EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 16:36:55.758 05/31/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 16:36:55.798 05/31/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 16:36:55.798 05/31/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 4 16:36:55.808 05/31/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 5 16:36:55.828 05/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 6 16:36:55.828 05/31/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 16:36:55.828 05/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 16:36:55.858 05/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 9 16:36:55.858 05/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 10 16:36:55.858 05/31/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 11 16:36:55.858 05/31/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 12 16:36:55.868 05/31/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 13 16:36:55.868 05/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 14 16:36:55.868 05/31/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 15 16:36:55.868 05/31/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 16 16:36:55.888 05/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 17 16:36:55.888 05/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 18 16:36:55.888 05/31/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 19 16:36:56.389 05/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 20 16:36:56.389 05/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 21 16:36:57.410 05/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 22 16:36:57.410 05/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 23 16:36:59.433 05/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 24 16:36:59.433 05/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 25 16:37:02.508 05/31/07 Sev=Info/4 CM/0x63100017 xAuth application returned 26 16:37:02.508 05/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 27 16:37:02.508 05/31/07 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 28 16:37:02.508 05/31/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 29 16:37:02.508 05/31/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=97C39654F51B733A R_Cookie=106369AF1B356E9F) reason = DEL_REASON_RESET_SADB 30 16:37:02.508 05/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 31 16:37:02.508 05/31/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=97C39654F51B733A R_Cookie=106369AF1B356E9F) reason = DEL_REASON_RESET_SADB 32 16:37:02.508 05/31/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 33 16:37:02.788 05/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 34 16:37:02.788 05/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 35 16:37:02.788 05/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 36 16:37:02.788 05/31/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped