EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 10:46:30.988 02/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 10:46:31.058 02/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 10:46:31.058 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 10:46:31.199 02/17/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1099 for TCP connection. 5 10:46:31.269 02/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 10:46:31.269 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 10:46:31.269 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1099, dst port 4005 8 10:46:31.269 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1099 9 10:46:31.269 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1099, dst port 4005 10 10:46:31.269 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 10:46:31.770 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 10:46:31.780 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 10:46:31.830 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 10:46:32.010 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 10:46:32.010 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 10:46:32.010 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 10:46:32.010 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 10:46:32.010 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 10:46:32.010 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 10:46:32.030 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 10:46:32.030 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 10:46:32.030 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 10:46:32.030 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 10:46:32.070 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 10:46:32.070 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 10:46:32.070 02/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 10:46:32.070 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C14585365F25684A R_Cookie=634A8CD7A26CBAF9) reason = DEL_REASON_LOAD_BALANCING 28 10:46:32.070 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 10:46:32.771 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C14585365F25684A R_Cookie=634A8CD7A26CBAF9) reason = DEL_REASON_LOAD_BALANCING 30 10:46:32.771 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 10:46:32.771 02/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 10:46:32.771 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 10:46:32.781 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 10:46:33.272 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1099, dst port 4005 35 10:46:33.272 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1099, dst port 4005 36 10:46:33.272 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1099 37 10:46:33.272 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1099, dst port 4005 38 10:46:33.272 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 10:46:33.782 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 10:46:33.792 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 10:46:33.822 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 10:46:33.983 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 10:46:33.983 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 10:46:33.983 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 10:46:33.983 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 10:46:33.983 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 10:46:33.983 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 10:46:34.003 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 10:46:34.013 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 10:46:34.013 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 10:46:34.013 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 10:46:34.033 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 10:46:34.033 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 10:46:34.033 02/17/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 10:46:44.318 02/17/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 10:46:44.318 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 10:46:48.584 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 10:46:48.584 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 10:46:48.584 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 10:46:48.584 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8D3C077738ADA0D1 R_Cookie=D669F61B2C464F28) reason = DEL_REASON_WE_FAILED_AUTH 61 10:46:48.584 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 62 10:46:48.604 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 63 10:46:48.604 02/17/07 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=8D3C077738ADA0D1 R_Cookie=D669F61B2C464F28 64 10:46:48.604 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 137.69.115.16 65 10:46:48.804 02/17/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.16, src port 4005, dst port 1099 66 10:46:49.295 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8D3C077738ADA0D1 R_Cookie=D669F61B2C464F28) reason = DEL_REASON_WE_FAILED_AUTH 67 10:46:49.295 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.16" because of "DEL_REASON_WE_FAILED_AUTH" 68 10:46:49.295 02/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 69 10:46:49.295 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 70 10:46:49.295 02/17/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1099 for TCP connection. 71 10:46:49.295 02/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 72 10:46:49.325 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1099, dst port 4005 73 10:46:49.325 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 10:46:49.325 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 75 10:46:49.325 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 10:46:49.325 02/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 77 10:46:58.368 02/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 78 10:46:58.378 02/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 79 10:46:58.378 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 80 10:46:58.518 02/17/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1107 for TCP connection. 81 10:46:58.808 02/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 82 10:46:58.808 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 83 10:46:58.808 02/17/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 84 10:46:58.808 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1107, dst port 4005 85 10:46:58.808 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1107 86 10:46:58.808 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1107, dst port 4005 87 10:46:58.808 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 88 10:46:59.309 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 89 10:46:59.329 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 90 10:46:59.359 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 91 10:46:59.600 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 92 10:46:59.600 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 93 10:46:59.600 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 94 10:46:59.600 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 95 10:46:59.600 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 96 10:46:59.600 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 97 10:46:59.610 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 98 10:46:59.610 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 99 10:46:59.610 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 100 10:46:59.610 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 101 10:46:59.710 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 102 10:46:59.710 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 103 10:46:59.710 02/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.17" from primary server 104 10:46:59.710 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A4219F9DD4723232 R_Cookie=2221F4E918C7C575) reason = DEL_REASON_LOAD_BALANCING 105 10:46:59.710 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 106 10:47:00.311 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A4219F9DD4723232 R_Cookie=2221F4E918C7C575) reason = DEL_REASON_LOAD_BALANCING 107 10:47:00.311 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 108 10:47:00.311 02/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.17" given by the primary server 109 10:47:00.311 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 110 10:47:00.321 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 111 10:47:00.821 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1107, dst port 4005 112 10:47:00.821 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.17, src port 1107, dst port 4005 113 10:47:00.821 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.17, src port 4005, dst port 1107 114 10:47:00.821 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.17, src port 1107, dst port 4005 115 10:47:00.821 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.17" 116 10:47:01.312 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 117 10:47:01.332 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.17. 118 10:47:01.352 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.17 119 10:47:01.602 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 120 10:47:01.602 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.17 121 10:47:01.602 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 122 10:47:01.602 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 123 10:47:01.602 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 124 10:47:01.602 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 125 10:47:01.622 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 126 10:47:01.622 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.17 127 10:47:01.622 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 128 10:47:01.622 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 129 10:47:01.723 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 130 10:47:01.723 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 131 10:47:01.723 02/17/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 132 10:47:09.954 02/17/07 Sev=Info/4 CM/0x63100017 xAuth application returned 133 10:47:09.954 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 134 10:47:13.830 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 135 10:47:13.830 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 136 10:47:13.830 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 137 10:47:13.830 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 138 10:47:13.940 02/17/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 139 10:47:13.940 02/17/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 140 10:47:13.940 02/17/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 141 10:47:13.940 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 142 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 143 10:47:15.012 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 144 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.25.199 145 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 146 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 147 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 148 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 149 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 150 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = *********************** EMC Americas East Coast VPN Gateway *********************** This is a restricted area. Unauthorized Access Prohibited. Access only authorized for EMC Approved Personnel. If you are not authorized by EMC, PLEASE DISCONNECT NOW. 151 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 152 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 153 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 154 10:47:15.012 02/17/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.Rel built by vmurphy on Jul 20 2005 10:12:45 155 10:47:15.102 02/17/07 Sev=Info/4 CM/0x63100019 Mode Config data received 156 10:47:15.122 02/17/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.25.199, GW IP = 128.221.195.17, Remote IP = 0.0.0.0 157 10:47:15.122 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.17 158 10:47:15.122 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 159 10:47:15.122 02/17/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 160 10:47:15.232 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 161 10:47:15.232 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.17 162 10:47:15.232 02/17/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 163 10:47:15.232 02/17/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 14 seconds, setting expiry to 86386 seconds from now 164 10:47:15.242 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 165 10:47:15.242 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.17 166 10:47:15.242 02/17/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 167 10:47:15.242 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.17 168 10:47:15.242 02/17/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=71891AF8 OUTBOUND SPI = 0x67142FD7 INBOUND SPI = 0xBD8C5108) 169 10:47:15.242 02/17/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x67142FD7 170 10:47:15.242 02/17/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xBD8C5108 171 10:47:17.896 02/17/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.25.199/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 172 10:47:18.006 02/17/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 173 10:47:18.036 02/17/07 Sev=Info/4 CM/0x6310001A One secure connection established 174 10:47:18.106 02/17/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.4.25.199, 192.168.6.1, 192.168.5.1. 175 10:47:18.106 02/17/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.25.199. Current address(es): 192.168.1.104, 10.4.25.199, 192.168.6.1, 192.168.5.1. 176 10:47:18.306 02/17/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 177 10:47:18.316 02/17/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xd72f1467 into key list 178 10:47:18.316 02/17/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 179 10:47:18.316 02/17/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x08518cbd into key list 180 10:47:18.316 02/17/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xd72f1467 for inbound key with SPI=0x08518cbd 181 10:47:18.316 02/17/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.25.199 182 10:52:02.305 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 183 10:57:02.737 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 184 11:02:03.169 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 185 11:07:03.615 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 186 11:12:04.048 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 187 11:17:05.001 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 188 11:17:09.507 02/17/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.17, src port 4005, dst port 1107, flags 10h 189 11:22:05.441 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 190 11:27:05.365 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 191 11:32:05.802 02/17/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1107, dst port 4005 192 11:34:45.614 02/17/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 193 11:34:45.614 02/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 194 11:34:45.614 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.17 195 11:34:45.614 02/17/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 67142FD7 INBOUND SPI = BD8C5108) 196 11:34:45.624 02/17/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=71891AF8 197 11:34:45.624 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B630866133FDAC4A R_Cookie=2D8188414A88F057) reason = DEL_REASON_RESET_SADB 198 11:34:45.624 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.17 199 11:34:45.624 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B630866133FDAC4A R_Cookie=2D8188414A88F057) reason = DEL_REASON_RESET_SADB 200 11:34:45.624 02/17/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 201 11:34:45.624 02/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 202 11:34:45.624 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 203 11:34:45.634 02/17/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1107 for TCP connection. 204 11:34:45.634 02/17/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.17 disconnected: duration: 0 days 0:47:27 205 11:34:45.654 02/17/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 206 11:34:45.664 02/17/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 207 11:34:47.366 02/17/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 208 11:34:47.366 02/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 209 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x08518cbd 210 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x08518cbd 211 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd72f1467 212 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd72f1467 213 11:34:47.396 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.17, src port 1107, dst port 4005 214 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 215 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 216 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 217 11:34:47.396 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 218 11:34:50.871 02/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 219 11:34:50.881 02/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 220 11:34:50.881 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 221 11:34:50.901 02/17/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1650 for TCP connection. 222 11:34:51.061 02/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 223 11:34:51.061 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 224 11:34:51.061 02/17/07 Sev=Info/6 IPSEC/0x6370002B Sent 84372 packets, 0 were fragmented. 225 11:34:51.061 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1650, dst port 4005 226 11:34:51.061 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1650 227 11:34:51.061 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1650, dst port 4005 228 11:34:51.061 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 229 11:34:51.562 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 230 11:34:51.602 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 231 11:34:51.632 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 232 11:34:51.802 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 233 11:34:51.802 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 234 11:34:51.802 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 235 11:34:51.802 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 236 11:34:51.802 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 237 11:34:51.802 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 238 11:34:51.812 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 239 11:34:51.812 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 240 11:34:51.812 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 241 11:34:51.812 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 242 11:34:51.842 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 243 11:34:51.842 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 244 11:34:51.842 02/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 245 11:34:51.842 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=003A6316C92ED8E2 R_Cookie=ECCA72A44F0CFF9B) reason = DEL_REASON_LOAD_BALANCING 246 11:34:51.842 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 247 11:34:52.554 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=003A6316C92ED8E2 R_Cookie=ECCA72A44F0CFF9B) reason = DEL_REASON_LOAD_BALANCING 248 11:34:52.554 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 249 11:34:52.554 02/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 250 11:34:52.554 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 251 11:34:52.574 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 252 11:34:53.064 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1650, dst port 4005 253 11:34:53.064 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1650, dst port 4005 254 11:34:53.064 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1650 255 11:34:53.064 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1650, dst port 4005 256 11:34:53.064 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 257 11:34:53.555 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 258 11:34:53.585 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 259 11:34:53.625 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 260 11:34:53.805 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 261 11:34:53.805 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 262 11:34:53.805 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 263 11:34:53.805 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 264 11:34:53.805 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 265 11:34:53.805 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 266 11:34:53.815 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 267 11:34:53.815 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 268 11:34:53.815 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 269 11:34:53.815 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 270 11:34:53.835 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 271 11:34:53.835 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 272 11:34:53.835 02/17/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 273 11:35:06.213 02/17/07 Sev=Info/4 CM/0x63100017 xAuth application returned 274 11:35:06.213 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 275 11:35:10.339 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 11:35:10.339 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 277 11:35:10.339 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 278 11:35:10.339 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B736337912E576F7 R_Cookie=8D34FD3805673375) reason = DEL_REASON_WE_FAILED_AUTH 279 11:35:10.339 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 280 11:35:10.359 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 281 11:35:10.359 02/17/07 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=B736337912E576F7 R_Cookie=8D34FD3805673375 282 11:35:10.359 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 137.69.115.17 283 11:35:10.589 02/17/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1650 284 11:35:11.090 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B736337912E576F7 R_Cookie=8D34FD3805673375) reason = DEL_REASON_WE_FAILED_AUTH 285 11:35:11.090 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "DEL_REASON_WE_FAILED_AUTH" 286 11:35:11.090 02/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 287 11:35:11.090 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 288 11:35:11.110 02/17/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1650 for TCP connection. 289 11:35:11.120 02/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 290 11:35:11.150 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1650, dst port 4005 291 11:35:11.150 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 292 11:35:11.150 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 293 11:35:11.150 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 294 11:35:11.150 02/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 295 11:35:25.591 02/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 296 11:35:25.601 02/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 297 11:35:25.601 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 298 11:35:25.611 02/17/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1695 for TCP connection. 299 11:35:25.611 02/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 300 11:35:25.611 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 301 11:35:25.611 02/17/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 302 11:35:25.611 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1695, dst port 4005 303 11:35:26.602 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1695 304 11:35:26.602 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1695, dst port 4005 305 11:35:26.602 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 306 11:35:27.113 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 307 11:35:27.133 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 308 11:35:27.153 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 309 11:35:27.324 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 310 11:35:27.324 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 311 11:35:27.324 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 312 11:35:27.324 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 313 11:35:27.324 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 314 11:35:27.324 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 315 11:35:27.334 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 316 11:35:27.334 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 317 11:35:27.334 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 318 11:35:27.334 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 319 11:35:27.364 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 320 11:35:27.364 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 321 11:35:27.364 02/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 322 11:35:27.364 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7B4CE74161638172 R_Cookie=564BDA059D9B8AA9) reason = DEL_REASON_LOAD_BALANCING 323 11:35:27.364 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 324 11:35:28.105 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7B4CE74161638172 R_Cookie=564BDA059D9B8AA9) reason = DEL_REASON_LOAD_BALANCING 325 11:35:28.105 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 326 11:35:28.105 02/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 327 11:35:28.105 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 328 11:35:28.125 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 329 11:35:28.615 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1695, dst port 4005 330 11:35:28.615 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1695, dst port 4005 331 11:35:28.615 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1695 332 11:35:28.615 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1695, dst port 4005 333 11:35:28.615 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 334 11:35:29.116 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 335 11:35:29.136 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 336 11:35:29.156 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 337 11:35:34.614 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=FFDB414F8690BBE5 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 338 11:35:35.115 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=FFDB414F8690BBE5 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 339 11:35:35.115 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "DEL_REASON_PEER_NOT_RESPONDING" 340 11:35:35.115 02/17/07 Sev=Info/4 CM/0x63100011 Attempt connection with backup server "usvgw1.emc.com" 341 11:35:35.115 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 342 11:35:35.145 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 343 11:35:35.625 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1695, dst port 4005 344 11:35:35.625 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1695, dst port 4005 345 11:35:35.625 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1695 346 11:35:35.625 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1695, dst port 4005 347 11:35:40.623 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1695, dst port 4005 348 11:35:45.630 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1695, dst port 4005 349 11:35:46.431 02/17/07 Sev=Info/4 CM/0x63100026 Abort connection attempt before TCP session up 350 11:35:46.431 02/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 351 11:35:46.471 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 352 11:35:46.471 02/17/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1695 for TCP connection. 353 11:35:46.521 02/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 354 11:35:46.641 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1695, dst port 4005 355 11:35:46.641 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 356 11:35:46.641 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 357 11:35:46.641 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 358 11:35:46.641 02/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 359 11:36:24.806 02/17/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 360 11:36:26.899 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys