A user in a different city has a brand new laptop and cannot connect to VPN here. I walked him through all the VPN settings and everything is right but he still can't connect. Do you know why? Here is the log. Thanks!
Cisco Systems VPN Client Version 4.8.01.0300
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
61 12:36:29.046 02/28/07 Sev=Info/4 CM/0x63100002
Begin connection process
62 12:36:29.046 02/28/07 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
63 12:36:29.046 02/28/07 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
64 12:36:29.046 02/28/07 Sev=Info/4 CM/0x63100024
Attempt connection with server "12.196.85.227"
65 12:36:29.062 02/28/07 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 12.196.85.227.
66 12:36:29.078 02/28/07 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag),
VID(Nat-T), VID(Unity)) to 12.196.85.227
67 12:36:29.156 02/28/07 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227
68 12:36:29.156 02/28/07 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth),
VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 12.196.85.227
69 12:36:29.156 02/28/07 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
70 12:36:29.156 02/28/07 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
71 12:36:29.156 02/28/07 Sev=Info/5 IKE/0x63000001
Peer supports DPD
72 12:36:29.156 02/28/07 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
73 12:36:29.156 02/28/07 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
74 12:36:29.171 02/28/07 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
75 12:36:29.171 02/28/07 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D,
NAT-D, VID(?), VID(Unity)) to 12.196.85.227
76 12:36:29.171 02/28/07 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
77 12:36:29.171 02/28/07 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
78 12:36:29.171 02/28/07 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
79 12:36:29.171 02/28/07 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA
in the system
80 12:36:29.250 02/28/07 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227
81 12:36:29.250 02/28/07 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.196.85.227
82 12:36:29.250 02/28/07 Sev=Info/4 CM/0x63100015
Launch xAuth application
83 12:36:29.484 02/28/07 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
84 12:36:29.484 02/28/07 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
85 12:36:39.484 02/28/07 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
86 12:36:43.625 02/28/07 Sev=Info/4 CM/0x63100017
xAuth application returned
87 12:36:43.625 02/28/07 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.196.85.227
88 12:36:43.687 02/28/07 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227
89 12:36:43.687 02/28/07 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.196.85.227
90 12:36:43.687 02/28/07 Sev=Info/4 CM/0x63100015
Launch xAuth application
91 12:36:45.109 02/28/07 Sev=Info/4 CM/0x63100017
xAuth application returned
92 12:36:45.109 02/28/07 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.196.85.227
93 12:36:45.109 02/28/07 Sev=Info/4 CM/0x63100018
User does not provide any authentication data
94 12:36:45.109 02/28/07 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
95 12:36:45.109 02/28/07 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=8160B229CA3594EB
R_Cookie=6512E55A352FB088) reason = DEL_REASON_RESET_SADB
96 12:36:45.109 02/28/07 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 12.196.85.227
97 12:36:45.109 02/28/07 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=8160B229CA3594EB
R_Cookie=6512E55A352FB088) reason = DEL_REASON_RESET_SADB
98 12:36:45.109 02/28/07 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
99 12:36:45.109 02/28/07 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
100 12:36:45.125 02/28/07 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
101 12:36:45.484 02/28/07 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
102 12:36:45.484 02/28/07 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
103 12:36:45.484 02/28/07 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
104 12:36:45.484 02/28/07 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
Our community of experts have been thoroughly vetted for their expertise and industry experience.