EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 10:09:00.337 04/26/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 10:09:00.407 04/26/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 10:09:00.407 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 10:09:00.437 04/26/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1104 for TCP connection. 5 10:09:00.898 04/26/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 10:09:00.898 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 10:09:00.898 04/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1104, dst port 4005 8 10:09:00.898 04/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1104 9 10:09:00.898 04/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1104, dst port 4005 10 10:09:00.898 04/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 10:09:01.399 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 10:09:01.419 04/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 10:09:01.429 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 10:09:01.659 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 10:09:01.659 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 10:09:01.659 04/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 10:09:01.659 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 10:09:01.659 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 10:09:01.659 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 10:09:01.669 04/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 10:09:01.669 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 10:09:01.669 04/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 10:09:01.669 04/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 10:09:01.759 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 10:09:01.759 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 10:09:01.759 04/26/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 10:09:01.759 04/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=FD7596D758CC1EC1 R_Cookie=FBE669CFBBF25312) reason = DEL_REASON_LOAD_BALANCING 28 10:09:01.759 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 10:09:02.400 04/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=FD7596D758CC1EC1 R_Cookie=FBE669CFBBF25312) reason = DEL_REASON_LOAD_BALANCING 30 10:09:02.400 04/26/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 10:09:02.400 04/26/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 10:09:02.400 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 10:09:02.410 04/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 10:09:02.911 04/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1104, dst port 4005 35 10:09:02.911 04/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1104, dst port 4005 36 10:09:02.911 04/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1104 37 10:09:02.911 04/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1104, dst port 4005 38 10:09:02.911 04/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 10:09:03.401 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 10:09:03.411 04/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 10:09:03.411 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 10:09:03.642 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 10:09:03.642 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 10:09:03.642 04/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 10:09:03.642 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 10:09:03.642 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 10:09:03.642 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 10:09:03.652 04/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 10:09:03.652 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 10:09:03.652 04/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 10:09:03.652 04/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 10:09:03.742 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 10:09:03.742 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 10:09:03.742 04/26/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 10:09:24.071 04/26/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 10:09:24.071 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 10:09:26.354 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 10:09:26.354 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 10:09:26.354 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 10:09:26.354 04/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0C32E2F98AE7ACE9 R_Cookie=8F359958C510FDEB) reason = DEL_REASON_WE_FAILED_AUTH 61 10:09:26.354 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 62 10:09:26.505 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 63 10:09:26.505 04/26/06 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=0C32E2F98AE7ACE9 R_Cookie=8F359958C510FDEB 64 10:09:26.505 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 137.69.115.17 65 10:09:26.935 04/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0C32E2F98AE7ACE9 R_Cookie=8F359958C510FDEB) reason = DEL_REASON_WE_FAILED_AUTH 66 10:09:26.935 04/26/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "DEL_REASON_WE_FAILED_AUTH" 67 10:09:26.935 04/26/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 68 10:09:26.935 04/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 69 10:09:26.935 04/26/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1104 for TCP connection. 70 10:09:26.935 04/26/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 71 10:09:26.945 04/26/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1104 72 10:09:26.945 04/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1104, dst port 4005 73 10:09:26.945 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 10:09:26.945 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 75 10:09:26.945 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 10:09:26.945 04/26/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped