EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 13:47:40.620 05/10/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 13:47:40.630 05/10/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 13:47:40.630 05/10/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 4 13:47:40.640 05/10/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 5 13:47:40.650 05/10/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 6 13:47:40.680 05/10/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 7 13:47:40.680 05/10/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 8 13:47:40.680 05/10/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 9 13:47:40.680 05/10/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 10 13:47:40.710 05/10/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 11 13:47:40.710 05/10/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 12 13:47:40.710 05/10/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 13 13:47:40.710 05/10/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 14 13:47:41.051 05/10/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 15 13:47:41.051 05/10/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 16 13:47:41.051 05/10/06 Sev=Info/6 IPSEC/0x6370002B Sent 17566 packets, 0 were fragmented. 17 13:47:41.232 05/10/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 18 13:47:41.232 05/10/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 19 13:47:41.232 05/10/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 20 13:47:42.246 05/10/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 21 13:47:42.246 05/10/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 22 13:47:44.254 05/10/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 23 13:47:44.254 05/10/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 24 13:47:45.338 05/10/06 Sev=Info/4 CM/0x63100017 xAuth application returned 25 13:47:45.338 05/10/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 26 13:47:45.338 05/10/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 27 13:47:45.338 05/10/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 28 13:47:45.338 05/10/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D73F3D85C7CC4D90 R_Cookie=0A868D9C3A7A0BDD) reason = DEL_REASON_RESET_SADB 29 13:47:45.338 05/10/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 30 13:47:45.338 05/10/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D73F3D85C7CC4D90 R_Cookie=0A868D9C3A7A0BDD) reason = DEL_REASON_RESET_SADB 31 13:47:45.348 05/10/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 32 13:47:45.559 05/10/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 33 13:47:45.559 05/10/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 34 13:47:45.559 05/10/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 35 13:47:45.559 05/10/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped