EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 02:05:10.596 08/20/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 02:05:10.657 08/20/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 02:05:10.657 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 02:05:10.687 08/20/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3067 for TCP connection. 5 02:05:10.787 08/20/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 02:05:10.787 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 02:05:10.787 08/20/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3067, dst port 4005 8 02:05:10.787 08/20/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3067 9 02:05:10.787 08/20/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3067, dst port 4005 10 02:05:10.787 08/20/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 02:05:11.297 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 02:05:11.327 08/20/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 02:05:11.388 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 02:05:11.568 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 02:05:11.568 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 02:05:11.568 08/20/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 02:05:11.568 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 02:05:11.568 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 02:05:11.568 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 02:05:11.578 08/20/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 02:05:11.578 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 02:05:11.578 08/20/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 02:05:11.578 08/20/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 02:05:11.628 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 02:05:11.628 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 02:05:11.628 08/20/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 02:05:11.628 08/20/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=57A835914AEE3933 R_Cookie=6EB6A1EB1BE348DE) reason = DEL_REASON_LOAD_BALANCING 28 02:05:11.628 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 02:05:12.289 08/20/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=57A835914AEE3933 R_Cookie=6EB6A1EB1BE348DE) reason = DEL_REASON_LOAD_BALANCING 30 02:05:12.289 08/20/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 02:05:12.289 08/20/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 02:05:12.289 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 02:05:12.309 08/20/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 02:05:12.790 08/20/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3067, dst port 4005 35 02:05:12.790 08/20/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3067, dst port 4005 36 02:05:12.790 08/20/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3067 37 02:05:12.790 08/20/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3067, dst port 4005 38 02:05:12.790 08/20/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 02:05:13.290 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 02:05:13.300 08/20/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 02:05:13.310 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 02:05:13.491 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 02:05:13.491 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 02:05:13.491 08/20/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 02:05:13.491 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 02:05:13.491 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 02:05:13.491 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 02:05:13.511 08/20/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 02:05:13.511 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 02:05:13.521 08/20/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 02:05:13.521 08/20/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 02:05:13.571 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 02:05:13.571 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 02:05:13.571 08/20/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 02:05:22.283 08/20/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 02:05:22.283 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 02:05:40.199 08/20/07 Sev=Info/4 CM/0x63100006 Abort connection attempt before Phase 1 SA up 58 02:05:40.199 08/20/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 59 02:05:40.209 08/20/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=74190DC6D65A86F5 R_Cookie=B8A878219903441A) reason = DEL_REASON_RESET_SADB 60 02:05:40.209 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 61 02:05:40.209 08/20/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=74190DC6D65A86F5 R_Cookie=B8A878219903441A) reason = DEL_REASON_RESET_SADB 62 02:05:40.209 08/20/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 63 02:05:40.209 08/20/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 64 02:05:40.219 08/20/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 3067 for TCP connection. 65 02:05:40.339 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 66 02:05:40.339 08/20/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 3067, dst port 4005 67 02:05:40.339 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 68 02:05:40.339 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 69 02:05:40.339 08/20/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 70 02:05:41.791 08/20/07 Sev=Info/4 CM/0x63100002 Begin connection process 71 02:05:41.821 08/20/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 72 02:05:41.821 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 73 02:05:41.831 08/20/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3075 for TCP connection. 74 02:05:41.841 08/20/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 75 02:05:41.841 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 02:05:41.841 08/20/07 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 77 02:05:41.841 08/20/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3075, dst port 4005 78 02:05:42.833 08/20/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3075 79 02:05:42.833 08/20/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3075, dst port 4005 80 02:05:42.833 08/20/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 81 02:05:43.344 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 82 02:05:43.364 08/20/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 83 02:05:43.384 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 84 02:05:46.919 08/20/07 Sev=Info/4 CM/0x63100006 Abort connection attempt before Phase 1 SA up 85 02:05:46.919 08/20/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 86 02:05:46.919 08/20/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A8B8AECEADA98AD5 R_Cookie=0000000000000000) reason = DEL_REASON_RESET_SADB 87 02:05:46.919 08/20/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A8B8AECEADA98AD5 R_Cookie=0000000000000000) reason = DEL_REASON_RESET_SADB 88 02:05:46.999 08/20/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 89 02:05:46.999 08/20/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 90 02:05:46.999 08/20/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 3075 for TCP connection. 91 02:05:47.840 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 92 02:05:47.840 08/20/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3075, dst port 4005 93 02:05:47.840 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 94 02:05:47.840 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 95 02:05:47.840 08/20/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped