07-01-2011 01:07 PM
Hello
I have the VPN client running on a virtual XP machine.
For 3 of my 4 client profiles.... it works properly.
One profile will not connect...
I click "Connect" and immediately get this:
Initializing the connection...
Contacting the security gateway at 65.199.219.84...
Authenticating user...
Secure VPN Connection terminated locally by the Client.
Reason 413: User authentication failed.
Connection terminated on: Jul 1, 2011 15:58:05 Duration: 0 day(s), 00:00.00
Not connected.
I never get the opportunity to enter my password.
Is there something I'm missing?
This profile works file on another pc in my office. I made a copy and tried it.
Thanks!
07-07-2011 03:47 AM
Is the profile perhaps using certificate authentication and you don't have a certificate (or not the right one)?
If not, see if the client logs tell you anything useful (or post them here after removing any sensitive info).
hth
Herbert
07-07-2011 05:39 AM
The log shows:
Cisco Systems VPN Client Version 5.0.00.0320
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
1 08:33:55.343 07/07/11 Sev=Warning/2 IKE/0xE300009B
Immature Navigation Termination due to error (Navigator:195)
07-07-2011 06:37 AM
5.0.00 is quite old - could you try a newer version ?
Other than that - turn up the log levels as follows:
- close the client
- edit the vpnclient.ini file
- change all LogLevel entries to 15
- save the file
- open the client again and don't touch the log levels
hth
Herbert
07-07-2011 08:06 AM
Here's the new log file:
Cisco Systems VPN Client Version 5.0.00.0320
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
2 10:58:33.593 07/07/11 Sev=Info/4 CM/0x63100002
Begin connection process
3 10:58:33.625 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: stopped
4 10:58:33.625 07/07/11 Sev=Info/4 CM/0x63100004
Establish secure connection
5 10:58:33.625 07/07/11 Sev=Info/4 CM/0x63100024
Attempt connection with server "amvpn1.wabco-vcs.com"
6 10:58:33.828 07/07/11 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 65.199.219.84.
7 10:58:33.828 07/07/11 Sev=Debug/9 IKE/0x63000091
Unable to acquire local IP address after 1 attempts (over 1 seconds), probably due to network socket failure.
8 10:58:33.828 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_INITIAL Event: EV_INITIATOR
9 10:58:33.828 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_GEN_DHKEY
10 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_BLD_MSG
11 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_START_RETRY_TMR
12 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_SND_MSG
13 10:58:33.843 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 65.199.219.84
14 10:58:33.843 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 0000000000000000
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 862
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 556
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 544
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 14
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 1
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 2
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 3
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 4
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 5
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 6
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 7
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 8
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 9
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 10
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 11
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 12
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 13
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 14
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): ED8010F5158078E1063C9D0E73E52BC592A6BC2C74307A2EEE26CB8186727D8B1035D1953AA4C155C27D2437C0704CFB0872BDDA31AB50336E9FBE69D9922F6F60E80927436255CEB71D216D3AEA3883C3A9659AB579A48FE4242D125DA1923843659409B9210F0433495A85809B8ED8A536F4EBAF0C3C1D46CC0CB04F7CE062
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 9C8FF75828FB49DD6346E51C857D277C3F416EFC
Payload Identification
Next Payload: Vendor ID
Reserved: 00
Payload Length: 26
ID Type: ID_KEY_ID
Protocol ID(UDP/TCP, etc...): 17
Port: 500
ID Data: vcs_charleston_m&l
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
15 10:58:33.843 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=0000000000000000 CurState: AM_WAIT_MSG2 Event: EV_NO_EVENT
16 10:58:33.906 07/07/11 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
17 10:58:33.906 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
18 10:58:33.906 07/07/11 Sev=Debug/7 IPSEC/0x63700007
Filter table modified, set new size
19 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
20 10:58:34.062 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 65.199.219.84
21 10:58:34.062 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 440
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 56
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 44
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 1
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 9
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): DC38FCFBF4DD4E218F1928E955F952DE2AE17F18B666F794F39B4331CBE5E6E2DE8A5AC06DF91D404C5C6AD0ACE730087AF4392503A7C381865D53D8DA1CB61DB771896D8E8634E54827C9CA187EAF04613A518D55A85C59649CE82D1AADD6670F24A2F52947E0610C1335064BA91FD51A9998C5A161DC8908054B10EB0C73AD
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): C8CDCB6560E18D09BF8D1E092345861FC25A4325
Payload Identification
Next Payload: Hash
Reserved: 00
Payload Length: 12
ID Type: IPv4 Address
Protocol ID(UDP/TCP, etc...): 17
Port: 0
ID Data: 65.199.219.84
Payload Hash
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 1E8D6D15793EA9F6F82E21ADE6C60987D4E4F475
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 24
Data: A917EA2A119F19CD3CC1F7497D21B108785EF537
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data: EAAE777FD477EB9BF87C0FD77EE9EF75B12DAD93
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 1F07F70EAA6514D3B0FA96542A500100
22 10:58:34.062 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_RCVD_MSG
23 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
24 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
25 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports DPD
26 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
27 10:58:34.062 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
28 10:58:34.062 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_GEN_SKEYID
29 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_AUTHENTICATE_PEER
30 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_ADJUST_PORT
31 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_WAIT_MSG2 Event: EV_CRYPTO_ACTIVE
32 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_SND_MSG3 Event: EV_BLD_MSG
33 10:58:34.078 07/07/11 Sev=Debug/8 IKE/0x63000001
IOS Vendor ID Contruction started
34 10:58:34.078 07/07/11 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
35 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: AM_SND_MSG3 Event: EV_SND_MSG
36 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 65.199.219.84
37 10:58:34.078 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (Encryption)
MessageID(Hex): 0
Length: 168
Payload Hash
Next Payload: Notification
Reserved: 00
Payload Length: 24
Data (In Hex): FBF5117BF3331AB2A40A7FD55EBAE52F288A328E
Payload Notification
Next Payload: NAT-D
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
Notify Type: STATUS_INITIAL_CONTACT
SPI: C95B7DA99AFFDD4F4A0EEBBEF5A3593B
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 24
Data: EAAE777FD477EB9BF87C0FD77EE9EF75B12DAD93
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data: F39ADBDB52A9C27BBA4A43A5C3179E46182144BF
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 3C9CDAB49AFEDD4FEFD21D9F1B4FB04E
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
38 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_P1_CMPL Event: EV_P1_CMPL
39 10:58:34.078 07/07/11 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
40 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x0457, Remote Port = 0x1194
41 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
42 10:58:34.078 07/07/11 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
43 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_P1_CMPL Event: EV_CHK_4REKEY
44 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_P1_CMPL Event: EV_CHK_4XAUTH
45 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_INIT_XAUTH
46 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
47 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
48 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
49 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
50 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
51 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
52 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84
53 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
54 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
55 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
56 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
57 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
58 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
59 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84
60 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
61 10:58:34.078 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
62 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
63 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
64 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
65 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
66 10:58:34.078 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 65.199.219.84
67 10:58:34.078 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
68 10:58:34.140 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
69 10:58:34.140 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 65.199.219.84
70 10:58:34.140 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Transaction
Flags: (Encryption)
MessageID(Hex): 5146B29C
Length: 76
Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 24
Data (In Hex): CF09FA1D932FCAFBCB9BA140AEACA9A595175EED
Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 24
Type: ISAKMP_CFG_REQUEST
Reserved: 00
Identifier: 0000
XAUTH Type: Generic
XAUTH User Name: (empty)
Cisco extension: XAUTH Vendor: 0100
XAUTH Passcode: (empty)
71 10:58:34.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_INITIAL Event: EV_RCVD_MSG
72 10:58:34.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_PCS_XAUTH_REQ Event: EV_INIT_XAUTH
73 10:58:34.140 07/07/11 Sev=Info/4 CM/0x63100015
Launch xAuth application
74 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_PCS_XAUTH_REQ Event: EV_START_RETRY_TMR
75 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
76 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
77 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
78 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
79 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
80 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
81 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
82 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
83 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
84 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
85 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
86 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
87 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
88 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
89 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
90 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
91 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
92 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
93 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
94 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
95 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
96 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
97 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
98 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
99 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
100 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
101 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 65.199.219.84
102 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RESEND
103 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
104 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
105 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
106 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
107 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
108 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
109 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 65.199.219.84
110 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_RESEND
111 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_NO_EVENT
112 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
113 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 65.199.219.84
114 10:58:34.156 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: C95B7DA99AFFDD4F
Responder COOKIE: 4A0EEBBEF5A3593B
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Informational
Flags: (Encryption)
MessageID(Hex): B4B1022D
Length: 84
Payload Hash
Next Payload: Delete
Reserved: 00
Payload Length: 24
Data (In Hex): B7E722668C3AF9A712E4EE91AB9F7A88EAAF3386
Payload Delete
Next Payload: None
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
# of SPIs: 1
SPI (Hex dump): C95B7DA99AFFDD4F4A0EEBBEF5A3593B
115 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300003C
Received a DELETE payload for IKE SA with Cookies: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B
116 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_XAUTH_PROG Event: EV_RCVD_DELETE
117 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_TERMINATE Event: EV_PROMPT_TERM
118 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_TERMINATE Event: EV_NO_EVENT
119 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_WAIT_4USER Event: EV_TERM_REQUEST
120 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_XAUTH_DONE Event: EV_XAUTH_DONE_ERROR
121 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_FREE Event: EV_REMOVE
122 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=5146B29C CurState: TM_FREE Event: EV_NO_EVENT
123 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_TERMINATE Event: EV_PROMPT_DELETE
124 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
125 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_FREE Event: EV_NO_EVENT
126 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_FREE Event: EV_XAUTH_DONE_ERROR
127 10:58:34.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B CurState: CMN_FREE Event: EV_NO_EVENT
128 10:58:34.156 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 65.199.219.84
129 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000058
Received an ISAKMP message for a non-active SA, I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B
130 10:58:34.156 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 65.199.219.84
131 10:58:34.890 07/07/11 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=C95B7DA99AFFDD4F R_Cookie=4A0EEBBEF5A3593B) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
132 10:58:34.890 07/07/11 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "amvpn1.wabco-vcs.com" because of "PEER_DELETE-IKE_DELETE_UNSPECIFIED"
133 10:58:34.890 07/07/11 Sev=Info/4 CM/0x63100024
Attempt connection with server "eupap2.wabco-vcs.com"
134 10:58:35.140 07/07/11 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 62.206.129.106.
135 10:58:35.140 07/07/11 Sev=Debug/9 IKE/0x63000091
Unable to acquire local IP address after 1 attempts (over 1 seconds), probably due to network socket failure.
136 10:58:35.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_INITIAL Event: EV_INITIATOR
137 10:58:35.140 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_GEN_DHKEY
138 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_BLD_MSG
139 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_START_RETRY_TMR
140 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_SND_MSG1 Event: EV_SND_MSG
141 10:58:35.156 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 62.206.129.106
142 10:58:35.156 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: 0000000000000000
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 862
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 556
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 544
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 14
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 1
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 2
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 3
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 4
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 256
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 5
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 6
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 7
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 40
Transform #: 8
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: AES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Key Length: 128
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 9
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 10
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 11
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: SHA1
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 12
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: Transform
Reserved: 00
Payload Length: 36
Transform #: 13
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 14
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: Preshared key
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): F92F983479C7DFE9ABD30B6F379B367262EEF67DC66995A7BDA69A01CC905DE54DA7FC507003F6C41727D4681A7C584755BD8ECA00EB50D4806D799C276059033CE55E19766E4C229588F12611DE4914195DCAE975592B25F1FEF6C6AD3A72DB2DBE8838556934B38EB92A0592BF364340E0DD580B71C4926CEEA9CC77C9E788
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 1C959922914E6120A4A9CCAD1FF5C5E1F16B2F1A
Payload Identification
Next Payload: Vendor ID
Reserved: 00
Payload Length: 26
ID Type: ID_KEY_ID
Protocol ID(UDP/TCP, etc...): 17
Port: 500
ID Data: vcs_charleston_m&l
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D380000000
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
143 10:58:35.156 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=0000000000000000 CurState: AM_WAIT_MSG2 Event: EV_NO_EVENT
144 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
145 10:58:35.296 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 62.206.129.106
146 10:58:35.296 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Security Association
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (none)
MessageID(Hex): 0
Length: 428
Payload Security Association
Next Payload: Key Exchange
Reserved: 00
Payload Length: 56
DOI: IPsec
Situation: (SIT_IDENTITY_ONLY)
Payload Proposal
Next Payload: None
Reserved: 00
Payload Length: 44
Proposal #: 1
Protocol-Id: PROTO_ISAKMP
SPI Size: 0
# of transforms: 1
Payload Transform
Next Payload: None
Reserved: 00
Payload Length: 36
Transform #: 10
Transform-Id: KEY_IKE
Reserved2: 0000
Encryption Algorithm: 3DES-CBC
Hash Algorithm: MD5
Group Description: Group 2
Authentication Method: XAUTHInitPreShared
Life Type: seconds
Life Duration (Hex): 0020C49B
Payload Key Exchange
Next Payload: Nonce
Reserved: 00
Payload Length: 132
Data (In Hex): B3571F9971656102A37FAE6B58422E26D020AC05CE9318E7D5B9FA5496C8EC50F7A2DBF3601E0E7470D38F020F83FE44ADAEAA38A05AA279924E060AE13D5B2C1209759C26C9B5057D9222675B16DCA7FFE1267F87DB4D2AC220D18B1F2458EA560987842444E0E8DA454C01448E7C8D383646E5BA5D3946515711FB021D57EB
Payload Nonce
Next Payload: Identification
Reserved: 00
Payload Length: 24
Data (In Hex): 6796A55E28CD4E1939EE5F618A4BBB5420726B77
Payload Identification
Next Payload: Hash
Reserved: 00
Payload Length: 12
ID Type: IPv4 Address
Protocol ID(UDP/TCP, etc...): 17
Port: 0
ID Data: 62.206.129.106
Payload Hash
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): D44B8B63D8027415031FD17EADC84F62
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 12
Data (In Hex): 09002689DFD6B712
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): AFCAD71368A1F1C96B8696FC77570100
Payload Vendor ID
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data (In Hex): 90CB80913EBB696E086381B5EC427B1F
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data: 3F38BFA488AD030E348F9AB2947ED24B
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data: 0002C1AD168972D2684EFF56B24E32CA
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 24
Data (In Hex): 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 1F07F70EAA6514D3B0FA96542A500100
147 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_RCVD_MSG
148 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
149 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
150 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports DPD
151 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
152 10:58:35.296 07/07/11 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
153 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_GEN_SKEYID
154 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_AUTHENTICATE_PEER
155 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_ADJUST_PORT
156 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_WAIT_MSG2 Event: EV_CRYPTO_ACTIVE
157 10:58:35.296 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_SND_MSG3 Event: EV_BLD_MSG
158 10:58:35.296 07/07/11 Sev=Debug/8 IKE/0x63000001
IOS Vendor ID Contruction started
159 10:58:35.312 07/07/11 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
160 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: AM_SND_MSG3 Event: EV_SND_MSG
161 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 62.206.129.106
162 10:58:35.312 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Aggressive Mode
Flags: (Encryption)
MessageID(Hex): 0
Length: 156
Payload Hash
Next Payload: Notification
Reserved: 00
Payload Length: 20
Data (In Hex): 1D5024E6D886EB1F7368595CC5C95083
Payload Notification
Next Payload: NAT-D
Reserved: 00
Payload Length: 28
DOI: IPsec
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
Notify Type: STATUS_INITIAL_CONTACT
SPI: B96D75BFB2E5A076AD3B385D45C459DE
Payload NAT-D
Next Payload: NAT-D
Reserved: 00
Payload Length: 20
Data: 0002C1AD168972D2684EFF56B24E32CA
Payload NAT-D
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data: 79502148A5A95DC8BA5690BBD92E11D5
Payload Vendor ID
Next Payload: Vendor ID
Reserved: 00
Payload Length: 20
Data (In Hex): 4CAAD2A2B2E4A076EF14D77FB14881F9
Payload Vendor ID
Next Payload: None
Reserved: 00
Payload Length: 20
Data (In Hex): 12F5F28C457168A9702D9FE274CC0100
163 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_P1_CMPL Event: EV_P1_CMPL
164 10:58:35.312 07/07/11 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
165 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x045A, Remote Port = 0x1194
166 10:58:35.312 07/07/11 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
167 10:58:35.312 07/07/11 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 2 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
168 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_P1_CMPL Event: EV_CHK_4REKEY
169 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_P1_CMPL Event: EV_CHK_4XAUTH
170 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_INIT_XAUTH
171 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
172 10:58:35.312 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
173 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
174 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
175 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RXM_P1MSG
176 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
177 10:58:35.312 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(Retransmission) to 62.206.129.106
178 10:58:35.312 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
179 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
180 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 62.206.129.106
181 10:58:35.437 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Transaction
Flags: (Encryption)
MessageID(Hex): D898D043
Length: 76
Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 20
Data (In Hex): B8B1548BF75B70FAE58F27D029EACB42
Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 24
Type: ISAKMP_CFG_REQUEST
Reserved: 00
Identifier: 0000
XAUTH Type: Generic
XAUTH User Name: (empty)
Cisco extension: XAUTH Vendor: 0100
XAUTH Passcode: (empty)
182 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_INITIAL Event: EV_RCVD_MSG
183 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_PCS_XAUTH_REQ Event: EV_INIT_XAUTH
184 10:58:35.437 07/07/11 Sev=Info/4 CM/0x63100015
Launch xAuth application
185 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_PCS_XAUTH_REQ Event: EV_START_RETRY_TMR
186 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
187 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
188 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
189 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
190 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
191 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
192 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
193 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
194 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
195 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
196 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
197 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
198 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
199 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
200 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
201 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
202 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
203 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
204 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
205 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
206 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
207 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
208 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
209 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
210 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
211 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
212 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (Retransmission) from 62.206.129.106
213 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_RESEND
214 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_NO_EVENT
215 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
216 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
217 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
218 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
219 10:58:35.437 07/07/11 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 62.206.129.106
220 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 62.206.129.106
221 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RESEND
222 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_NO_EVENT
223 10:58:35.437 07/07/11 Sev=Info/4 CM/0x63100017
xAuth application returned
224 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_RCVD_USER_INPUT
225 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_WAIT_4USER Event: EV_SND_MSG
226 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 62.206.129.106
227 10:58:35.437 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Transaction
Flags: (Encryption)
MessageID(Hex): D898D043
Length: 64
Payload Hash
Next Payload: Attributes
Reserved: 00
Payload Length: 20
Data (In Hex): DA2A2A571D3EC23387EE9CA8896AB006
Payload Attributes
Next Payload: None
Reserved: 00
Payload Length: 16
Type: ISAKMP_CFG_REPLY
Reserved: 00
Identifier: 0000
XAUTH Type: Generic
XAUTH Status: Fail
228 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_XAUTHREQ_DONE Event: EV_XAUTHREQ_DONE
229 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_XAUTHREQ_DONE Event: EV_NO_EVENT
230 10:58:35.437 07/07/11 Sev=Info/4 CM/0x63100018
User does not provide any authentication data
231 10:58:35.437 07/07/11 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
232 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_XAUTH_PROG Event: EV_PROMPT_TERM
233 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_TERMINATE Event: EV_PROMPT_TERM
234 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_TERMINATE Event: EV_NO_EVENT
235 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_XAUTHREQ_DONE Event: EV_TERM_REQUEST
236 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_FREE Event: EV_REMOVE
237 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->TM: MsgID=D898D043 CurState: TM_FREE Event: EV_NO_EVENT
238 10:58:35.437 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_TERMINATE Event: EV_PROMPT_DELETE
239 10:58:35.453 07/07/11 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE) reason = DEL_REASON_RESET_SADB
240 10:58:35.453 07/07/11 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 62.206.129.106
241 10:58:35.453 07/07/11 Sev=Decode/11 IKE/0x63000001
ISAKMP Header
Initiator COOKIE: B96D75BFB2E5A076
Responder COOKIE: AD3B385D45C459DE
Next Payload: Hash
Ver (Hex): 10
Exchange Type: Informational
Flags: (Encryption)
MessageID(Hex): 2FBB609
Length: 76
Payload Hash
Next Payload: Delete
Reserved: 00
Payload Length: 20
Data (In Hex): AC0CB0012D1AC7E16DFB7DAF9EA144B7
Payload Delete
Next Payload: None
Reserved: 00
Payload Length: 28
DOI: Isakmp
Protocol-ID: PROTO_ISAKMP
Spi Size: 16
# of SPIs: 1
SPI (Hex dump): B96D75BFB2E5A076AD3B385D45C459DE
242 10:58:35.453 07/07/11 Sev=Debug/7 IKE/0x63000076
NAV Trace->SA: I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE CurState: CMN_FREE Event: EV_NO_EVENT
243 10:58:35.453 07/07/11 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=B96D75BFB2E5A076 R_Cookie=AD3B385D45C459DE) reason = DEL_REASON_RESET_SADB
244 10:58:35.453 07/07/11 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
245 10:58:35.500 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: started
246 10:58:35.500 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: interface change handler invoked
247 10:58:35.500 07/07/11 Sev=Debug/7 CM/0x63100033
Auto-initiation watch: auto-initiation is currently disabled
248 10:58:35.515 07/07/11 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
249 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
250 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
251 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
252 10:58:35.921 07/07/11 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
07-07-2011 08:12 AM
If it will help I can send a log of a successful connection to another VPN.
Just let me know.
AND thanks for the help btw!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide