553 11:38:00.804 02/22/21 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 173.68.151.26
554 11:38:00.804 02/22/21 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 173.68.151.26, seq# received = 2161866052, seq# expected = 2161866052
555 11:38:10.381 02/22/21 Sev=Warning/3 CM/0xA3100027
Adapter address 192.168.1.2 has changed or not detected. Current address(es): 172.16.201.121.
556 11:38:10.382 02/22/21 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
557 11:38:10.382 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 173.68.151.26
558 11:38:10.383 02/22/21 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 17595D01 INBOUND SPI = 81AEFB9D)
559 11:38:10.384 02/22/21 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=AFDCF37F
560 11:38:10.385 02/22/21 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=33002231A4E95EE1 R_Cookie=AFD2D2C0BA09C594) reason = DEL_REASON_ADDRESS_CHANGE
561 11:38:10.385 02/22/21 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 173.68.151.26
562 11:38:10.403 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.201.1 172.16.201.121 36
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
169.254.0.0 255.255.0.0 172.16.201.1 172.16.201.121 306
172.16.201.0 255.255.255.0 172.16.201.121 172.16.201.121 291
172.16.201.121 255.255.255.255 172.16.201.121 172.16.201.121 291
172.16.201.255 255.255.255.255 172.16.201.121 172.16.201.121 291
192.168.1.255 255.255.255.255 172.16.201.1 172.16.201.121 2727
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 172.16.201.121 172.16.201.121 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 172.16.201.121 172.16.201.121 291
563 11:38:12.439 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1168
564 11:38:12.439 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1168
565 11:38:12.439 02/22/21 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter
566 11:38:12.518 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CheckUpVASettings: Found IPADDR entry addr=172.16.201.121, error 0
567 11:38:13.532 02/22/21 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0
568 11:38:13.839 02/22/21 Sev=Info/6 CVPND/0x63400001
Launch VAInst64 to control IPSec Virtual Adapter
569 11:38:14.256 02/22/21 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 55
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
192.168.1.0 255.255.255.0 192.168.1.2 192.168.1.2 311
192.168.1.2 255.255.255.255 192.168.1.2 192.168.1.2 311
192.168.1.255 255.255.255.255 192.168.1.2 192.168.1.2 311
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 192.168.1.2 192.168.1.2 311
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 192.168.1.2 192.168.1.2 311
570 11:38:14.256 02/22/21 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled
571 11:38:14.256 02/22/21 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=33002231A4E95EE1 R_Cookie=AFD2D2C0BA09C594) reason = DEL_REASON_ADDRESS_CHANGE
572 11:38:14.256 02/22/21 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
573 11:38:14.256 02/22/21 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
574 11:38:14.275 02/22/21 Sev=Info/6 CM/0x63100031
Tunnel to headend device 173.68.151.26 disconnected: duration: 0 days 0:0:40
575 11:38:14.281 02/22/21 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
576 11:38:14.292 02/22/21 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
577 11:38:14.292 02/22/21 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
578 11:38:14.296 02/22/21 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x9dfbae81
579 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x9dfbae81
580 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x015d5917
581 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x015d5917
582 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
583 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x6370000B
Key requested
584 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x00000000
585 11:38:14.297 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
586 11:38:14.298 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
587 11:38:14.298 02/22/21 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
588 11:38:14.298 02/22/21 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
589 11:38:14.298 02/22/21 Sev=Warning/2 IKE/0xA3000067
Received an IPC message during invalid state (IKE_MAIN:512)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide