EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 00:07:50.404 03/08/06 Sev=Warning/3 GUI/0xA3B00002 Application Launcher was not able to launch application "net start blackice". 2 00:07:50.424 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 3 00:07:50.464 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 4 00:07:50.464 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 5 00:07:50.495 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1136 for TCP connection. 6 00:07:50.755 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 00:07:50.765 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 00:07:50.765 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1136, dst port 4005 9 00:07:50.765 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1136 10 00:07:50.765 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1136, dst port 4005 11 00:07:50.765 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 00:07:51.256 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 00:07:51.276 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 00:07:51.306 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 00:07:51.466 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 00:07:51.466 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 00:07:51.466 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 00:07:51.466 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 00:07:51.466 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 00:07:51.466 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 00:07:51.476 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 00:07:51.476 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 00:07:51.476 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 00:07:51.476 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 00:07:51.496 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 00:07:51.496 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 00:07:51.496 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 00:07:51.496 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=407C4F3B38A758D5 R_Cookie=CCD1F67C94E5142D) reason = DEL_REASON_LOAD_BALANCING 29 00:07:51.496 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 00:07:52.257 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=407C4F3B38A758D5 R_Cookie=CCD1F67C94E5142D) reason = DEL_REASON_LOAD_BALANCING 31 00:07:52.257 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 00:07:52.257 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 00:07:52.257 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 00:07:52.267 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 00:07:52.758 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1136, dst port 4005 36 00:07:52.758 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1136, dst port 4005 37 00:07:52.758 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1136 38 00:07:52.758 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1136, dst port 4005 39 00:07:52.768 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 40 00:07:53.258 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 41 00:07:53.279 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 42 00:07:53.299 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 43 00:07:53.469 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 44 00:07:53.469 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 45 00:07:53.469 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 00:07:53.469 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 00:07:53.469 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 00:07:53.469 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 00:07:53.469 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 00:07:53.469 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 51 00:07:53.469 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 00:07:53.469 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 00:07:53.489 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 54 00:07:53.489 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 55 00:07:53.489 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 00:08:09.342 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 57 00:08:09.342 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 58 00:08:20.468 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 59 00:08:20.468 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 60 00:08:20.468 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 61 00:08:20.468 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 62 00:08:20.578 03/08/06 Sev=Warning/3 IKE/0xA300005F Firewall, NetworkICE BlackICE Defender, is not running, the client will not send firewall information to concentrator. 63 00:08:20.578 03/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 64 00:08:20.578 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 65 00:08:20.578 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 66 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 67 00:08:21.449 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 68 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.92 69 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 70 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 71 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 72 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 73 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 74 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 75 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 76 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 77 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 78 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 79 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 80 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 81 00:08:21.449 03/08/06 Sev=Info/4 CM/0x63100016 Defering user notification 82 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 83 00:08:21.449 03/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 84 00:08:21.469 03/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 85 00:08:21.479 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.92, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 86 00:08:21.479 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 87 00:08:21.549 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 00:08:21.549 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 137.69.115.17 89 00:08:21.549 03/08/06 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 11 --> PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH. 90 00:08:21.549 03/08/06 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=A022494D999096E4 R_Cookie=8192DD3F1815E5A6 91 00:08:21.549 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 92 00:08:21.549 03/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=8D10B9BC 93 00:08:21.549 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A022494D999096E4 R_Cookie=8192DD3F1815E5A6) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH 94 00:08:21.810 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 95 00:08:21.810 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 96 00:08:21.810 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1136 97 00:08:22.300 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A022494D999096E4 R_Cookie=8192DD3F1815E5A6) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH 98 00:08:22.300 03/08/06 Sev=Info/4 CM/0x63100012 Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 99 00:08:22.300 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 100 00:08:22.330 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 101 00:08:22.801 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1136, dst port 4005 102 00:08:22.801 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1136, dst port 4005 103 00:08:22.801 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1136 104 00:08:22.801 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1136, dst port 4005 105 00:08:27.808 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1136, dst port 4005 106 00:08:32.815 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1136, dst port 4005 107 00:08:37.823 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1136, dst port 4005 108 00:08:42.830 03/08/06 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw1.emc.com" 109 00:08:42.830 03/08/06 Sev=Info/4 CM/0x6310000C All connection attempts with backup server failed 110 00:08:42.850 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 111 00:08:42.850 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 112 00:08:42.850 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1136 for TCP connection. 113 00:08:42.850 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 114 00:08:42.850 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1136, dst port 4005 115 00:08:42.850 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 116 00:08:42.850 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 117 00:08:42.850 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 118 00:08:42.850 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 119 00:09:49.686 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 120 00:09:49.696 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 121 00:09:49.696 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 122 00:09:49.746 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1148 for TCP connection. 123 00:09:50.427 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 124 00:09:50.427 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 125 00:09:50.427 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 2 packets, 0 were fragmented. 126 00:09:50.427 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1148, dst port 4005 127 00:09:50.427 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1148 128 00:09:50.427 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1148, dst port 4005 129 00:09:50.427 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 130 00:09:50.928 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 131 00:09:50.938 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 132 00:09:50.948 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 133 00:09:51.098 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 134 00:09:51.098 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 135 00:09:51.098 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 136 00:09:51.098 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 137 00:09:51.098 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 138 00:09:51.098 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 139 00:09:51.108 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 140 00:09:51.108 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 141 00:09:51.108 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 142 00:09:51.108 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 143 00:09:51.128 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 144 00:09:51.128 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 145 00:09:51.128 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 146 00:09:51.128 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=816FF2EFDB472023 R_Cookie=621C4C5BFFF038FD) reason = DEL_REASON_LOAD_BALANCING 147 00:09:51.128 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 148 00:09:51.929 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=816FF2EFDB472023 R_Cookie=621C4C5BFFF038FD) reason = DEL_REASON_LOAD_BALANCING 149 00:09:51.929 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 150 00:09:51.929 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 151 00:09:51.929 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 152 00:09:51.929 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 153 00:09:52.440 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1148, dst port 4005 154 00:09:52.440 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1148, dst port 4005 155 00:09:52.440 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1148 156 00:09:52.440 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1148, dst port 4005 157 00:09:52.440 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 158 00:09:52.931 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 159 00:09:52.941 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 160 00:09:52.941 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 161 00:09:53.111 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 162 00:09:53.111 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 163 00:09:53.111 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 164 00:09:53.111 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 165 00:09:53.111 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 166 00:09:53.111 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 167 00:09:53.121 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 168 00:09:53.121 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 169 00:09:53.121 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 170 00:09:53.121 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 171 00:09:53.141 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 172 00:09:53.141 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 173 00:09:53.141 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 174 00:10:00.291 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 175 00:10:00.291 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 176 00:10:02.695 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 177 00:10:02.695 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 178 00:10:02.695 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 179 00:10:02.695 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 180 00:10:02.715 03/08/06 Sev=Warning/3 IKE/0xA300005F Firewall, NetworkICE BlackICE Defender, is not running, the client will not send firewall information to concentrator. 181 00:10:02.715 03/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 182 00:10:02.715 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 183 00:10:02.715 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 184 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 185 00:10:03.696 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 186 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.21 187 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 188 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 189 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 190 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 191 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 192 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 193 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 194 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 195 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 196 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 197 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 198 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 199 00:10:03.696 03/08/06 Sev=Info/4 CM/0x63100016 Defering user notification 200 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 201 00:10:03.696 03/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 202 00:10:03.696 03/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 203 00:10:03.706 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.21, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 204 00:10:03.706 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 205 00:10:03.726 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 206 00:10:03.726 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 137.69.115.17 207 00:10:03.726 03/08/06 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 11 --> PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH. 208 00:10:03.726 03/08/06 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=6E56339029AF03B7 R_Cookie=81AA6D09E366258B 209 00:10:03.726 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 210 00:10:03.726 03/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=92E90D83 211 00:10:03.726 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=6E56339029AF03B7 R_Cookie=81AA6D09E366258B) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH 212 00:10:03.966 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 213 00:10:03.966 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 214 00:10:03.966 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1148 215 00:10:04.447 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=6E56339029AF03B7 R_Cookie=81AA6D09E366258B) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH 216 00:10:04.447 03/08/06 Sev=Info/4 CM/0x63100012 Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 217 00:10:04.447 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 218 00:10:04.467 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 219 00:10:04.948 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1148, dst port 4005 220 00:10:04.948 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1148, dst port 4005 221 00:10:04.948 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1148 222 00:10:04.948 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1148, dst port 4005 223 00:10:09.955 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1148, dst port 4005 224 00:10:14.962 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1148, dst port 4005 225 00:10:19.969 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1148, dst port 4005 226 00:10:24.977 03/08/06 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw1.emc.com" 227 00:10:24.977 03/08/06 Sev=Info/4 CM/0x6310000C All connection attempts with backup server failed 228 00:10:24.997 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 229 00:10:24.997 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 230 00:10:24.997 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1148 for TCP connection. 231 00:10:25.007 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 232 00:10:25.007 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1148, dst port 4005 233 00:10:25.007 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 234 00:10:25.007 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 235 00:10:25.007 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 236 00:10:25.007 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 237 00:27:21.008 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 238 00:27:21.008 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 239 00:27:21.008 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 240 00:27:21.038 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1293 for TCP connection. 241 00:27:21.038 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 242 00:27:21.038 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 243 00:27:21.038 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 2 packets, 0 were fragmented. 244 00:27:21.038 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1293, dst port 4005 245 00:27:22.029 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1293 246 00:27:22.029 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1293, dst port 4005 247 00:27:22.029 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 248 00:27:22.530 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 249 00:27:22.620 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 250 00:27:22.630 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 251 00:27:22.780 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 252 00:27:22.780 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 253 00:27:22.790 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 254 00:27:22.790 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 255 00:27:22.790 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 256 00:27:22.790 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 257 00:27:22.790 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 258 00:27:22.790 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 259 00:27:22.790 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 260 00:27:22.790 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 261 00:27:22.850 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 262 00:27:22.850 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 263 00:27:22.850 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 264 00:27:22.850 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D30D83C23FD06506 R_Cookie=56D548ABA44EC5BF) reason = DEL_REASON_LOAD_BALANCING 265 00:27:22.850 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 266 00:27:23.531 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D30D83C23FD06506 R_Cookie=56D548ABA44EC5BF) reason = DEL_REASON_LOAD_BALANCING 267 00:27:23.531 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 268 00:27:23.531 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 269 00:27:23.531 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 270 00:27:23.541 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 271 00:27:24.042 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1293, dst port 4005 272 00:27:24.042 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1293, dst port 4005 273 00:27:24.042 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1293 274 00:27:24.042 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1293, dst port 4005 275 00:27:24.042 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 276 00:27:24.543 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 277 00:27:24.553 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 278 00:27:24.583 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 279 00:27:24.743 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 280 00:27:24.743 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 281 00:27:24.743 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 282 00:27:24.743 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 283 00:27:24.743 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 284 00:27:24.743 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 285 00:27:24.753 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 286 00:27:24.753 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 287 00:27:24.753 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 288 00:27:24.753 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 289 00:27:24.793 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 00:27:24.793 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 291 00:27:24.793 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 292 00:27:29.009 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 293 00:27:29.009 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 294 00:27:29.009 03/08/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 295 00:27:29.009 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 296 00:27:29.009 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8FA5A65C689DC835 R_Cookie=C618381FE7FC626B) reason = DEL_REASON_RESET_SADB 297 00:27:29.009 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 298 00:27:29.009 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8FA5A65C689DC835 R_Cookie=C618381FE7FC626B) reason = DEL_REASON_RESET_SADB 299 00:27:29.069 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 300 00:27:29.069 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 301 00:27:29.069 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1293 for TCP connection. 302 00:27:29.079 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 303 00:27:29.079 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1293 304 00:27:29.079 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1293, dst port 4005 305 00:27:29.079 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 306 00:27:29.079 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 307 00:27:29.079 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 308 00:28:06.283 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 309 00:28:06.293 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 310 00:28:06.293 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 311 00:28:06.303 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1300 for TCP connection. 312 00:28:06.593 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 313 00:28:06.593 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 314 00:28:06.593 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 315 00:28:06.593 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1300, dst port 4005 316 00:28:06.593 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1300 317 00:28:06.593 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1300, dst port 4005 318 00:28:06.593 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 319 00:28:07.104 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 320 00:28:07.124 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 321 00:28:07.144 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 322 00:28:07.304 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 323 00:28:07.304 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 324 00:28:07.304 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 325 00:28:07.304 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 326 00:28:07.304 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 327 00:28:07.304 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 328 00:28:07.314 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 329 00:28:07.314 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 330 00:28:07.314 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 331 00:28:07.314 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 332 00:28:07.334 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 333 00:28:07.334 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 334 00:28:07.334 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 335 00:28:07.334 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=17D044AC47598E8E R_Cookie=84A1856C40250180) reason = DEL_REASON_LOAD_BALANCING 336 00:28:07.334 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 337 00:28:08.095 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=17D044AC47598E8E R_Cookie=84A1856C40250180) reason = DEL_REASON_LOAD_BALANCING 338 00:28:08.095 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 339 00:28:08.095 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 340 00:28:08.095 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 341 00:28:08.105 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 342 00:28:08.606 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1300, dst port 4005 343 00:28:08.606 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1300, dst port 4005 344 00:28:08.606 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1300 345 00:28:08.606 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1300, dst port 4005 346 00:28:08.606 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 347 00:28:09.107 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 348 00:28:09.117 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 349 00:28:09.147 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 350 00:28:09.307 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 351 00:28:09.307 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 352 00:28:09.307 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 353 00:28:09.307 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 354 00:28:09.307 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 355 00:28:09.307 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 356 00:28:09.307 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 357 00:28:09.307 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 358 00:28:09.307 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 359 00:28:09.307 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 360 00:28:09.337 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 361 00:28:09.337 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 362 00:28:09.337 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 363 00:28:17.289 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 364 00:28:17.289 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 365 00:28:19.532 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 366 00:28:19.532 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 367 00:28:19.532 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 368 00:28:19.532 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 369 00:28:19.572 03/08/06 Sev=Warning/3 IKE/0xA300005F Firewall, NetworkICE BlackICE Defender, is not running, the client will not send firewall information to concentrator. 370 00:28:19.572 03/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 371 00:28:19.572 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 372 00:28:19.572 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 373 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 374 00:28:20.593 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 375 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.101 376 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 377 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 378 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 379 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 380 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 381 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 382 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 383 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 384 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 385 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 386 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 387 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 388 00:28:20.593 03/08/06 Sev=Info/4 CM/0x63100016 Defering user notification 389 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 390 00:28:20.593 03/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 391 00:28:20.593 03/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 392 00:28:20.663 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.101, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 393 00:28:20.663 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 394 00:28:20.663 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 395 00:28:20.663 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 396 00:28:20.683 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 397 00:28:20.683 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 137.69.115.17 398 00:28:20.683 03/08/06 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 11 --> PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH. 399 00:28:20.683 03/08/06 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=765263BE15AE9976 R_Cookie=3A8F5E2297B922AD 400 00:28:20.683 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 401 00:28:20.683 03/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=9DB4F37B 402 00:28:20.683 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=765263BE15AE9976 R_Cookie=3A8F5E2297B922AD) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH 403 00:28:21.615 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1300 404 00:28:21.615 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=765263BE15AE9976 R_Cookie=3A8F5E2297B922AD) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH 405 00:28:21.615 03/08/06 Sev=Info/4 CM/0x63100012 Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 406 00:28:21.615 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 407 00:28:21.625 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 408 00:28:22.126 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1300, dst port 4005 409 00:28:22.126 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1300, dst port 4005 410 00:28:22.126 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1300 411 00:28:22.126 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1300, dst port 4005 412 00:28:27.123 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1300, dst port 4005 413 00:28:32.130 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1300, dst port 4005 414 00:28:34.573 03/08/06 Sev=Info/4 CM/0x63100026 Abort connection attempt before TCP session up 415 00:28:34.573 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 416 00:28:34.573 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 417 00:28:34.573 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1300 for TCP connection. 418 00:28:34.573 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 419 00:28:34.674 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1300, dst port 4005 420 00:28:34.674 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 421 00:28:34.674 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 422 00:28:34.674 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 423 00:28:34.674 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 424 00:29:16.894 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 425 00:29:16.894 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 426 00:29:16.894 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 427 00:29:16.904 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1311 for TCP connection. 428 00:29:17.195 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 429 00:29:17.195 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 430 00:29:17.195 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 2 packets, 0 were fragmented. 431 00:29:17.195 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1311, dst port 4005 432 00:29:17.195 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1311 433 00:29:17.195 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1311, dst port 4005 434 00:29:17.195 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 435 00:29:17.705 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 436 00:29:17.725 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 437 00:29:17.745 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 438 00:29:17.916 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 439 00:29:17.916 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 440 00:29:17.916 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 441 00:29:17.916 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 442 00:29:17.916 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 443 00:29:17.916 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 444 00:29:17.926 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 445 00:29:17.926 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 446 00:29:17.926 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 447 00:29:17.926 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 448 00:29:17.946 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 449 00:29:17.946 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 450 00:29:17.946 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 451 00:29:17.946 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=677AECDA6FCDFC9D R_Cookie=A64621E2DCD962A3) reason = DEL_REASON_LOAD_BALANCING 452 00:29:17.946 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 453 00:29:18.697 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=677AECDA6FCDFC9D R_Cookie=A64621E2DCD962A3) reason = DEL_REASON_LOAD_BALANCING 454 00:29:18.697 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 455 00:29:18.697 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 456 00:29:18.697 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 457 00:29:18.707 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 458 00:29:19.208 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1311, dst port 4005 459 00:29:19.208 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1311, dst port 4005 460 00:29:19.208 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1311 461 00:29:19.208 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1311, dst port 4005 462 00:29:19.208 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 463 00:29:19.708 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 464 00:29:19.728 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 465 00:29:19.748 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 466 00:29:19.909 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 467 00:29:19.909 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 468 00:29:19.909 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 469 00:29:19.909 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 470 00:29:19.909 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 471 00:29:19.909 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 472 00:29:19.919 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 473 00:29:19.919 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 474 00:29:19.919 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 475 00:29:19.919 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 476 00:29:19.939 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 477 00:29:19.939 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 478 00:29:19.939 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 479 00:29:21.641 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 480 00:29:21.641 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 481 00:29:21.641 03/08/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 482 00:29:21.641 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 483 00:29:21.641 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=2BEC086CF498D594 R_Cookie=7E5F67F2547AA5A0) reason = DEL_REASON_RESET_SADB 484 00:29:21.641 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 485 00:29:21.641 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=2BEC086CF498D594 R_Cookie=7E5F67F2547AA5A0) reason = DEL_REASON_RESET_SADB 486 00:29:21.681 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 487 00:29:21.681 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 488 00:29:21.681 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1311 for TCP connection. 489 00:29:21.701 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 490 00:29:21.701 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1311 491 00:29:21.701 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1311, dst port 4005 492 00:29:21.701 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 493 00:29:21.701 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 494 00:29:21.701 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 495 00:30:19.444 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 496 00:30:19.444 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 497 00:30:19.444 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 498 00:30:19.454 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1318 for TCP connection. 499 00:30:19.785 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 500 00:30:19.785 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 501 00:30:19.785 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 502 00:30:19.785 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1318, dst port 4005 503 00:30:19.785 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1318 504 00:30:19.785 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1318, dst port 4005 505 00:30:19.785 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 506 00:30:20.305 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 507 00:30:20.325 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 508 00:30:20.345 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 509 00:30:20.506 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 510 00:30:20.506 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 511 00:30:20.506 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 512 00:30:20.506 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 513 00:30:20.506 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 514 00:30:20.506 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 515 00:30:20.516 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 516 00:30:20.516 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 517 00:30:20.516 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 518 00:30:20.516 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 519 00:30:20.536 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 520 00:30:20.536 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 521 00:30:20.536 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 522 00:30:20.536 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F983C60F43281B9D R_Cookie=6F938F6AE2AD793F) reason = DEL_REASON_LOAD_BALANCING 523 00:30:20.536 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 524 00:30:21.287 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F983C60F43281B9D R_Cookie=6F938F6AE2AD793F) reason = DEL_REASON_LOAD_BALANCING 525 00:30:21.287 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 526 00:30:21.287 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 527 00:30:21.287 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 528 00:30:21.297 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 529 00:30:21.798 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1318, dst port 4005 530 00:30:21.798 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1318, dst port 4005 531 00:30:21.798 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1318 532 00:30:21.798 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1318, dst port 4005 533 00:30:21.798 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 534 00:30:22.298 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 535 00:30:22.318 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 536 00:30:22.338 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 537 00:30:22.499 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 538 00:30:22.499 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 539 00:30:22.499 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 540 00:30:22.499 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 541 00:30:22.499 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 542 00:30:22.499 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 543 00:30:22.499 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 544 00:30:22.499 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 545 00:30:22.509 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 546 00:30:22.509 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 547 00:30:22.529 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 548 00:30:22.529 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 549 00:30:22.529 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 550 00:30:31.131 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 551 00:30:31.131 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 552 00:30:34.987 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 553 00:30:34.987 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 554 00:30:34.987 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 555 00:30:34.987 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 556 00:30:35.027 03/08/06 Sev=Warning/3 IKE/0xA300005F Firewall, NetworkICE BlackICE Defender, is not running, the client will not send firewall information to concentrator. 557 00:30:35.027 03/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 558 00:30:35.027 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 559 00:30:35.027 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 560 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 561 00:30:35.978 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 562 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.6.12 563 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 564 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 565 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 566 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 567 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 568 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 569 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 570 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 571 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 572 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 573 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 574 00:30:35.978 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 575 00:30:35.988 03/08/06 Sev=Info/4 CM/0x63100016 Defering user notification 576 00:30:35.988 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 577 00:30:35.988 03/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 578 00:30:35.988 03/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 579 00:30:35.998 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.12, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 580 00:30:35.998 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 581 00:30:36.008 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 582 00:30:36.008 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 583 00:30:36.809 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.16, src port 4005, dst port 1318 584 00:30:37.270 03/08/06 Sev=Info/4 CM/0x63100009 Abort connection attempt before first Phase 2 SA is up 585 00:30:37.270 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 586 00:30:37.270 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 587 00:30:37.270 03/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=E4C9CABA 588 00:30:37.270 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B77B71C9A3669E86 R_Cookie=D9ABEAC74D68FABC) reason = DEL_REASON_RESET_SADB 589 00:30:37.270 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 590 00:30:37.270 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B77B71C9A3669E86 R_Cookie=D9ABEAC74D68FABC) reason = DEL_REASON_RESET_SADB 591 00:30:37.270 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 592 00:30:37.270 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 593 00:30:37.270 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1318 for TCP connection. 594 00:30:37.320 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 595 00:30:37.320 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1318, dst port 4005 596 00:30:37.320 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 597 00:30:37.320 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 598 00:30:37.320 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 599 00:31:37.947 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 600 00:31:37.947 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 601 00:31:37.947 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 602 00:31:37.957 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1325 for TCP connection. 603 00:31:37.957 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 604 00:31:37.957 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 605 00:31:37.957 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 3 packets, 0 were fragmented. 606 00:31:37.957 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1325, dst port 4005 607 00:31:38.898 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1325 608 00:31:38.898 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1325, dst port 4005 609 00:31:38.898 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 610 00:31:39.399 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 611 00:31:39.419 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 612 00:31:39.439 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 613 00:31:39.599 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 614 00:31:39.599 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 615 00:31:39.599 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 616 00:31:39.609 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 617 00:31:39.609 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 618 00:31:39.609 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 619 00:31:39.630 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 620 00:31:39.630 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 621 00:31:39.630 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 622 00:31:39.630 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 623 00:31:39.660 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 624 00:31:39.660 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 625 00:31:39.660 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 626 00:31:39.660 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=6537DF759C235C68 R_Cookie=43E466512AD1F7E9) reason = DEL_REASON_LOAD_BALANCING 627 00:31:39.660 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 628 00:31:40.401 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=6537DF759C235C68 R_Cookie=43E466512AD1F7E9) reason = DEL_REASON_LOAD_BALANCING 629 00:31:40.401 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 630 00:31:40.401 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 631 00:31:40.401 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 632 00:31:40.411 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 633 00:31:40.911 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1325, dst port 4005 634 00:31:40.911 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1325, dst port 4005 635 00:31:40.911 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1325 636 00:31:40.911 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1325, dst port 4005 637 00:31:40.911 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 638 00:31:41.482 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 639 00:31:41.492 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 640 00:31:41.502 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 641 00:31:41.662 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 642 00:31:41.662 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 643 00:31:41.662 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 644 00:31:41.662 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 645 00:31:41.662 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 646 00:31:41.662 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 647 00:31:41.702 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 648 00:31:41.702 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 649 00:31:41.702 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 650 00:31:41.702 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 651 00:31:41.723 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 652 00:31:41.723 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 653 00:31:41.723 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 654 00:31:43.425 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 655 00:31:43.425 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 656 00:31:43.425 03/08/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 657 00:31:43.425 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 658 00:31:43.425 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3AD32730EC522E3B R_Cookie=E83C5E9CB1747346) reason = DEL_REASON_RESET_SADB 659 00:31:43.425 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 660 00:31:43.425 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3AD32730EC522E3B R_Cookie=E83C5E9CB1747346) reason = DEL_REASON_RESET_SADB 661 00:31:43.455 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 662 00:31:43.455 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 663 00:31:43.455 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1325 for TCP connection. 664 00:31:43.916 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 665 00:31:43.916 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.16, src port 4005, dst port 1325 666 00:31:43.916 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1325, dst port 4005 667 00:31:43.916 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 668 00:31:43.916 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 669 00:31:43.916 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 670 00:32:51.733 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 671 00:32:51.743 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 672 00:32:51.743 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 673 00:32:51.753 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1334 for TCP connection. 674 00:32:52.004 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 675 00:32:52.004 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 676 00:32:52.004 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 677 00:32:52.004 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1334, dst port 4005 678 00:32:52.004 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1334 679 00:32:52.004 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1334, dst port 4005 680 00:32:52.004 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 681 00:32:52.524 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 682 00:32:52.534 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 683 00:32:52.564 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 684 00:32:52.725 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 685 00:32:52.725 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 686 00:32:52.725 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 687 00:32:52.725 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 688 00:32:52.725 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 689 00:32:52.725 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 690 00:32:52.735 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 691 00:32:52.735 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 692 00:32:52.735 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 693 00:32:52.735 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 694 00:32:52.755 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 695 00:32:52.755 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 696 00:32:52.755 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 697 00:32:52.755 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F70515431C1E71F7 R_Cookie=21F18E4BCC46B88D) reason = DEL_REASON_LOAD_BALANCING 698 00:32:52.755 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 699 00:32:53.506 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F70515431C1E71F7 R_Cookie=21F18E4BCC46B88D) reason = DEL_REASON_LOAD_BALANCING 700 00:32:53.506 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 701 00:32:53.506 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 702 00:32:53.506 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 703 00:32:53.516 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 704 00:32:54.016 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1334, dst port 4005 705 00:32:54.016 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1334, dst port 4005 706 00:32:54.016 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1334 707 00:32:54.016 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1334, dst port 4005 708 00:32:54.016 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 709 00:32:54.517 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 710 00:32:54.537 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 711 00:32:54.557 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 712 00:32:54.727 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 713 00:32:54.727 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 714 00:32:54.727 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 715 00:32:54.727 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 716 00:32:54.727 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 717 00:32:54.727 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 718 00:32:54.727 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 719 00:32:54.727 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 720 00:32:54.727 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 721 00:32:54.727 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 722 00:32:54.758 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 723 00:32:54.758 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 724 00:32:54.758 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 725 00:32:58.373 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 726 00:32:58.373 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 727 00:32:58.373 03/08/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 728 00:32:58.373 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 729 00:32:58.373 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F56D1EA80478F744 R_Cookie=1FE688299CDAFE0C) reason = DEL_REASON_RESET_SADB 730 00:32:58.373 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 731 00:32:58.373 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F56D1EA80478F744 R_Cookie=1FE688299CDAFE0C) reason = DEL_REASON_RESET_SADB 732 00:32:58.433 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 733 00:32:58.433 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 734 00:32:58.433 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1334 for TCP connection. 735 00:32:58.523 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 736 00:32:58.523 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.16, src port 4005, dst port 1334 737 00:32:58.523 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1334, dst port 4005 738 00:32:58.523 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 739 00:32:58.523 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 740 00:32:58.523 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 741 00:33:05.773 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 742 00:33:05.783 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 743 00:33:05.783 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 744 00:33:05.783 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1341 for TCP connection. 745 00:33:06.524 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 746 00:33:06.524 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 747 00:33:06.524 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 748 00:33:06.524 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1341, dst port 4005 749 00:33:06.524 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1341 750 00:33:06.524 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1341, dst port 4005 751 00:33:06.524 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 752 00:33:07.045 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 753 00:33:07.055 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 754 00:33:07.085 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 755 00:33:07.245 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 756 00:33:07.245 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 757 00:33:07.245 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 758 00:33:07.245 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 759 00:33:07.245 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 760 00:33:07.245 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 761 00:33:07.245 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 762 00:33:07.245 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 763 00:33:07.245 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 764 00:33:07.245 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 765 00:33:07.276 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 766 00:33:07.276 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 767 00:33:07.276 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 768 00:33:07.276 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=5001EBA10F8AA7FF R_Cookie=26ED6DD5368613DA) reason = DEL_REASON_LOAD_BALANCING 769 00:33:07.276 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 770 00:33:08.027 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=5001EBA10F8AA7FF R_Cookie=26ED6DD5368613DA) reason = DEL_REASON_LOAD_BALANCING 771 00:33:08.027 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 772 00:33:08.027 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 773 00:33:08.027 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 774 00:33:08.037 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 775 00:33:08.547 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1341, dst port 4005 776 00:33:08.547 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1341, dst port 4005 777 00:33:08.547 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1341 778 00:33:08.547 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1341, dst port 4005 779 00:33:08.547 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 780 00:33:09.118 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 781 00:33:09.138 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 782 00:33:09.148 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 783 00:33:09.308 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 784 00:33:09.308 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 785 00:33:09.308 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 786 00:33:09.308 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 787 00:33:09.308 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 788 00:33:09.308 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 789 00:33:09.318 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 790 00:33:09.318 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 791 00:33:09.318 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 792 00:33:09.318 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 793 00:33:09.338 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 794 00:33:09.338 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 795 00:33:09.338 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 796 00:33:39.332 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 797 00:33:39.332 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 137.69.115.17 798 00:34:09.335 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 799 00:34:09.335 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 137.69.115.17 800 00:34:39.328 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 801 00:34:39.328 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 137.69.115.17 802 00:35:02.732 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 803 00:35:02.732 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 804 00:35:02.742 03/08/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 805 00:35:02.742 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 806 00:35:02.742 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A827B22F2845B9E9 R_Cookie=3B2286BAEE2DFCE0) reason = DEL_REASON_RESET_SADB 807 00:35:02.742 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 808 00:35:02.742 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A827B22F2845B9E9 R_Cookie=3B2286BAEE2DFCE0) reason = DEL_REASON_RESET_SADB 809 00:35:02.822 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 810 00:35:02.822 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 811 00:35:02.822 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1341 for TCP connection. 812 00:35:03.202 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 813 00:35:03.202 03/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1341 814 00:35:03.202 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1341, dst port 4005 815 00:35:03.202 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 816 00:35:03.202 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 817 00:35:03.202 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped