troubleshooting Question

Cannot connect through VPN

Avatar of Bob Macpherson
Bob MacphersonFlag for United States of America asked on
VPN
2 Comments1 Solution3992 ViewsLast Modified:
A user in a different city has a brand new laptop and cannot connect to VPN here. I walked him through all the VPN settings and everything is right but he still can't connect. Do you know why? Here is the log. Thanks!

Cisco Systems VPN Client Version 4.8.01.0300
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2

61     12:36:29.046  02/28/07  Sev=Info/4             CM/0x63100002
Begin connection process

62     12:36:29.046  02/28/07  Sev=Info/4             CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully

63     12:36:29.046  02/28/07  Sev=Info/4             CM/0x63100004
Establish secure connection using Ethernet

64     12:36:29.046  02/28/07  Sev=Info/4             CM/0x63100024
Attempt connection with server "12.196.85.227"

65     12:36:29.062  02/28/07  Sev=Info/6             IKE/0x6300003B
Attempting to establish a connection with 12.196.85.227.

66     12:36:29.078  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag),
VID(Nat-T), VID(Unity)) to 12.196.85.227

67     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227

68     12:36:29.156  02/28/07  Sev=Info/4             IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth),
VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 12.196.85.227

69     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer is a Cisco-Unity compliant peer

70     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports XAUTH

71     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports DPD

72     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports NAT-T

73     12:36:29.156  02/28/07  Sev=Info/5             IKE/0x63000001
Peer supports IKE fragmentation payloads

74     12:36:29.171  02/28/07  Sev=Info/6             IKE/0x63000001
IOS Vendor ID Contruction successful

75     12:36:29.171  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D,
NAT-D, VID(?), VID(Unity)) to 12.196.85.227

76     12:36:29.171  02/28/07  Sev=Info/6             IKE/0x63000055
Sent a keepalive on the IPSec SA

77     12:36:29.171  02/28/07  Sev=Info/4             IKE/0x63000083
IKE Port in use - Local Port =  0x1194, Remote Port = 0x1194

78     12:36:29.171  02/28/07  Sev=Info/5             IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device

79     12:36:29.171  02/28/07  Sev=Info/4             CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA
in the system

80     12:36:29.250  02/28/07  Sev=Info/5             IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227

81     12:36:29.250  02/28/07  Sev=Info/4             IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.196.85.227

82     12:36:29.250  02/28/07  Sev=Info/4             CM/0x63100015
Launch xAuth application

83     12:36:29.484  02/28/07  Sev=Info/4             IPSEC/0x63700008
IPSec driver successfully started

84     12:36:29.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

85     12:36:39.484  02/28/07  Sev=Info/6             IKE/0x63000055
Sent a keepalive on the IPSec SA

86     12:36:43.625  02/28/07  Sev=Info/4             CM/0x63100017
xAuth application returned

87     12:36:43.625  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.196.85.227

88     12:36:43.687  02/28/07  Sev=Info/5             IKE/0x6300002F
Received ISAKMP packet: peer = 12.196.85.227

89     12:36:43.687  02/28/07  Sev=Info/4             IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.196.85.227

90     12:36:43.687  02/28/07  Sev=Info/4             CM/0x63100015
Launch xAuth application

91     12:36:45.109  02/28/07  Sev=Info/4             CM/0x63100017
xAuth application returned

92     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.196.85.227

93     12:36:45.109  02/28/07  Sev=Info/4             CM/0x63100018
User does not provide any authentication data

94     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000001
IKE received signal to terminate VPN connection

95     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=8160B229CA3594EB
R_Cookie=6512E55A352FB088) reason = DEL_REASON_RESET_SADB

96     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 12.196.85.227

97     12:36:45.109  02/28/07  Sev=Info/4             IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=8160B229CA3594EB
R_Cookie=6512E55A352FB088) reason = DEL_REASON_RESET_SADB

98     12:36:45.109  02/28/07  Sev=Info/5             CM/0x63100025
Initializing CVPNDrv

99     12:36:45.109  02/28/07  Sev=Info/6             CM/0x63100046
Set tunnel established flag in registry to 0.

100    12:36:45.125  02/28/07  Sev=Info/4             IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully

101    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

102    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

103    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x63700014
Deleted all keys

104    12:36:45.484  02/28/07  Sev=Info/4             IPSEC/0x6370000A
IPSec driver successfully stopped
Join the community to see this answer!
Join our exclusive community to see this answer & millions of others.
Unlock 1 Answer and 2 Comments.
Join the Community
Learn from the best

Network and collaborate with thousands of CTOs, CISOs, and IT Pros rooting for you and your success.

Andrew Hancock - VMware vExpert
See if this solution works for you by signing up for a 7 day free trial.
Unlock 1 Answer and 2 Comments.
Try for 7 days

”The time we save is the biggest benefit of E-E to our team. What could take multiple guys 2 hours or more each to find is accessed in around 15 minutes on Experts Exchange.

-Mike Kapnisakis, Warner Bros