EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 02:33:33.408 08/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 02:33:33.458 08/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 02:33:33.458 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 4 02:33:33.478 08/17/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 2056 for TCP connection. 5 02:33:33.488 08/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 02:33:33.488 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 02:33:33.488 08/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 2056, dst port 4005 8 02:33:34.440 08/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 2056 9 02:33:34.440 08/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 2056, dst port 4005 10 02:33:34.440 08/17/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 11 02:33:34.940 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 12 02:33:34.960 08/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 13 02:33:34.980 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 14 02:33:40.448 08/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=6275AE86D7FCB5A9 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 15 02:33:40.949 08/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=6275AE86D7FCB5A9 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 16 02:33:40.949 08/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_PEER_NOT_RESPONDING" 17 02:33:40.949 08/17/07 Sev=Info/4 CM/0x63100011 Attempt connection with backup server "usvgw3.emc.com" 18 02:33:40.949 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 19 02:33:40.979 08/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 20 02:33:41.450 08/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 2056, dst port 4005 21 02:33:41.450 08/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2056, dst port 4005 22 02:33:41.450 08/17/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 2056 23 02:33:41.450 08/17/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 2056, dst port 4005 24 02:33:46.457 08/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2056, dst port 4005 25 02:33:51.464 08/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2056, dst port 4005 26 02:33:56.471 08/17/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2056, dst port 4005 27 02:34:01.478 08/17/07 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw3.emc.com" 28 02:34:01.478 08/17/07 Sev=Info/4 CM/0x6310000C All connection attempts with backup server failed 29 02:34:01.488 08/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 30 02:34:01.498 08/17/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 31 02:34:01.498 08/17/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 2056 for TCP connection. 32 02:34:01.518 08/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 33 02:34:01.539 08/17/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 2056, dst port 4005 34 02:34:01.539 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 35 02:34:01.539 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 36 02:34:01.539 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 37 02:34:01.539 08/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 38 02:34:10.712 08/17/07 Sev=Info/4 CM/0x63100002 Begin connection process 39 02:34:10.722 08/17/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 40 02:34:10.722 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 41 02:34:10.732 08/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 42 02:34:10.742 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 128.221.195.15 43 02:34:10.992 08/17/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 44 02:34:10.992 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 45 02:34:10.992 08/17/07 Sev=Info/6 IPSEC/0x6370002B Sent 1 packets, 0 were fragmented. 46 02:34:11.002 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 47 02:34:11.002 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 48 02:34:11.002 08/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 49 02:34:11.002 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 50 02:34:11.002 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 51 02:34:11.002 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 52 02:34:11.002 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 53 02:34:11.032 08/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 54 02:34:11.032 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 55 02:34:11.032 08/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 56 02:34:11.032 08/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 57 02:34:11.132 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 58 02:34:11.132 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 59 02:34:11.132 08/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.17" from primary server 60 02:34:11.132 08/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C96BE7E74511E1B0 R_Cookie=AFF70F16C5A1CBD3) reason = DEL_REASON_LOAD_BALANCING 61 02:34:11.132 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 62 02:34:11.994 08/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C96BE7E74511E1B0 R_Cookie=AFF70F16C5A1CBD3) reason = DEL_REASON_LOAD_BALANCING 63 02:34:11.994 08/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 64 02:34:11.994 08/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.17" given by the primary server 65 02:34:11.994 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 66 02:34:12.004 08/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.17. 67 02:34:12.034 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 128.221.195.17 68 02:34:12.284 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 69 02:34:12.284 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.17 70 02:34:12.284 08/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 71 02:34:12.284 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 72 02:34:12.284 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 73 02:34:12.284 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 74 02:34:12.284 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 75 02:34:12.294 08/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 76 02:34:12.294 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.17 77 02:34:12.294 08/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 78 02:34:12.294 08/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 79 02:34:12.394 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 80 02:34:12.394 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 81 02:34:12.394 08/17/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 82 02:34:21.517 08/17/07 Sev=Info/4 CM/0x63100017 xAuth application returned 83 02:34:21.517 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 84 02:34:21.738 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 85 02:34:21.738 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 128.221.195.17 86 02:34:21.738 08/17/07 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 4 --> PEER_DELETE-IKE_DELETE_NO_ERROR. 87 02:34:21.738 08/17/07 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=8D89508521618C7C R_Cookie=AB6B8ED6C3F1FEFA 88 02:34:21.738 08/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8D89508521618C7C R_Cookie=AB6B8ED6C3F1FEFA) reason = PEER_DELETE-IKE_DELETE_NO_ERROR 89 02:34:22.509 08/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8D89508521618C7C R_Cookie=AB6B8ED6C3F1FEFA) reason = PEER_DELETE-IKE_DELETE_NO_ERROR 90 02:34:22.509 08/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "128.221.195.17" because of "PEER_DELETE-IKE_DELETE_NO_ERROR" 91 02:34:22.509 08/17/07 Sev=Info/4 CM/0x63100011 Attempt connection with backup server "usvgw3.emc.com" 92 02:34:22.509 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 93 02:34:22.529 08/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 94 02:34:22.559 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 137.69.115.15 95 02:34:22.759 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 96 02:34:22.759 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 97 02:34:22.759 08/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 98 02:34:22.759 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 99 02:34:22.759 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 100 02:34:22.759 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 101 02:34:22.759 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 102 02:34:22.779 08/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 103 02:34:22.779 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 104 02:34:22.779 08/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 105 02:34:22.779 08/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 106 02:34:22.819 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 107 02:34:22.819 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 108 02:34:22.829 08/17/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 109 02:34:22.829 08/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7602B9DACF37C074 R_Cookie=4D35DA0BEC0080FF) reason = DEL_REASON_LOAD_BALANCING 110 02:34:22.829 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 111 02:34:23.510 08/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7602B9DACF37C074 R_Cookie=4D35DA0BEC0080FF) reason = DEL_REASON_LOAD_BALANCING 112 02:34:23.510 08/17/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 113 02:34:23.510 08/17/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 114 02:34:23.510 08/17/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 115 02:34:23.520 08/17/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 116 02:34:23.550 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 137.69.115.17 117 02:34:23.740 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 118 02:34:23.740 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 119 02:34:23.740 08/17/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 120 02:34:23.740 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 121 02:34:23.740 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 122 02:34:23.740 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 123 02:34:23.740 08/17/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 124 02:34:23.760 08/17/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 125 02:34:23.760 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 126 02:34:23.760 08/17/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 127 02:34:23.760 08/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 128 02:34:23.801 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 129 02:34:23.801 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 130 02:34:23.801 08/17/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 131 02:34:34.025 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 132 02:34:34.025 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 133 02:34:36.048 08/17/07 Sev=Info/4 CM/0x63100017 xAuth application returned 134 02:34:36.048 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 135 02:34:38.812 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 136 02:34:38.812 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 137 02:34:38.812 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 138 02:34:38.812 08/17/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 139 02:34:38.952 08/17/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 140 02:34:38.952 08/17/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 141 02:34:38.952 08/17/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 142 02:34:38.952 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 143 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 144 02:34:39.824 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 145 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.62 146 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 147 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 148 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 149 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 150 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 151 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 152 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 153 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 154 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_UDP_NAT_PORT, value = 0x00002710 155 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 156 02:34:39.824 08/17/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 157 02:34:39.824 08/17/07 Sev=Info/4 CM/0x63100019 Mode Config data received 158 02:34:39.844 08/17/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.62, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 159 02:34:39.844 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 160 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 161 02:34:39.904 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 162 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 163 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 16 seconds, setting expiry to 86384 seconds from now 164 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 165 02:34:39.904 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 166 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 167 02:34:39.904 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 168 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=64B7066E OUTBOUND SPI = 0x53D82D5E INBOUND SPI = 0x6E5CD99A) 169 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x53D82D5E 170 02:34:39.904 08/17/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x6E5CD99A 171 02:34:42.668 08/17/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.62/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 172 02:34:42.798 08/17/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 173 02:34:42.828 08/17/07 Sev=Info/4 CM/0x6310001A One secure connection established 174 02:34:42.848 08/17/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.32.62, 192.168.186.1, 192.168.121.1. 175 02:34:42.848 08/17/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.62. Current address(es): 192.168.1.102, 10.13.32.62, 192.168.186.1, 192.168.121.1. 176 02:34:43.008 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 177 02:34:43.008 08/17/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 178 02:34:43.008 08/17/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x5e2dd853 into key list 179 02:34:43.008 08/17/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 180 02:34:43.018 08/17/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9ad95c6e into key list 181 02:34:43.018 08/17/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.62 182 02:34:43.018 08/17/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x5e2dd853 for inbound key with SPI=0x9ad95c6e 183 02:34:54.054 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 184 02:34:54.054 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 185 02:35:14.545 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 186 02:35:14.545 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 187 02:35:35.524 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 188 02:35:35.524 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 189 02:35:56.503 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 190 02:35:56.503 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 191 02:36:10.489 08/17/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 155368969 192 02:36:10.489 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 193 02:36:10.539 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 194 02:36:10.539 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 195 02:36:10.539 08/17/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 155368970, seq# expected = 155368970 196 02:36:17.482 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 197 02:36:17.482 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 198 02:36:38.461 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 199 02:36:38.461 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 200 02:36:38.461 08/17/07 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA 201 02:36:59.440 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 202 02:36:59.440 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 203 02:37:10.929 08/17/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 155368970 204 02:37:10.929 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 205 02:37:10.969 08/17/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 206 02:37:10.969 08/17/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 207 02:37:10.969 08/17/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 155368971, seq# expected = 155368971 208 02:37:20.419 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 209 02:37:20.419 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 210 02:37:41.398 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 211 02:37:41.398 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 212 02:38:02.377 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 213 02:38:02.377 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 214 02:38:23.636 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 137.69.115.17 215 02:38:23.636 08/17/07 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 216 02:38:28.641 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 217 02:38:28.641 08/17/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 53D82D5E INBOUND SPI = 6E5CD99A) 218 02:38:28.641 08/17/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=64B7066E 219 02:38:28.641 08/17/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D99E9E1FF66AD9EF R_Cookie=683A4EDC155A56DE) reason = DEL_REASON_RESET_SADB 220 02:38:28.641 08/17/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 221 02:38:28.641 08/17/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D99E9E1FF66AD9EF R_Cookie=683A4EDC155A56DE) reason = DEL_REASON_RESET_SADB 222 02:38:28.641 08/17/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 223 02:38:28.641 08/17/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 224 02:38:28.641 08/17/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 0:3:46 225 02:38:28.641 08/17/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 226 02:38:28.661 08/17/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 227 02:38:28.661 08/17/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 228 02:38:30.219 08/17/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 229 02:38:35.456 08/17/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 230 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9ad95c6e 231 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9ad95c6e 232 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x5e2dd853 233 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x5e2dd853 234 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 235 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 236 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 237 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 238 02:38:37.549 08/17/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys