EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 18:02:46.907 05/06/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 18:02:47.018 05/06/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 18:02:47.018 05/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 18:02:47.048 05/06/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1091 for TCP connection. 5 18:02:47.048 05/06/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 18:02:47.048 05/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 18:02:47.048 05/06/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1091, dst port 4005 8 18:02:47.999 05/06/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1091 9 18:02:47.999 05/06/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1091, dst port 4005 10 18:02:47.999 05/06/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 18:02:48.500 05/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 18:02:48.510 05/06/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 18:02:48.540 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 18:02:48.720 05/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 18:02:48.720 05/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 18:02:48.720 05/06/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 18:02:48.720 05/06/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 18:02:48.720 05/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 18:02:48.720 05/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 18:02:48.770 05/06/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 18:02:48.770 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 18:02:48.770 05/06/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 18:02:48.770 05/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 18:02:48.790 05/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 18:02:48.790 05/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 18:02:48.790 05/06/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 18:02:48.790 05/06/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=196A02435112236E R_Cookie=AB81E720E4647536) reason = DEL_REASON_LOAD_BALANCING 28 18:02:48.790 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 18:02:49.501 05/06/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=196A02435112236E R_Cookie=AB81E720E4647536) reason = DEL_REASON_LOAD_BALANCING 30 18:02:49.501 05/06/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 18:02:49.501 05/06/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 18:02:49.501 05/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 18:02:49.511 05/06/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 18:02:50.002 05/06/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1091, dst port 4005 35 18:02:50.002 05/06/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1091, dst port 4005 36 18:02:50.002 05/06/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1091 37 18:02:50.002 05/06/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1091, dst port 4005 38 18:02:50.002 05/06/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 18:02:50.503 05/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 18:02:50.523 05/06/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 18:02:50.543 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 18:02:50.703 05/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 18:02:50.703 05/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 18:02:50.703 05/06/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 18:02:50.703 05/06/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 18:02:50.703 05/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 18:02:50.703 05/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 18:02:50.723 05/06/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 18:02:50.723 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 18:02:50.733 05/06/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 18:02:50.733 05/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 18:02:50.753 05/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 18:02:50.753 05/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 18:02:50.753 05/06/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 18:02:56.802 05/06/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 18:02:56.802 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 18:02:59.225 05/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 18:02:59.225 05/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 18:02:59.225 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 18:02:59.225 05/06/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=EAB0D92F44AB5946 R_Cookie=1093A91B19FB4DDF) reason = DEL_REASON_WE_FAILED_AUTH 61 18:02:59.225 05/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 62 18:02:59.255 05/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 63 18:02:59.255 05/06/06 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=EAB0D92F44AB5946 R_Cookie=1093A91B19FB4DDF 64 18:02:59.255 05/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 137.69.115.17 65 18:02:59.516 05/06/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1091 66 18:03:00.016 05/06/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=EAB0D92F44AB5946 R_Cookie=1093A91B19FB4DDF) reason = DEL_REASON_WE_FAILED_AUTH 67 18:03:00.016 05/06/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "DEL_REASON_WE_FAILED_AUTH" 68 18:03:00.016 05/06/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 69 18:03:00.016 05/06/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 70 18:03:00.016 05/06/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1091 for TCP connection. 71 18:03:00.016 05/06/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 72 18:03:00.026 05/06/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1091, dst port 4005 73 18:03:00.036 05/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 18:03:00.036 05/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 75 18:03:00.036 05/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 18:03:00.036 05/06/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped