Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Contivity VPN - Login Failed. Please consult the switch log for details.

Posted on 2006-11-11
Medium Priority
Last Modified: 2011-08-18
Where is the switch log?  Is it on the server side?
Question by:Angela_Wilcox
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 51

Accepted Solution

Keith Alabaster earned 375 total points
ID: 17921324
A little more information might help a bit here.....

Normally it is held on the client but depending on the error, you may have made a partial connection so there would be a log entry server-side also.

Author Comment

ID: 17921736
Keith - not sure what to tell you.  I have a laptop provided to me by a client.  VPN has been working fine.  This morning when I went to sign in - I got the error: Login Failed. Please consult the switch log for details. The Nortel Log on my laptop had the following in it:

Sat Nov 11 06:27:59 2006 | Isakmp | I | Logging subsystem initialized.
Sat Nov 11 06:27:59 2006 | Isakmpd | I | Session End Notification setup for XP :
Sat Nov 11 06:28:05 2006 | Isakmpd | I | Connection initiated to [] using Diffie-Hellman group 2.
Sat Nov 11 06:28:06 2006 | Isakmpd | E | Unable to complete encryption handshake with remote side. Encryption Mismatch.
Sat Nov 11 06:28:06 2006 | Isakmpd | I | Connection initiated to [] using Diffie-Hellman group 1.
Sat Nov 11 06:28:28 2006 | Isakmpd | F | Login failed. Please consult the switch log for further information.

Since it too said to refer to the switch log - I assumed the log I found was not the switch log - and I cannot seem to locate it.

Thanks for any help

Author Comment

ID: 17968375
Was an issue with the security - my VPN password had expired...
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17968382
Ha. Sometimes its the simple things..... Well done!

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question