cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2246
Views
0
Helpful
5
Replies

VPN Client 5 Problems with a profile

PawleysPlayr
Level 1
Level 1

Hello

I have the VPN client running on a virtual XP machine.

For 3 of my 4 client profiles.... it works properly.

One profile will not connect...

I click "Connect" and immediately get this:

Initializing the connection...
Contacting the security gateway at 65.199.219.84...
Authenticating user...
Secure VPN Connection terminated locally by the Client.
Reason 413: User authentication failed.

Connection terminated on: Jul 1, 2011 15:58:05        Duration: 0 day(s), 00:00.00
Not connected.

I never get the opportunity to enter my password.

Is there something I'm missing?

This profile works file on another pc in my office. I made a copy and tried it.

Thanks!

5 Replies 5

Herbert Baerten
Cisco Employee
Cisco Employee

Is the profile perhaps using certificate authentication and you don't have a certificate (or not the right one)?

If not, see if the client logs tell you anything useful (or post them here after removing any sensitive info).

hth

Herbert

The log shows:

Cisco Systems VPN Client Version 5.0.00.0320
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3

1      08:33:55.343  07/07/11  Sev=Warning/2 IKE/0xE300009B
Immature Navigation Termination due to error (Navigator:195)

5.0.00 is quite old - could you try a newer version ?

Other than that - turn up the log levels as follows:

- close the client

- edit the vpnclient.ini file

- change all LogLevel entries to 15

- save the file

- open the client again and don't touch the log levels

hth

Herbert

Here's the new log file:

Cisco Systems VPN Client Version 5.0.00.0320
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3

2      10:58:33.593  07/07/11  Sev=Info/4 CM/0x63100002
Begin connection process

3      10:58:33.625  07/07/11  Sev=Debug/7 CM/0x63100033
Auto-initiation watch:  stopped

4      10:58:33.625  07/07/11  Sev=Info/4 CM/0x63100004
Establish secure connection

5      10:58:33.625  07/07/11  Sev=Info/4 CM/0x63100024
Attempt connection with server "amvpn1.wabco-vcs.com"

6      10:58:33.828  07/07/11  Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 65.199.219.84.

7      10:58:33.828  07/07/11  Sev=Debug/9 IKE/0x63000091
Unable to acquire local IP address after 1 attempts (over 1 seconds), probably due to network socket failure.

8      10:58:33.828  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000  CurState: AM_INITIAL  Event: EV_INITIATOR 

9      10:58:33.828  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_GEN_DHKEY 

10     10:58:33.843  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_BLD_MSG 

11     10:58:33.843  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_START_RETRY_TMR 

12     10:58:33.843  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_SND_MSG 

13     10:58:33.843  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 65.199.219.84

14     10:58:33.843  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 0000000000000000
Next Payload:       Security Association
Ver (Hex):          10
Exchange Type:      Aggressive Mode
Flags:               (none)
MessageID(Hex):     0
Length:             862


Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 556
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)

Payload Proposal
  Next Payload: None
  Reserved: 00
  Payload Length: 544
  Proposal #: 1
  Protocol-Id: PROTO_ISAKMP
  SPI Size: 0
  # of transforms: 14

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 1
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 2
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 3
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 4
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 5
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 6
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 7
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 8
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 9
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 10
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 11
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 12
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 13
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: None
   Reserved: 00
   Payload Length: 36
   Transform #: 14
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B

Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): ED8010F5158078E1063C9D0E73E52BC592A6BC2C74307A2EEE26CB8186727D8B1035D1953AA4C155C27D2437C0704CFB0872BDDA31AB50336E9FBE69D9922F6F60E80927436255CEB71D216D3AEA3883C3A9659AB579A48FE4242D125DA1923843659409B9210F0433495A85809B8ED8A536F4EBAF0C3C1D46CC0CB04F7CE062

Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 9C8FF75828FB49DD6346E51C857D277C3F416EFC

Payload Identification
Next Payload: Vendor ID
Reserved: 00
Payload Length: 26
ID Type: ID_KEY_ID
Protocol ID(UDP/TCP, etc...): 17
Port: 500
ID Data: vcs_charleston_m&l

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F

Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100

15     10:58:33.843  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000  CurState: AM_WAIT_MSG2  Event: EV_NO_EVENT 

16     10:58:33.906  07/07/11  Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started

17     10:58:33.906  07/07/11  Sev=Info/4 IPSEC/0x63700014
Deleted all keys

18     10:58:33.906  07/07/11  Sev=Debug/7 IPSEC/0x63700007
Filter table modified, set new size

19     10:58:34.062  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

20     10:58:34.062  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 65.199.219.84

21     10:58:34.062  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload:       Security Association
Ver (Hex):          10
Exchange Type:      Aggressive Mode
Flags:               (none)
MessageID(Hex):     0
Length:             440


Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 56
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)

Payload Proposal
  Next Payload: None
  Reserved: 00
  Payload Length: 44
  Proposal #: 1
  Protocol-Id: PROTO_ISAKMP
  SPI Size: 0
  # of transforms: 1

  Payload Transform
   Next Payload: None
   Reserved: 00
   Payload Length: 36
   Transform #: 9
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): DC38FCFBF4DD4E218F1928E955F952DE2AE17F18B666F794F39B4331CBE5E6E2DE8A5AC06DF91D404C5C6AD0ACE730087AF4392503A7C381865D53D8DA1CB61DB771896D8E8634E54827C9CA187EAF04613A518D55A85C59649CE82D1AADD6670F24A2F52947E0610C1335064BA91FD51A9998C5A161DC8908054B10EB0C73AD

Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): C8CDCB6560E18D09BF8D1E092345861FC25A4325

Payload Identification
Next Payload: Hash
Reserved: 00
Payload Length: 12
ID Type: IPv4 Address
Protocol ID(UDP/TCP, etc...): 17
Port: 0
ID Data: 65.199.219.84

Payload Hash
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 1E8D6D15793EA9F6F82E21ADE6C60987D4E4F475

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100

Payload Vendor ID
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F

Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 24
Data: A917EA2A119F19CD3CC1F7497D21B108785EF537

Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data: EAAE777FD477EB9BF87C0FD77EE9EF75B12DAD93

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000

Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 1F07F70EAA6514D3B0FA96542A500100

22     10:58:34.062  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_WAIT_MSG2  Event: EV_RCVD_MSG 

23     10:58:34.062  07/07/11  Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer

24     10:58:34.062  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports XAUTH

25     10:58:34.062  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports DPD

26     10:58:34.062  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports NAT-T

27     10:58:34.062  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads

28     10:58:34.062  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_WAIT_MSG2  Event: EV_GEN_SKEYID 

29     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_WAIT_MSG2  Event: EV_AUTHENTICATE_PEER 

30     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_WAIT_MSG2  Event: EV_ADJUST_PORT 

31     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_WAIT_MSG2  Event: EV_CRYPTO_ACTIVE 

32     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_SND_MSG3  Event: EV_BLD_MSG 

33     10:58:34.078  07/07/11  Sev=Debug/8 IKE/0x63000001
IOS Vendor ID Contruction started

34     10:58:34.078  07/07/11  Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful

35     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: AM_SND_MSG3  Event: EV_SND_MSG 

36     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 65.199.219.84

37     10:58:34.078  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Aggressive Mode
Flags:               (Encryption)
MessageID(Hex):     0
Length:             168


Payload Hash
Next Payload: Notification
Reserved: 00
Payload Length: 24
Data (In Hex): FBF5117BF3331AB2A40A7FD55EBAE52F288A328E

Payload Notification
Next Payload: NAT-D
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
Notify Type: STATUS_INITIAL_CONTACT
SPI: C95B7DA99AFFDD4F4A0EEBBEF5A3593B

Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 24
Data: EAAE777FD477EB9BF87C0FD77EE9EF75B12DAD93

Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data: F39ADBDB52A9C27BBA4A43A5C3179E46182144BF

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 3C9CDAB49AFEDD4FEFD21D9F1B4FB04E

Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100

38     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_P1_CMPL  Event: EV_P1_CMPL 

39     10:58:34.078  07/07/11  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

40     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port =  0x0457, Remote Port = 0x1194

41     10:58:34.078  07/07/11  Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device

42     10:58:34.078  07/07/11  Sev=Info/4 CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

43     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_P1_CMPL  Event: EV_CHK_4REKEY 

44     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_P1_CMPL  Event: EV_CHK_4XAUTH 

45     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_INIT_XAUTH 

46     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

47     10:58:34.078  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

48     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

49     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

50     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RXM_P1MSG 

51     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000021
Retransmitting last packet!

52     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84

53     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

54     10:58:34.078  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

55     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

56     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

57     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RXM_P1MSG 

58     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000021
Retransmitting last packet!

59     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84

60     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

61     10:58:34.078  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

62     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

63     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

64     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RXM_P1MSG 

65     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000021
Retransmitting last packet!

66     10:58:34.078  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84

67     10:58:34.078  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

68     10:58:34.140  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

69     10:58:34.140  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 65.199.219.84

70     10:58:34.140  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Transaction
Flags:               (Encryption)
MessageID(Hex):     5146B29C
Length:             76


Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 24
Data (In Hex): CF09FA1D932FCAFBCB9BA140AEACA9A595175EED

Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 24
Type: ISAKMP_CFG_REQUEST
Reserved: 00
Identifier: 0000
  XAUTH Type: Generic
  XAUTH User Name: (empty)
  Cisco extension: XAUTH Vendor: 0100
  XAUTH Passcode: (empty)

71     10:58:34.140  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_INITIAL  Event: EV_RCVD_MSG 

72     10:58:34.140  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_PCS_XAUTH_REQ  Event: EV_INIT_XAUTH 

73     10:58:34.140  07/07/11  Sev=Info/4 CM/0x63100015
Launch xAuth application

74     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_PCS_XAUTH_REQ  Event: EV_START_RETRY_TMR 

75     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

76     10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

77     10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84

78     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_RESEND 

79     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

80     10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

81     10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

82     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

83     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

84     10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

85     10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

86     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

87     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

88     10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

89     10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84

90     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_RESEND 

91     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

92     10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

93     10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84

94     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_RESEND 

95     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

96     10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

97     10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

98     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

99     10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

100    10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

101    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84

102    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

103    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

104    10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

105    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84

106    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_RESEND 

107    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

108    10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

109    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84

110    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_RESEND 

111    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

112    10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

113    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 65.199.219.84

114    10:58:34.156  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Informational
Flags:               (Encryption)
MessageID(Hex):     B4B1022D
Length:             84


Payload Hash
Next Payload: Delete
Reserved: 00
Payload Length: 24
Data (In Hex): B7E722668C3AF9A712E4EE91AB9F7A88EAAF3386

Payload Delete
Next Payload: None
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
# of SPIs: 1
SPI (Hex dump): C95B7DA99AFFDD4F4A0EEBBEF5A3593B

115    10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300003C
Received a DELETE payload for IKE SA with Cookies:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B

116    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_XAUTH_PROG  Event: EV_RCVD_DELETE 

117    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_TERMINATE  Event: EV_PROMPT_TERM 

118    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_TERMINATE  Event: EV_NO_EVENT 

119    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_WAIT_4USER  Event: EV_TERM_REQUEST 

120    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_XAUTH_DONE  Event: EV_XAUTH_DONE_ERROR 

121    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_FREE  Event: EV_REMOVE 

122    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=5146B29C  CurState: TM_FREE  Event: EV_NO_EVENT 

123    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_TERMINATE  Event: EV_PROMPT_DELETE 

124    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED

125    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_FREE  Event: EV_NO_EVENT 

126    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_FREE  Event: EV_XAUTH_DONE_ERROR 

127    10:58:34.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B  CurState: CMN_FREE  Event: EV_NO_EVENT 

128    10:58:34.156  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84

129    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000058
Received an ISAKMP message for a non-active SA, I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B

130    10:58:34.156  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 65.199.219.84

131    10:58:34.890  07/07/11  Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED

132    10:58:34.890  07/07/11  Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "amvpn1.wabco-vcs.com" because of "PEER_DELETE-IKE_DELETE_UNSPECIFIED"

133    10:58:34.890  07/07/11  Sev=Info/4 CM/0x63100024
Attempt connection with server "eupap2.wabco-vcs.com"

134    10:58:35.140  07/07/11  Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 62.206.129.106.

135    10:58:35.140  07/07/11  Sev=Debug/9 IKE/0x63000091
Unable to acquire local IP address after 1 attempts (over 1 seconds), probably due to network socket failure.

136    10:58:35.140  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000  CurState: AM_INITIAL  Event: EV_INITIATOR 

137    10:58:35.140  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_GEN_DHKEY 

138    10:58:35.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_BLD_MSG 

139    10:58:35.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_START_RETRY_TMR 

140    10:58:35.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000  CurState: AM_SND_MSG1  Event: EV_SND_MSG 

141    10:58:35.156  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 62.206.129.106

142    10:58:35.156  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: 0000000000000000
Next Payload:       Security Association
Ver (Hex):          10
Exchange Type:      Aggressive Mode
Flags:               (none)
MessageID(Hex):     0
Length:             862


Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 556
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)

Payload Proposal
  Next Payload: None
  Reserved: 00
  Payload Length: 544
  Proposal #: 1
  Protocol-Id: PROTO_ISAKMP
  SPI Size: 0
  # of transforms: 14

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 1
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 2
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 3
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 4
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 256

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 5
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 6
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 7
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 40
   Transform #: 8
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: AES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B
    Key Length: 128

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 9
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 10
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 11
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: SHA1
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 12
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: Transform
   Reserved: 00
   Payload Length: 36
   Transform #: 13
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

  Payload Transform
   Next Payload: None
   Reserved: 00
   Payload Length: 36
   Transform #: 14
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: Preshared key
    Life Type: seconds
    Life Duration (Hex): 0020C49B

Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): F92F983479C7DFE9ABD30B6F379B367262EEF67DC66995A7BDA69A01CC905DE54DA7FC507003F6C41727D4681A7C584755BD8ECA00EB50D4806D799C276059033CE55E19766E4C229588F12611DE4914195DCAE975592B25F1FEF6C6AD3A72DB2DBE8838556934B38EB92A0592BF364340E0DD580B71C4926CEEA9CC77C9E788

Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 1C959922914E6120A4A9CCAD1FF5C5E1F16B2F1A

Payload Identification
Next Payload: Vendor ID
Reserved: 00
Payload Length: 26
ID Type: ID_KEY_ID
Protocol ID(UDP/TCP, etc...): 17
Port: 500
ID Data: vcs_charleston_m&l

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F

Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100

143    10:58:35.156  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000  CurState: AM_WAIT_MSG2  Event: EV_NO_EVENT 

144    10:58:35.296  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

145    10:58:35.296  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 62.206.129.106

146    10:58:35.296  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload:       Security Association
Ver (Hex):          10
Exchange Type:      Aggressive Mode
Flags:               (none)
MessageID(Hex):     0
Length:             428


Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 56
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)

Payload Proposal
  Next Payload: None
  Reserved: 00
  Payload Length: 44
  Proposal #: 1
  Protocol-Id: PROTO_ISAKMP
  SPI Size: 0
  # of transforms: 1

  Payload Transform
   Next Payload: None
   Reserved: 00
   Payload Length: 36
   Transform #: 10
   Transform-Id: KEY_IKE
   Reserved2: 0000
    Encryption Algorithm: 3DES-CBC
    Hash Algorithm: MD5
    Group Description: Group 2
    Authentication Method: XAUTHInitPreShared
    Life Type: seconds
    Life Duration (Hex): 0020C49B

Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): B3571F9971656102A37FAE6B58422E26D020AC05CE9318E7D5B9FA5496C8EC50F7A2DBF3601E0E7470D38F020F83FE44ADAEAA38A05AA279924E060AE13D5B2C1209759C26C9B5057D9222675B16DCA7FFE1267F87DB4D2AC220D18B1F2458EA560987842444E0E8DA454C01448E7C8D383646E5BA5D3946515711FB021D57EB

Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 6796A55E28CD4E1939EE5F618A4BBB5420726B77

Payload Identification
Next Payload: Hash
Reserved: 00
Payload Length: 12
ID Type: IPv4 Address
Protocol ID(UDP/TCP, etc...): 17
Port: 0
ID Data: 62.206.129.106

Payload Hash
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): D44B8B63D8027415031FD17EADC84F62

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100

Payload Vendor ID
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F

Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data: 3F38BFA488AD030E348F9AB2947ED24B

Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data: 0002C1AD168972D2684EFF56B24E32CA

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000

Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 1F07F70EAA6514D3B0FA96542A500100

147    10:58:35.296  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_WAIT_MSG2  Event: EV_RCVD_MSG 

148    10:58:35.296  07/07/11  Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer

149    10:58:35.296  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports XAUTH

150    10:58:35.296  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports DPD

151    10:58:35.296  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports NAT-T

152    10:58:35.296  07/07/11  Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads

153    10:58:35.296  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_WAIT_MSG2  Event: EV_GEN_SKEYID 

154    10:58:35.296  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_WAIT_MSG2  Event: EV_AUTHENTICATE_PEER 

155    10:58:35.296  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_WAIT_MSG2  Event: EV_ADJUST_PORT 

156    10:58:35.296  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_WAIT_MSG2  Event: EV_CRYPTO_ACTIVE 

157    10:58:35.296  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_SND_MSG3  Event: EV_BLD_MSG 

158    10:58:35.296  07/07/11  Sev=Debug/8 IKE/0x63000001
IOS Vendor ID Contruction started

159    10:58:35.312  07/07/11  Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful

160    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: AM_SND_MSG3  Event: EV_SND_MSG 

161    10:58:35.312  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 62.206.129.106

162    10:58:35.312  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Aggressive Mode
Flags:               (Encryption)
MessageID(Hex):     0
Length:             156


Payload Hash
Next Payload: Notification
Reserved: 00
Payload Length: 20
Data (In Hex): 1D5024E6D886EB1F7368595CC5C95083

Payload Notification
Next Payload: NAT-D
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
Notify Type: STATUS_INITIAL_CONTACT
SPI: B96D75BFB2E5A076AD3B385D45C459DE

Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data: 0002C1AD168972D2684EFF56B24E32CA

Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data: 79502148A5A95DC8BA5690BBD92E11D5

Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 4CAAD2A2B2E4A076EF14D77FB14881F9

Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100

163    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_P1_CMPL  Event: EV_P1_CMPL 

164    10:58:35.312  07/07/11  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

165    10:58:35.312  07/07/11  Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port =  0x045A, Remote Port = 0x1194

166    10:58:35.312  07/07/11  Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device

167    10:58:35.312  07/07/11  Sev=Info/4 CM/0x6310000E
Established Phase 1 SA.  2 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

168    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_P1_CMPL  Event: EV_CHK_4REKEY 

169    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_P1_CMPL  Event: EV_CHK_4XAUTH 

170    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_INIT_XAUTH 

171    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

172    10:58:35.312  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

173    10:58:35.312  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106

174    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

175    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_RXM_P1MSG 

176    10:58:35.312  07/07/11  Sev=Info/4 IKE/0x63000021
Retransmitting last packet!

177    10:58:35.312  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 62.206.129.106

178    10:58:35.312  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

179    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

180    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 62.206.129.106

181    10:58:35.437  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Transaction
Flags:               (Encryption)
MessageID(Hex):     D898D043
Length:             76


Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 20
Data (In Hex): B8B1548BF75B70FAE58F27D029EACB42

Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 24
Type: ISAKMP_CFG_REQUEST
Reserved: 00
Identifier: 0000
  XAUTH Type: Generic
  XAUTH User Name: (empty)
  Cisco extension: XAUTH Vendor: 0100
  XAUTH Passcode: (empty)

182    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_INITIAL  Event: EV_RCVD_MSG 

183    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_PCS_XAUTH_REQ  Event: EV_INIT_XAUTH 

184    10:58:35.437  07/07/11  Sev=Info/4 CM/0x63100015
Launch xAuth application

185    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_PCS_XAUTH_REQ  Event: EV_START_RETRY_TMR 

186    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

187    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

188    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106

189    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_RESEND 

190    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

191    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

192    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106

193    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

194    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

195    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

196    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106

197    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

198    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

199    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

200    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106

201    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_RESEND 

202    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

203    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

204    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106

205    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_RESEND 

206    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

207    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

208    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106

209    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

210    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

211    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

212    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106

213    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_RESEND 

214    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_NO_EVENT 

215    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

216    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106

217    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_RESEND 

218    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

219    10:58:35.437  07/07/11  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106

220    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106

221    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_RESEND 

222    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_NO_EVENT 

223    10:58:35.437  07/07/11  Sev=Info/4 CM/0x63100017
xAuth application returned

224    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_RCVD_USER_INPUT 

225    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_WAIT_4USER  Event: EV_SND_MSG 

226    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 62.206.129.106

227    10:58:35.437  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Transaction
Flags:               (Encryption)
MessageID(Hex):     D898D043
Length:             64


Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 20
Data (In Hex): DA2A2A571D3EC23387EE9CA8896AB006

Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 16
Type: ISAKMP_CFG_REPLY
Reserved: 00
Identifier: 0000
  XAUTH Type: Generic
  XAUTH Status: Fail

228    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_XAUTHREQ_DONE  Event: EV_XAUTHREQ_DONE 

229    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_XAUTHREQ_DONE  Event: EV_NO_EVENT 

230    10:58:35.437  07/07/11  Sev=Info/4 CM/0x63100018
User does not provide any authentication data

231    10:58:35.437  07/07/11  Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection

232    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_XAUTH_PROG  Event: EV_PROMPT_TERM 

233    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_TERMINATE  Event: EV_PROMPT_TERM 

234    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_TERMINATE  Event: EV_NO_EVENT 

235    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_XAUTHREQ_DONE  Event: EV_TERM_REQUEST 

236    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_FREE  Event: EV_REMOVE 

237    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->TM:  MsgID=D898D043  CurState: TM_FREE  Event: EV_NO_EVENT 

238    10:58:35.437  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_TERMINATE  Event: EV_PROMPT_DELETE 

239    10:58:35.453  07/07/11  Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE) reason = DEL_REASON_RESET_SADB

240    10:58:35.453  07/07/11  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 62.206.129.106

241    10:58:35.453  07/07/11  Sev=Decode/11 IKE/0x63000001

ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload:       Hash
Ver (Hex):          10
Exchange Type:      Informational
Flags:               (Encryption)
MessageID(Hex):     2FBB609
Length:             76


Payload Hash
Next Payload: Delete
Reserved: 00
Payload Length: 20
Data (In Hex): AC0CB0012D1AC7E16DFB7DAF9EA144B7

Payload Delete
Next Payload: None
Reserved: 00
Payload Length: 28
DOI: Isakmp
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
# of SPIs: 1
SPI (Hex dump): B96D75BFB2E5A076AD3B385D45C459DE

242    10:58:35.453  07/07/11  Sev=Debug/7 IKE/0x63000076
NAV Trace->SA:  I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE  CurState: CMN_FREE  Event: EV_NO_EVENT 

243    10:58:35.453  07/07/11  Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE) reason = DEL_REASON_RESET_SADB

244    10:58:35.453  07/07/11  Sev=Info/5 CM/0x63100025
Initializing CVPNDrv

245    10:58:35.500  07/07/11  Sev=Debug/7 CM/0x63100033
Auto-initiation watch:  started

246    10:58:35.500  07/07/11  Sev=Debug/7 CM/0x63100033
Auto-initiation watch:  interface change handler invoked

247    10:58:35.500  07/07/11  Sev=Debug/7 CM/0x63100033
Auto-initiation watch:  auto-initiation is currently disabled

248    10:58:35.515  07/07/11  Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.

249    10:58:35.921  07/07/11  Sev=Info/4 IPSEC/0x63700014
Deleted all keys

250    10:58:35.921  07/07/11  Sev=Info/4 IPSEC/0x63700014
Deleted all keys

251    10:58:35.921  07/07/11  Sev=Info/4 IPSEC/0x63700014
Deleted all keys

252    10:58:35.921  07/07/11  Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped

If it will help I can send a log of a successful connection to another VPN.

Just let me know.

AND thanks for the help btw!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: