Link to home
Start Free TrialLog in
Avatar of Bob Macpherson
Bob MacphersonFlag for United States of America

asked on

Cannot connect through VPN

A user in a different city has a brand new laptop and cannot connect to VPN here. I walked him through all the VPN settings and everything is right but he still can't connect. Do you know why? Here is the log. Thanks!

Cisco Systems VPN Client Version 4.8.01.0300
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2

61     12:36:29.046  02/28/07  Sev=Info/4             CM/0x63100002
Begin connection process

62     12:36:29.046  02/28/07  Sev=Info/4             CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully

63     12:36:29.046  02/28/07  Sev=Info/4             CM/0x63100004
Establish secure connection using Ethernet

64     12:36:29.046  02/28/07  Sev=Info/4             CM/0x63100024
Attempt connection with server "12.196.85.227"

65     12:36:29.062  02/28/07  Sev=Info/6             IKE/0x6300003B
Attempting to establish a connection with 12.196.85.227.

66     12:36:29.078  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag),
VID(Nat-T), VID(Unity)) to 12.196.85.227

67     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227

68     12:36:29.156  02/28/07  Sev=Info/4             IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth),
VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 12.196.85.227

69     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer is a Cisco-Unity compliant peer

70     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports XAUTH

71     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports DPD

72     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports NAT-T

73     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports IKE fragmentation payloads

74     12:36:29.171  02/28/07  Sev=Info/6             IKE/0x63000001
IOS Vendor ID Contruction successful

75     12:36:29.171  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D,
NAT-D, VID(?), VID(Unity)) to 12.196.85.227

76     12:36:29.171  02/28/07  Sev=Info/6             IKE/0x63000055
Sent a keepalive on the IPSec SA

77     12:36:29.171  02/28/07  Sev=Info/4             IKE/0x63000083
IKE Port in use - Local Port =  0x1194, Remote Port = 0x1194

78     12:36:29.171  02/28/07  Sev=Info/5             IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device

79     12:36:29.171  02/28/07  Sev=Info/4             CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA
in the system

80     12:36:29.250  02/28/07  Sev=Info/5             IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227

81     12:36:29.250  02/28/07  Sev=Info/4             IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.196.85.227

82     12:36:29.250  02/28/07  Sev=Info/4             CM/0x63100015
Launch xAuth application

83     12:36:29.484  02/28/07  Sev=Info/4             IPSEC/0x63700008
IPSec driver successfully started

84     12:36:29.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

85     12:36:39.484  02/28/07  Sev=Info/6             IKE/0x63000055
Sent a keepalive on the IPSec SA

86     12:36:43.625  02/28/07  Sev=Info/4             CM/0x63100017
xAuth application returned

87     12:36:43.625  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.196.85.227

88     12:36:43.687  02/28/07  Sev=Info/5             IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227

89     12:36:43.687  02/28/07  Sev=Info/4             IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.196.85.227

90     12:36:43.687  02/28/07  Sev=Info/4             CM/0x63100015
Launch xAuth application

91     12:36:45.109  02/28/07  Sev=Info/4             CM/0x63100017
xAuth application returned

92     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.196.85.227

93     12:36:45.109  02/28/07  Sev=Info/4             CM/0x63100018
User does not provide any authentication data

94     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000001
IKE received signal to terminate VPN connection

95     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=8160B229CA3594EB
R_Cookie=6512E55A352FB088) reason = DEL_REASON_RESET_SADB

96     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 12.196.85.227

97     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=8160B229CA3594EB
R_Cookie=6512E55A352FB088) reason = DEL_REASON_RESET_SADB

98     12:36:45.109  02/28/07  Sev=Info/5             CM/0x63100025
Initializing CVPNDrv

99     12:36:45.109  02/28/07  Sev=Info/6             CM/0x63100046
Set tunnel established flag in registry to 0.

100    12:36:45.125  02/28/07  Sev=Info/4             IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully

101    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

102    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

103    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

104    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x6370000A
IPSec driver successfully stopped
ASKER CERTIFIED SOLUTION
Avatar of Frabble
Frabble
Flag of United Kingdom of Great Britain and Northern Ireland image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
I am having the same problem trying to connect a number of users with the Cisco VPN Client coming through a Cisco Concentraitor.

I have checked the username and passwords and the account lockout status and all is fine. To add to this sometimes the client works and other times it hangs suring the windows logon stage.

If you have any more suggestions as to a resolution please let me know

Regards