EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 14:58:27.550 11/07/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 14:58:27.600 11/07/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 14:58:27.600 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 4 14:58:27.610 11/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 5 14:58:27.620 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 6 14:58:27.670 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 7 14:58:27.670 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 8 14:58:27.670 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 9 14:58:27.670 11/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 10 14:58:27.670 11/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 11 14:58:27.670 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 12 14:58:27.670 11/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 13 14:58:27.670 11/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 14 14:58:27.810 11/07/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 15 14:58:27.810 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 16 14:58:28.231 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 17 14:58:28.231 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 18 14:58:28.231 11/07/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 19 14:58:29.242 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 20 14:58:29.242 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 21 14:58:31.255 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 22 14:58:31.255 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 23 14:58:35.271 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 24 14:58:35.271 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 25 14:58:37.815 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 10.0.0.1 26 14:58:37.815 11/07/06 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 27 14:58:42.061 11/07/06 Sev=Info/4 CM/0x63100017 xAuth application returned 28 14:58:42.061 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 29 14:58:44.404 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 30 14:58:44.404 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 31 14:58:44.404 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 32 14:58:44.404 11/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 33 14:58:44.474 11/07/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 34 14:58:44.474 11/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 35 14:58:44.474 11/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 36 14:58:44.474 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 37 14:58:44.484 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 38 14:58:44.494 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 39 14:58:44.494 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.24.200.84 40 14:58:44.494 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.255 41 14:58:44.494 11/07/06 Sev=Info/4 CM/0x63100019 Mode Config data received 42 14:58:44.504 11/07/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.200.84, GW IP = 10.0.0.1, Remote IP = 0.0.0.0 43 14:58:44.504 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 44 14:58:44.845 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 45 14:58:49.832 11/07/06 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 46 14:58:49.832 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(Retransmission) to 10.0.0.1 47 14:58:49.862 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 48 14:58:49.862 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 49 14:58:49.862 11/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 50 14:58:49.862 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 51 14:58:49.862 11/07/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=C05701AE OUTBOUND SPI = 0x4BAF37A5 INBOUND SPI = 0x8AB72235) 52 14:58:49.862 11/07/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4BAF37A5 53 14:58:49.862 11/07/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x8AB72235 54 14:58:51.845 11/07/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.24.200.84/255.255.255.255 DNS=0.0.0.0,0.0.0.0 WINS=0.0.0.0,0.0.0.0 Domain= Split DNS Names= 55 14:58:51.865 11/07/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 56 14:58:51.885 11/07/06 Sev=Info/4 CM/0x6310001A One secure connection established 57 14:58:51.895 11/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.24.200.84. Current address(es): 10.24.200.84. 58 14:58:51.905 11/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.24.200.84. Current address(es): 10.24.200.84. 59 14:58:52.426 11/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 60 14:58:52.426 11/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa537af4b into key list 61 14:58:52.426 11/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 62 14:58:52.426 11/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3522b78a into key list 63 14:58:52.426 11/07/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.24.200.84 64 14:58:54.338 11/07/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xa537af4b for inbound key with SPI=0x3522b78a 65 19:03:39.508 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 66 19:03:39.508 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 67 19:03:39.508 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 68 19:03:40.510 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xe4510002 (IPSecDrvCB:824) 69 19:03:40.510 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xe4510002 (IPSecDrvCB:824) 70 19:03:42.012 11/07/06 Sev=Warning/3 CM/0xA310002C Adapter address changed from 10.24.200.84. Current address(es): 127.0.0.1. 71 19:03:42.012 11/07/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 72 19:03:42.212 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 73 19:03:42.212 11/07/06 Sev=Warning/3 IKE/0xE3000068 Failed to send 76 bytes to 10.0.0.1, error = 0xFFFFFFF0 74 19:03:42.212 11/07/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4BAF37A5 INBOUND SPI = 8AB72235) 75 19:03:42.212 11/07/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=C05701AE 76 19:03:42.212 11/07/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=FB26ECB3B8234F13 R_Cookie=6165A7EA6D2FD155) reason = DEL_REASON_ADDRESS_CHANGE 77 19:03:42.212 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 78 19:03:42.212 11/07/06 Sev=Warning/3 IKE/0xE3000068 Failed to send 84 bytes to 10.0.0.1, error = 0xFFFFFFF0 79 19:03:42.212 11/07/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=FB26ECB3B8234F13 R_Cookie=6165A7EA6D2FD155) reason = DEL_REASON_ADDRESS_CHANGE 80 19:03:42.212 11/07/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 81 19:03:42.212 11/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 82 19:03:42.212 11/07/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 10.0.0.1 disconnected: duration: 0 days 4:4:51 83 19:03:44.736 11/07/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 84 19:03:44.736 11/07/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 85 19:03:44.736 11/07/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 86 19:03:44.736 11/07/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 87 19:03:44.746 11/07/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 88 19:03:47.820 11/07/06 Sev=Warning/3 GUI/0xA3B00004 Unable to load tray icon. 89 19:04:40.195 11/07/06 Sev=Warning/2 CM/0xA310002E Failed to disable the virtual adapter. 90 19:04:40.195 11/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 91 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3522b78a 92 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3522b78a 93 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa537af4b 94 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa537af4b 95 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 96 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 97 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 98 19:04:40.195 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 99 19:05:09.728 11/07/06 Sev=Info/4 CM/0x63100002 Begin connection process 100 19:05:09.738 11/07/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 101 19:05:09.738 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 102 19:05:09.748 11/07/06 Sev=Info/4 CM/0x6310001D Unable to resolve server address "usvgw3.emc.com" 103 19:05:09.748 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 104 19:05:09.758 11/07/06 Sev=Info/4 CM/0x6310001D Unable to resolve server address "usvgw1.emc.com" 105 19:05:09.758 11/07/06 Sev=Info/4 CM/0x6310000C All connection attempts with backup server failed 106 19:05:09.758 11/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 107 19:05:09.788 11/07/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 108 19:05:09.788 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 109 19:05:09.788 11/07/06 Sev=Info/6 IPSEC/0x6370002B Sent 64788 packets, 0 were fragmented. 110 19:05:09.788 11/07/06 Sev=Info/4 IPSEC/0x6370000D Key(s) deleted by Interface (10.24.200.84) 111 19:05:09.788 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 112 19:05:09.788 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 113 19:05:09.788 11/07/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 114 19:06:36.853 11/07/06 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 115 19:06:39.367 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys