EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 11:36:33.399 02/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 11:36:33.409 02/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 11:36:33.409 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 11:36:33.419 02/17/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1751 for TCP connection. 5 11:36:33.499 02/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 11:36:33.499 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 11:36:33.499 02/17/07 Sev=Info/6 IPSEC/0x6370002B Sent 3 packets, 0 were fragmented. 8 11:36:33.499 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1751, dst port 4005 9 11:36:33.499 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1751 10 11:36:33.499 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1751, dst port 4005 11 11:36:33.499 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 11:36:33.999 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 11:36:34.029 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 11:36:34.049 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 11:36:34.220 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 11:36:34.220 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 11:36:34.220 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 11:36:34.220 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 11:36:34.220 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 11:36:34.230 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 11:36:34.230 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 11:36:34.230 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 11:36:34.230 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 11:36:34.230 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 11:36:34.270 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 11:36:34.270 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 11:36:34.270 02/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 11:36:34.270 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=2259715688367A0F R_Cookie=6C317CBF07B97C0D) reason = DEL_REASON_LOAD_BALANCING 29 11:36:34.270 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 11:36:35.001 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=2259715688367A0F R_Cookie=6C317CBF07B97C0D) reason = DEL_REASON_LOAD_BALANCING 31 11:36:35.001 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 11:36:35.001 02/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 11:36:35.001 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 11:36:35.021 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 11:36:35.512 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1751, dst port 4005 36 11:36:35.512 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1751, dst port 4005 37 11:36:40.519 02/17/07 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "137.69.115.17" 38 11:36:40.519 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 39 11:36:40.529 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 40 11:36:40.539 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1751, dst port 4005 41 11:36:40.539 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1751, dst port 4005 42 11:36:41.510 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1751 43 11:36:41.510 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1751, dst port 4005 44 11:36:41.510 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 45 11:36:42.011 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 46 11:36:42.041 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 47 11:36:42.061 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 48 11:36:42.301 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 49 11:36:42.301 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 50 11:36:42.301 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 51 11:36:42.301 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 52 11:36:42.301 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 53 11:36:42.301 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 54 11:36:42.311 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 55 11:36:42.311 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 56 11:36:42.311 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 57 11:36:42.311 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 58 11:36:42.411 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 59 11:36:42.411 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 60 11:36:42.411 02/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 61 11:36:42.411 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D7E69E8641B07910 R_Cookie=161089D909E89810) reason = DEL_REASON_LOAD_BALANCING 62 11:36:42.411 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 63 11:36:43.012 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D7E69E8641B07910 R_Cookie=161089D909E89810) reason = DEL_REASON_LOAD_BALANCING 64 11:36:43.012 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 65 11:36:43.012 02/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 66 11:36:43.012 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 67 11:36:43.032 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 68 11:36:43.523 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1751, dst port 4005 69 11:36:43.523 02/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1751, dst port 4005 70 11:36:43.523 02/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 1751 71 11:36:43.523 02/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 1751, dst port 4005 72 11:36:43.523 02/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 73 11:36:44.014 02/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 74 11:36:44.024 02/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 75 11:36:44.034 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 76 11:36:44.254 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 77 11:36:44.254 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 78 11:36:44.254 02/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 79 11:36:44.254 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 80 11:36:44.254 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 81 11:36:44.254 02/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 82 11:36:44.264 02/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 83 11:36:44.264 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 84 11:36:44.264 02/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 85 11:36:44.264 02/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 86 11:36:44.364 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 87 11:36:44.364 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 88 11:36:44.364 02/17/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 89 11:37:02.190 02/17/07 Sev=Info/4 CM/0x63100017 xAuth application returned 90 11:37:02.190 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 91 11:37:04.633 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 92 11:37:04.633 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 93 11:37:04.633 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 94 11:37:04.633 02/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=97AA1108685FBF6C R_Cookie=0C887A8C31B4DB1D) reason = DEL_REASON_WE_FAILED_AUTH 95 11:37:04.633 02/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.16 96 11:37:04.724 02/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 97 11:37:04.724 02/17/07 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=97AA1108685FBF6C R_Cookie=0C887A8C31B4DB1D 98 11:37:04.724 02/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 128.221.195.16 99 11:37:05.064 02/17/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 128.221.195.16, src port 4005, dst port 1751 100 11:37:05.545 02/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=97AA1108685FBF6C R_Cookie=0C887A8C31B4DB1D) reason = DEL_REASON_WE_FAILED_AUTH 101 11:37:05.545 02/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "128.221.195.16" because of "DEL_REASON_WE_FAILED_AUTH" 102 11:37:05.545 02/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 103 11:37:05.555 02/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 104 11:37:05.555 02/17/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1751 for TCP connection. 105 11:37:05.595 02/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 106 11:37:05.605 02/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1751, dst port 4005 107 11:37:05.605 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 108 11:37:05.605 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 109 11:37:05.605 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 110 11:37:05.605 02/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 111 11:37:32.023 02/17/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 112 11:37:34.116 02/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys