EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 23:42:39.795 02/05/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 23:42:39.836 02/05/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 23:42:39.836 02/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 23:42:39.856 02/05/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1199 for TCP connection. 5 23:42:40.167 02/05/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 23:42:40.167 02/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 23:42:40.167 02/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1199, dst port 4005 8 23:42:40.167 02/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1199 9 23:42:40.167 02/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1199, dst port 4005 10 23:42:40.167 02/05/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 23:42:40.669 02/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 23:42:40.679 02/05/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 23:42:40.729 02/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 23:42:40.910 02/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 23:42:40.910 02/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 23:42:40.910 02/05/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 23:42:40.910 02/05/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 23:42:40.910 02/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 23:42:40.910 02/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 23:42:40.930 02/05/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 23:42:40.930 02/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 23:42:40.930 02/05/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 23:42:40.930 02/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 23:42:40.960 02/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 23:42:40.960 02/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 23:42:40.960 02/05/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 23:42:40.960 02/05/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C99106605825AD44 R_Cookie=8EBB620C8E5A74EE) reason = DEL_REASON_LOAD_BALANCING 28 23:42:40.960 02/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 23:42:41.673 02/05/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C99106605825AD44 R_Cookie=8EBB620C8E5A74EE) reason = DEL_REASON_LOAD_BALANCING 30 23:42:41.673 02/05/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 23:42:41.673 02/05/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 23:42:41.673 02/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 23:42:41.694 02/05/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 23:42:42.176 02/05/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1199, dst port 4005 35 23:42:42.176 02/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1199, dst port 4005 36 23:42:42.176 02/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1199 37 23:42:42.176 02/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1199, dst port 4005 38 23:42:42.176 02/05/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 23:42:42.678 02/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 23:42:42.698 02/05/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 23:42:42.718 02/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 23:42:42.899 02/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 23:42:42.899 02/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 23:42:42.899 02/05/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 23:42:42.899 02/05/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 23:42:42.899 02/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 23:42:42.899 02/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 23:42:42.919 02/05/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 23:42:42.919 02/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 23:42:42.919 02/05/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 23:42:42.919 02/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 23:42:42.949 02/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 23:42:42.949 02/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 23:42:42.949 02/05/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 23:42:51.325 02/05/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 23:42:51.325 02/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 23:42:51.506 02/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 23:42:51.506 02/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 137.69.115.17 59 23:42:51.506 02/05/07 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 4 --> PEER_DELETE-IKE_DELETE_NO_ERROR. 60 23:42:51.506 02/05/07 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=F66EF9AF14D6327F R_Cookie=D1D99A610026B6BB 61 23:42:51.506 02/05/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F66EF9AF14D6327F R_Cookie=D1D99A610026B6BB) reason = PEER_DELETE-IKE_DELETE_NO_ERROR 62 23:42:51.716 02/05/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1199 63 23:42:52.219 02/05/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F66EF9AF14D6327F R_Cookie=D1D99A610026B6BB) reason = PEER_DELETE-IKE_DELETE_NO_ERROR 64 23:42:52.219 02/05/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "PEER_DELETE-IKE_DELETE_NO_ERROR" 65 23:42:52.219 02/05/07 Sev=Info/4 CM/0x63100011 Attempt connection with backup server "usvgw1.emc.com" 66 23:42:52.219 02/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 67 23:42:52.239 02/05/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 68 23:42:52.259 02/05/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1199, dst port 4005 69 23:42:52.259 02/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1199, dst port 4005 70 23:42:53.223 02/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1199 71 23:42:53.223 02/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1199, dst port 4005 72 23:42:57.742 02/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1199, dst port 4005 73 23:43:02.262 02/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1199, dst port 4005 74 23:43:07.283 02/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1199, dst port 4005 75 23:43:12.305 02/05/07 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw1.emc.com" 76 23:43:12.305 02/05/07 Sev=Info/4 CM/0x6310000C All connection attempts with backup server failed 77 23:43:12.305 02/05/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 78 23:43:12.305 02/05/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 79 23:43:12.305 02/05/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1199 for TCP connection. 80 23:43:12.305 02/05/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 81 23:43:12.325 02/05/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1199, dst port 4005 82 23:43:12.325 02/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 83 23:43:12.325 02/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 23:43:12.325 02/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 85 23:43:12.325 02/05/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 86 23:43:52.406 02/05/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 87 23:43:54.495 02/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys