Solved

Contivity VPN - Login Failed. Please consult the switch log for details.

Posted on 2006-11-11
4
33,517 Views
Last Modified: 2011-08-18
Where is the switch log?  Is it on the server side?
0
Comment
Question by:Angela_Wilcox
  • 2
  • 2
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 125 total points
ID: 17921324
A little more information might help a bit here.....

Normally it is held on the client but depending on the error, you may have made a partial connection so there would be a log entry server-side also.
0
 

Author Comment

by:Angela_Wilcox
ID: 17921736
Keith - not sure what to tell you.  I have a laptop provided to me by a client.  VPN has been working fine.  This morning when I went to sign in - I got the error: Login Failed. Please consult the switch log for details. The Nortel Log on my laptop had the following in it:

Sat Nov 11 06:27:59 2006 | Isakmp | I | Logging subsystem initialized.
Sat Nov 11 06:27:59 2006 | Isakmpd | I | Session End Notification setup for XP :
Sat Nov 11 06:28:05 2006 | Isakmpd | I | Connection initiated to 12.149.9.42 [12.149.9.42] using Diffie-Hellman group 2.
Sat Nov 11 06:28:06 2006 | Isakmpd | E | Unable to complete encryption handshake with remote side. Encryption Mismatch.
Sat Nov 11 06:28:06 2006 | Isakmpd | I | Connection initiated to 12.149.9.42 [12.149.9.42] using Diffie-Hellman group 1.
Sat Nov 11 06:28:28 2006 | Isakmpd | F | Login failed. Please consult the switch log for further information.

Since it too said to refer to the switch log - I assumed the log I found was not the switch log - and I cannot seem to locate it.

Thanks for any help
0
 

Author Comment

by:Angela_Wilcox
ID: 17968375
Was an issue with the security - my VPN password had expired...
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17968382
Ha. Sometimes its the simple things..... Well done!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Downtime reduced, data recovered by utilizing an Experts Exchange Business Account Challenge The United States Marine Corps employs more than 200,000 active-duty Marines with operations in four continents, all requiring complex networking system…
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now