EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 00:21:18.238 02/25/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 00:21:18.248 02/25/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xA9FE121F (DRVIFACE:1199). 3 00:21:18.248 02/25/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xA9FE2481 (DRVIFACE:1199). 4 00:21:18.248 02/25/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 5 00:21:18.248 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 6 00:21:18.248 02/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 7 00:21:18.258 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 8 00:21:18.298 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 9 00:21:18.298 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 10 00:21:18.298 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 11 00:21:18.298 02/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 12 00:21:18.308 02/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 13 00:21:18.308 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 14 00:21:18.308 02/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 15 00:21:18.308 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 16 00:21:18.348 02/25/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 17 00:21:18.348 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 18 00:21:18.348 02/25/06 Sev=Info/4 IPSEC/0x6370000D Key(s) deleted by Interface (137.69.36.165) 19 00:21:18.358 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 20 00:21:18.358 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 21 00:21:18.358 02/25/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 22 00:21:18.859 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 23 00:21:18.859 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 24 00:21:19.880 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 25 00:21:19.880 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 26 00:21:21.893 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 27 00:21:21.893 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 28 00:21:25.819 02/25/06 Sev=Info/4 CM/0x63100017 xAuth application returned 29 00:21:25.819 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 30 00:21:27.932 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 31 00:21:27.932 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 32 00:21:27.932 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 33 00:21:27.932 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 34 00:21:27.952 02/25/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 35 00:21:27.952 02/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 36 00:21:27.952 02/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 37 00:21:27.962 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 38 00:21:28.373 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 10.0.0.1 39 00:21:28.373 02/25/06 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 40 00:21:33.370 02/25/06 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 41 00:21:33.370 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 10.0.0.1 42 00:21:33.370 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 43 00:21:33.370 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 44 00:21:33.370 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.24.198.158 45 00:21:33.370 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.255 46 00:21:33.370 02/25/06 Sev=Info/4 CM/0x63100019 Mode Config data received 47 00:21:33.380 02/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.198.158, GW IP = 10.0.0.1, Remote IP = 0.0.0.0 48 00:21:33.380 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 49 00:21:33.410 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 50 00:21:33.410 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 51 00:21:33.410 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 52 00:21:33.410 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 53 00:21:33.410 02/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=03E9209C OUTBOUND SPI = 0xFF4CF2B2 INBOUND SPI = 0x05A93EAF) 54 00:21:33.410 02/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0xFF4CF2B2 55 00:21:33.410 02/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x05A93EAF 56 00:21:33.510 02/25/06 Sev=Warning/2 CVPND/0xE3400014 The VPN Client could not find the adapters GUID. 57 00:21:33.510 02/25/06 Sev=Warning/3 CVPND/0xE340000D The Client was unable to enable the Virtual Adapter because it could not set the IP configuration into the registry. 58 00:21:33.510 02/25/06 Sev=Warning/2 CM/0xE310000A The virtual adapter failed to enable 59 00:21:33.510 02/25/06 Sev=Warning/2 IKE/0xE3000099 Failed to active IPSec SA: Unable to enable Virtual Adapter (NavigatorQM:936) 60 00:21:33.510 02/25/06 Sev=Warning/2 IKE/0xE30000A5 Unexpected SW error occurred while processing Quick Mode negotiator:(Navigator:2202) 61 00:21:33.510 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 62 00:21:33.510 02/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = FF4CF2B2 INBOUND SPI = 5A93EAF) 63 00:21:33.510 02/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=03E9209C 64 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 65 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 66 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb2f24cff into key list 67 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 68 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xaf3ea905 into key list 69 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xaf3ea905 70 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xaf3ea905 71 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb2f24cff 72 00:21:33.881 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb2f24cff 73 00:21:35.373 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 74 00:21:35.373 02/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.198.158, GW IP = 0.0.0.0, Remote IP = 172.16.0.100 75 00:21:35.373 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 76 00:21:35.393 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 77 00:21:35.393 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 78 00:21:35.393 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 79 00:21:35.393 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 80 00:21:35.393 02/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B55EC9A6 OUTBOUND SPI = 0x6D3B3649 INBOUND SPI = 0x8B1F72B4) 81 00:21:35.393 02/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x6D3B3649 82 00:21:35.393 02/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x8B1F72B4 83 00:21:35.503 02/25/06 Sev=Warning/2 CVPND/0xE3400014 The VPN Client could not find the adapters GUID. 84 00:21:35.503 02/25/06 Sev=Warning/3 CVPND/0xE340000D The Client was unable to enable the Virtual Adapter because it could not set the IP configuration into the registry. 85 00:21:35.503 02/25/06 Sev=Warning/2 CM/0xE310000A The virtual adapter failed to enable 86 00:21:35.503 02/25/06 Sev=Warning/2 IKE/0xE3000099 Failed to active IPSec SA: Unable to enable Virtual Adapter (NavigatorQM:936) 87 00:21:35.503 02/25/06 Sev=Warning/2 IKE/0xE30000A5 Unexpected SW error occurred while processing Quick Mode negotiator:(Navigator:2202) 88 00:21:35.503 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 89 00:21:35.503 02/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 6D3B3649 INBOUND SPI = 8B1F72B4) 90 00:21:35.503 02/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B55EC9A6 91 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x49363b6d into key list 92 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 93 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb4721f8b into key list 94 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb4721f8b 95 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb4721f8b 96 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x49363b6d 97 00:21:35.883 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x49363b6d 98 00:21:36.384 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 99 00:21:36.384 02/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.198.158, GW IP = 0.0.0.0, Remote IP = 172.16.0.100 100 00:21:36.384 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 101 00:21:36.404 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 102 00:21:36.404 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 103 00:21:36.404 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 104 00:21:36.404 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 105 00:21:36.404 02/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=3C3D2752 OUTBOUND SPI = 0xDB47C212 INBOUND SPI = 0x3F4CFB3A) 106 00:21:36.404 02/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0xDB47C212 107 00:21:36.404 02/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x3F4CFB3A 108 00:21:36.514 02/25/06 Sev=Warning/2 CVPND/0xE3400014 The VPN Client could not find the adapters GUID. 109 00:21:36.514 02/25/06 Sev=Warning/3 CVPND/0xE340000D The Client was unable to enable the Virtual Adapter because it could not set the IP configuration into the registry. 110 00:21:36.514 02/25/06 Sev=Warning/2 CM/0xE310000A The virtual adapter failed to enable 111 00:21:36.514 02/25/06 Sev=Warning/2 IKE/0xE3000099 Failed to active IPSec SA: Unable to enable Virtual Adapter (NavigatorQM:936) 112 00:21:36.514 02/25/06 Sev=Warning/2 IKE/0xE30000A5 Unexpected SW error occurred while processing Quick Mode negotiator:(Navigator:2202) 113 00:21:36.514 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 114 00:21:36.514 02/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = DB47C212 INBOUND SPI = 3F4CFB3A) 115 00:21:36.514 02/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=3C3D2752 116 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x12c247db into key list 117 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 118 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3afb4c3f into key list 119 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3afb4c3f 120 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3afb4c3f 121 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x12c247db 122 00:21:36.885 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x12c247db 123 00:21:38.377 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 124 00:21:38.377 02/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.198.158, GW IP = 0.0.0.0, Remote IP = 172.16.0.100 125 00:21:38.377 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 126 00:21:38.397 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 127 00:21:38.397 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 128 00:21:38.397 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 129 00:21:38.397 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 130 00:21:38.397 02/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=60F0AD5A OUTBOUND SPI = 0x18A4213C INBOUND SPI = 0x4BC42AB4) 131 00:21:38.397 02/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x18A4213C 132 00:21:38.397 02/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4BC42AB4 133 00:21:38.507 02/25/06 Sev=Warning/2 CVPND/0xE3400014 The VPN Client could not find the adapters GUID. 134 00:21:38.507 02/25/06 Sev=Warning/3 CVPND/0xE340000D The Client was unable to enable the Virtual Adapter because it could not set the IP configuration into the registry. 135 00:21:38.507 02/25/06 Sev=Warning/2 CM/0xE310000A The virtual adapter failed to enable 136 00:21:38.507 02/25/06 Sev=Warning/2 IKE/0xE3000099 Failed to active IPSec SA: Unable to enable Virtual Adapter (NavigatorQM:936) 137 00:21:38.507 02/25/06 Sev=Warning/2 IKE/0xE30000A5 Unexpected SW error occurred while processing Quick Mode negotiator:(Navigator:2202) 138 00:21:38.507 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 139 00:21:38.507 02/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 18A4213C INBOUND SPI = 4BC42AB4) 140 00:21:38.507 02/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=60F0AD5A 141 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3c21a418 into key list 142 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 143 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb42ac44b into key list 144 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb42ac44b 145 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb42ac44b 146 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3c21a418 147 00:21:38.888 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3c21a418 148 00:22:08.921 02/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=1CD45DDBA001C56B R_Cookie=1218035392C146D7) reason = DEL_REASON_PEER_NOT_RESPONDING 149 00:22:08.921 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 150 00:22:09.422 02/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=1CD45DDBA001C56B R_Cookie=1218035392C146D7) reason = DEL_REASON_PEER_NOT_RESPONDING 151 00:22:09.422 02/25/06 Sev=Info/4 CM/0x63100012 Phase 1 SA deleted before first Phase 2 SA is up cause by "DEL_REASON_PEER_NOT_RESPONDING". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 152 00:22:09.462 02/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 153 00:22:09.472 02/25/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 154 00:22:09.922 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 155 00:22:09.922 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 156 00:22:09.922 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 157 00:22:09.922 02/25/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 158 00:22:23.872 02/25/06 Sev=Info/4 CM/0x63100002 Begin connection process 159 00:22:23.872 02/25/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xA9FE121F (DRVIFACE:1199). 160 00:22:23.872 02/25/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xA9FE2481 (DRVIFACE:1199). 161 00:22:23.882 02/25/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 162 00:22:23.882 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 163 00:22:23.892 02/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 164 00:22:23.923 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 165 00:22:23.953 02/25/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 166 00:22:23.953 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 167 00:22:23.953 02/25/06 Sev=Info/4 IPSEC/0x6370000D Key(s) deleted by Interface (137.69.36.165) 168 00:22:24.463 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 169 00:22:24.463 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 170 00:22:24.463 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 171 00:22:24.463 02/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 172 00:22:24.493 02/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 173 00:22:24.493 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 174 00:22:24.493 02/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 175 00:22:24.493 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 176 00:22:24.523 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 177 00:22:24.523 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 178 00:22:24.523 02/25/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 179 00:22:25.024 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 180 00:22:25.024 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 181 00:22:26.046 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 182 00:22:26.046 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 183 00:22:28.069 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 184 00:22:28.069 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 185 00:22:32.074 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 186 00:22:32.074 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 187 00:22:33.206 02/25/06 Sev=Info/4 CM/0x63100017 xAuth application returned 188 00:22:33.206 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 189 00:22:33.206 02/25/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 190 00:22:33.206 02/25/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 191 00:22:33.206 02/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=67DD794DFE3D4DD5 R_Cookie=48C9E8308991441C) reason = DEL_REASON_RESET_SADB 192 00:22:33.206 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 193 00:22:33.206 02/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=67DD794DFE3D4DD5 R_Cookie=48C9E8308991441C) reason = DEL_REASON_RESET_SADB 194 00:22:33.236 02/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 195 00:22:33.466 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 196 00:22:33.466 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 197 00:22:33.466 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 198 00:22:33.466 02/25/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped