07-01-2011 01:07 PM
Hello
I have the VPN client running on a virtual XP machine.
For 3 of my 4 client profiles.... it works properly.
One profile will not connect...
I click "Connect" and immediately get this:
Initializing the connection...
Contacting the security gateway at 65.199.219.84...
Authenticating user...
Secure VPN Connection terminated locally by the Client.
Reason 413: User authentication failed.
Connection terminated on: Jul 1, 2011 15:58:05 Duration: 0 day(s), 00:00.00
Not connected.
I never get the opportunity to enter my password.
Is there something I'm missing?
This profile works file on another pc in my office. I made a copy and tried it.
Thanks!
07-07-2011 03:47 AM
Is the profile perhaps using certificate authentication and you don't have a certificate (or not the right one)?
If not, see if the client logs tell you anything useful (or post them here after removing any sensitive info).
hth
Herbert
07-07-2011 05:39 AM
The log shows:
Cisco Systems VPN Client Version 5.0.00.0320
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
1 08:33:55.343 07/07/11 Sev=Warning/2 IKE/0xE300009B
Immature Navigation Termination due to error (Navigator:195)
07-07-2011 06:37 AM
5.0.00 is quite old - could you try a newer version ?
Other than that - turn up the log levels as follows:
- close the client
- edit the vpnclient.ini file
- change all LogLevel entries to 15
- save the file
- open the client again and don't touch the log levels
hth
Herbert
07-07-2011 08:06 AM
Here's the new log file:
Cisco Systems VPN Client Version 5.0.00.0320
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
2 10:58:33.593 07/07/11 Sev=Info/4 CM/0x63100002
Begin connection process
3 10:58:33.625 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: stopped
4 10:58:33.625 07/07/11 Sev=Info/4 CM/0x63100004
Establish secure connection
5 10:58:33.625 07/07/11 Sev=Info/4 CM/0x63100024
Attempt connection with server "amvpn1.wabco-vcs.com"
6 10:58:33.828 07/07/11 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 65.199.219.84.
7 10:58:33.828 07/07/11 Sev=Debug/9 IKE/0x63000091
Unable to acquire local IP address after 1 attempts (over 1 seconds), probably due to network socket failure.
8 10:58:33.828 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_INITIAL Event: EV_INITIATOR
9 10:58:33.828 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_GEN_DHKEY
10 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_BLD_MSG
11 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_START_RETRY_TMR
12 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_SND_MSG
13 10:58:33.843 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 65.199.219.84
14 10:58:33.843 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 0000000000000000
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 862
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 556
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 544
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 14
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 1
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 2
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 3
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 4
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 5
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 6
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 7
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 8
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 9
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 10
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 11
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 12
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 13
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 14
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): ED8010F5158078E1063C9D0E73E52BC592A6BC2C74307A2EEE26CB8186727D8B1035D1953AA4C155C27D2437C0704CFB0872BDDA31AB50336E9FBE69D9922F6F60E80927436255CEB71D216D3AEA3883C3A9659AB579A48FE4242D125DA1923843659409B9210F0433495A85809B8ED8A536F4EBAF0C3C1D46CC0CB04F7CE062
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 9C8FF75828FB49DD6346E51C857D277C3F416EFC
Payload Identification
Next Payload: Vendor ID
Reserved: 00
Payload Length: 26
ID Type: ID_KEY_ID
Protocol ID(UDP/TCP, etc...): 17
Port: 500
ID Data: vcs_charleston_m&l
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
15 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_WAIT_MSG2 Event: EV_NO_EVENT
16 10:58:33.906 07/07/11 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
17 10:58:33.906 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
18 10:58:33.906 07/07/11 Sev=Debug/7 IPSEC/0x63700007
Filter table modified, set new size
19 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
20 10:58:34.062 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 65.199.219.84
21 10:58:34.062 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 440
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 56
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 44
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 1
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 9
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): DC38FCFBF4DD4E218F1928E955F952DE2AE17F18B666F794F39B4331CBE5E6E2DE8A5AC06DF91D404C5C6AD0ACE730087AF4392503A7C381865D53D8DA1CB61DB771896D8E8634E54827C9CA187EAF04613A518D55A85C59649CE82D1AADD6670F24A2F52947E0610C1335064BA91FD51A9998C5A161DC8908054B10EB0C73AD
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): C8CDCB6560E18D09BF8D1E092345861FC25A4325
Payload Identification
Next Payload: Hash
Reserved: 00
Payload Length: 12
ID Type: IPv4 Address
Protocol ID(UDP/TCP, etc...): 17
Port: 0
ID Data: 65.199.219.84
Payload Hash
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 1E8D6D15793EA9F6F82E21ADE6C60987D4E4F475
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 24
Data: A917EA2A119F19CD3CC1F7497D21B108785EF537
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data: EAAE777FD477EB9BF87C0FD77EE9EF75B12DAD93
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 1F07F70EAA6514D3B0FA96542A500100
22 10:58:34.062 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_RCVD_MSG
23 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
24 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
25 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports DPD
26 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
27 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
28 10:58:34.062 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_GEN_SKEYID
29 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_AUTHENTICATE_PEER
30 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_ADJUST_PORT
31 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_CRYPTO_ACTIVE
32 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_SND_MSG3 Event: EV_BLD_MSG
33 10:58:34.078 07/07/11 Sev=Debug/8 IKE/0x63000001
IOS Vendor ID Contruction started
34 10:58:34.078 07/07/11 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
35 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_SND_MSG3 Event: EV_SND_MSG
36 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 65.199.219.84
37 10:58:34.078 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (Encryption)
MessageID(Hex): 0
Length: 168
Payload Hash
Next Payload: Notification
Reserved: 00
Payload Length: 24
Data (In Hex): FBF5117BF3331AB2A40A7FD55EBAE52F288A328E
Payload Notification
Next Payload: NAT-D
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
Notify Type: STATUS_INITIAL_CONTACT
SPI: C95B7DA99AFFDD4F4A0EEBBEF5A3593B
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 24
Data: EAAE777FD477EB9BF87C0FD77EE9EF75B12DAD93
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data: F39ADBDB52A9C27BBA4A43A5C3179E46182144BF
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 3C9CDAB49AFEDD4FEFD21D9F1B4FB04E
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
38 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_P1_CMPL Event: EV_P1_CMPL
39 10:58:34.078 07/07/11 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
40 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x0457, Remote Port = 0x1194
41 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
42 10:58:34.078 07/07/11 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
43 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_P1_CMPL Event: EV_CHK_4REKEY
44 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_P1_CMPL Event: EV_CHK_4XAUTH
45 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_INIT_XAUTH
46 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
47 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
48 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
49 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
50 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
51 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
52 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84
53 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
54 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
55 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
56 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
57 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
58 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
59 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84
60 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
61 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
62 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
63 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
64 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
65 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
66 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84
67 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
68 10:58:34.140 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
69 10:58:34.140 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 65.199.219.84
70 10:58:34.140 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Transaction
Flags: (Encryption)
MessageID(Hex): 5146B29C
Length: 76
Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 24
Data (In Hex): CF09FA1D932FCAFBCB9BA140AEACA9A595175EED
Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 24
Type: ISAKMP_CFG_REQUEST
Reserved: 00
Identifier: 0000
XAUTH Type: Generic
XAUTH User Name: (empty)
Cisco extension: XAUTH Vendor: 0100
XAUTH Passcode: (empty)
71 10:58:34.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_INITIAL Event: EV_RCVD_MSG
72 10:58:34.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_PCS_XAUTH_REQ Event: EV_INIT_XAUTH
73 10:58:34.140 07/07/11 Sev=Info/4 CM/0x63100015
Launch xAuth application
74 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_PCS_XAUTH_REQ Event: EV_START_RETRY_TMR
75 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
76 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
77 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
78 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
79 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
80 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
81 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
82 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
83 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
84 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
85 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
86 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
87 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
88 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
89 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
90 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
91 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
92 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
93 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
94 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
95 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
96 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
97 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
98 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
99 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
100 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
101 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
102 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
103 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
104 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
105 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
106 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
107 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
108 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
109 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
110 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
111 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
112 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
113 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 65.199.219.84
114 10:58:34.156 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Informational
Flags: (Encryption)
MessageID(Hex): B4B1022D
Length: 84
Payload Hash
Next Payload: Delete
Reserved: 00
Payload Length: 24
Data (In Hex): B7E722668C3AF9A712E4EE91AB9F7A88EAAF3386
Payload Delete
Next Payload: None
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
# of SPIs: 1
SPI (Hex dump): C95B7DA99AFFDD4F4A0EEBBEF5A3593B
115 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300003C
Received a DELETE payload for IKE SA with Cookies: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B
116 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RCVD_DELETE
117 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_TERMINATE Event: EV_PROMPT_TERM
118 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_TERMINATE Event: EV_NO_EVENT
119 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_TERM_REQUEST
120 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_XAUTH_DONE Event: EV_XAUTH_DONE_ERROR
121 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_FREE Event: EV_REMOVE
122 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_FREE Event: EV_NO_EVENT
123 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_TERMINATE Event: EV_PROMPT_DELETE
124 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
125 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_FREE Event: EV_NO_EVENT
126 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_FREE Event: EV_XAUTH_DONE_ERROR
127 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_FREE Event: EV_NO_EVENT
128 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
129 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000058
Received an ISAKMP message for a non-active SA, I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B
130 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 65.199.219.84
131 10:58:34.890 07/07/11 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
132 10:58:34.890 07/07/11 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "amvpn1.wabco-vcs.com" because of "PEER_DELETE-IKE_DELETE_UNSPECIFIED"
133 10:58:34.890 07/07/11 Sev=Info/4 CM/0x63100024
Attempt connection with server "eupap2.wabco-vcs.com"
134 10:58:35.140 07/07/11 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 62.206.129.106.
135 10:58:35.140 07/07/11 Sev=Debug/9 IKE/0x63000091
Unable to acquire local IP address after 1 attempts (over 1 seconds), probably due to network socket failure.
136 10:58:35.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_INITIAL Event: EV_INITIATOR
137 10:58:35.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_GEN_DHKEY
138 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_BLD_MSG
139 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_START_RETRY_TMR
140 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_SND_MSG
141 10:58:35.156 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 62.206.129.106
142 10:58:35.156 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: 0000000000000000
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 862
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 556
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 544
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 14
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 1
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 2
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 3
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 4
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 5
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 6
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 7
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 8
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 9
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 10
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 11
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 12
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 13
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 14
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): F92F983479C7DFE9ABD30B6F379B367262EEF67DC66995A7BDA69A01CC905DE54DA7FC507003F6C41727D4681A7C584755BD8ECA00EB50D4806D799C276059033CE55E19766E4C229588F12611DE4914195DCAE975592B25F1FEF6C6AD3A72DB2DBE8838556934B38EB92A0592BF364340E0DD580B71C4926CEEA9CC77C9E788
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 1C959922914E6120A4A9CCAD1FF5C5E1F16B2F1A
Payload Identification
Next Payload: Vendor ID
Reserved: 00
Payload Length: 26
ID Type: ID_KEY_ID
Protocol ID(UDP/TCP, etc...): 17
Port: 500
ID Data: vcs_charleston_m&l
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
143 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_WAIT_MSG2 Event: EV_NO_EVENT
144 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
145 10:58:35.296 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 62.206.129.106
146 10:58:35.296 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 428
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 56
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 44
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 1
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 10
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): B3571F9971656102A37FAE6B58422E26D020AC05CE9318E7D5B9FA5496C8EC50F7A2DBF3601E0E7470D38F020F83FE44ADAEAA38A05AA279924E060AE13D5B2C1209759C26C9B5057D9222675B16DCA7FFE1267F87DB4D2AC220D18B1F2458EA560987842444E0E8DA454C01448E7C8D383646E5BA5D3946515711FB021D57EB
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 6796A55E28CD4E1939EE5F618A4BBB5420726B77
Payload Identification
Next Payload: Hash
Reserved: 00
Payload Length: 12
ID Type: IPv4 Address
Protocol ID(UDP/TCP, etc...): 17
Port: 0
ID Data: 62.206.129.106
Payload Hash
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): D44B8B63D8027415031FD17EADC84F62
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data: 3F38BFA488AD030E348F9AB2947ED24B
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data: 0002C1AD168972D2684EFF56B24E32CA
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 1F07F70EAA6514D3B0FA96542A500100
147 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_RCVD_MSG
148 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
149 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
150 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports DPD
151 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
152 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
153 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_GEN_SKEYID
154 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_AUTHENTICATE_PEER
155 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_ADJUST_PORT
156 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_CRYPTO_ACTIVE
157 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_SND_MSG3 Event: EV_BLD_MSG
158 10:58:35.296 07/07/11 Sev=Debug/8 IKE/0x63000001
IOS Vendor ID Contruction started
159 10:58:35.312 07/07/11 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
160 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_SND_MSG3 Event: EV_SND_MSG
161 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 62.206.129.106
162 10:58:35.312 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (Encryption)
MessageID(Hex): 0
Length: 156
Payload Hash
Next Payload: Notification
Reserved: 00
Payload Length: 20
Data (In Hex): 1D5024E6D886EB1F7368595CC5C95083
Payload Notification
Next Payload: NAT-D
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
Notify Type: STATUS_INITIAL_CONTACT
SPI: B96D75BFB2E5A076AD3B385D45C459DE
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data: 0002C1AD168972D2684EFF56B24E32CA
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data: 79502148A5A95DC8BA5690BBD92E11D5
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 4CAAD2A2B2E4A076EF14D77FB14881F9
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
163 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_P1_CMPL Event: EV_P1_CMPL
164 10:58:35.312 07/07/11 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
165 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x045A, Remote Port = 0x1194
166 10:58:35.312 07/07/11 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
167 10:58:35.312 07/07/11 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 2 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
168 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_P1_CMPL Event: EV_CHK_4REKEY
169 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_P1_CMPL Event: EV_CHK_4XAUTH
170 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_INIT_XAUTH
171 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
172 10:58:35.312 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
173 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
174 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
175 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
176 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
177 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 62.206.129.106
178 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
179 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
180 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 62.206.129.106
181 10:58:35.437 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Transaction
Flags: (Encryption)
MessageID(Hex): D898D043
Length: 76
Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 20
Data (In Hex): B8B1548BF75B70FAE58F27D029EACB42
Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 24
Type: ISAKMP_CFG_REQUEST
Reserved: 00
Identifier: 0000
XAUTH Type: Generic
XAUTH User Name: (empty)
Cisco extension: XAUTH Vendor: 0100
XAUTH Passcode: (empty)
182 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_INITIAL Event: EV_RCVD_MSG
183 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_PCS_XAUTH_REQ Event: EV_INIT_XAUTH
184 10:58:35.437 07/07/11 Sev=Info/4 CM/0x63100015
Launch xAuth application
185 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_PCS_XAUTH_REQ Event: EV_START_RETRY_TMR
186 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
187 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
188 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
189 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
190 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
191 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
192 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
193 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
194 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
195 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
196 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
197 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
198 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
199 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
200 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
201 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
202 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
203 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
204 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
205 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
206 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
207 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
208 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
209 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
210 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
211 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
212 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
213 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
214 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
215 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
216 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
217 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
218 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
219 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
220 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
221 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
222 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
223 10:58:35.437 07/07/11 Sev=Info/4 CM/0x63100017
xAuth application returned
224 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RCVD_USER_INPUT
225 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_SND_MSG
226 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 62.206.129.106
227 10:58:35.437 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Transaction
Flags: (Encryption)
MessageID(Hex): D898D043
Length: 64
Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 20
Data (In Hex): DA2A2A571D3EC23387EE9CA8896AB006
Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 16
Type: ISAKMP_CFG_REPLY
Reserved: 00
Identifier: 0000
XAUTH Type: Generic
XAUTH Status: Fail
228 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_XAUTHREQ_DONE Event: EV_XAUTHREQ_DONE
229 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_XAUTHREQ_DONE Event: EV_NO_EVENT
230 10:58:35.437 07/07/11 Sev=Info/4 CM/0x63100018
User does not provide any authentication data
231 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
232 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_PROMPT_TERM
233 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_TERMINATE Event: EV_PROMPT_TERM
234 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_TERMINATE Event: EV_NO_EVENT
235 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_XAUTHREQ_DONE Event: EV_TERM_REQUEST
236 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_FREE Event: EV_REMOVE
237 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_FREE Event: EV_NO_EVENT
238 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_TERMINATE Event: EV_PROMPT_DELETE
239 10:58:35.453 07/07/11 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE) reason = DEL_REASON_RESET_SADB
240 10:58:35.453 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 62.206.129.106
241 10:58:35.453 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Informational
Flags: (Encryption)
MessageID(Hex): 2FBB609
Length: 76
Payload Hash
Next Payload: Delete
Reserved: 00
Payload Length: 20
Data (In Hex): AC0CB0012D1AC7E16DFB7DAF9EA144B7
Payload Delete
Next Payload: None
Reserved: 00
Payload Length: 28
DOI: Isakmp
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
# of SPIs: 1
SPI (Hex dump): B96D75BFB2E5A076AD3B385D45C459DE
242 10:58:35.453 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_FREE Event: EV_NO_EVENT
243 10:58:35.453 07/07/11 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE) reason = DEL_REASON_RESET_SADB
244 10:58:35.453 07/07/11 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
245 10:58:35.500 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: started
246 10:58:35.500 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: interface change handler invoked
247 10:58:35.500 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: auto-initiation is currently disabled
248 10:58:35.515 07/07/11 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
249 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
250 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
251 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
252 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
07-07-2011 08:12 AM
If it will help I can send a log of a successful connection to another VPN.
Just let me know.
AND thanks for the help btw!
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: