?
Solved

Cisco VPN Client Mac 10.5.5

Posted on 2008-11-14
2
Medium Priority
?
2,493 Views
Last Modified: 2013-11-12
I'm trying to conect my VPN Cisco client on leopard 15.5 on a Mac Book Pro but I'm having the following log. It tries to "secure channel" and then enter into the backup servers but after that it wont connect, it just says not connected. Here is the log. I deleted the server name from this log for security reasons, it show the word "server" but obviously it is configured on my Cisco VPN client. Any help would be much appreciated.

1      17:27:07.888  11/14/2008  Sev=Info/4      CM/0x43100002
Begin connection process

2      17:27:07.889  11/14/2008  Sev=Info/4      CM/0x43100004
Establish secure connection using Ethernet

3      17:27:07.889  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "server"

4      17:27:07.890  11/14/2008  Sev=Info/6      CM/0x4310002F
Allocated local TCP port 49196 for TCP connection.

5      17:27:08.125  11/14/2008  Sev=Info/4      IPSEC/0x43700008
IPSec driver successfully started

6      17:27:08.125  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

7      17:27:08.125  11/14/2008  Sev=Info/6      IPSEC/0x4370002C
Sent 2 packets, 0 were fragmented.

8      17:27:08.126  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.105.11, src port 49196, dst port 443

9      17:27:08.126  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.105.11, src port 443, dst port 49196

10     17:27:08.126  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.105.11, src port 49196, dst port 443

11     17:27:08.126  11/14/2008  Sev=Info/4      CM/0x43100029
TCP connection established on port 443 with server "server"

12     17:27:08.126  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "server"

13     17:27:08.126  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (500).

14     17:27:08.127  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (4500).

15     17:27:08.127  11/14/2008  Sev=Info/6      IKE/0x4300003B
Attempting to establish a connection with 206.49.105.11.

16     17:27:08.211  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 206.49.105.11

17     17:27:08.494  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.11

18     17:27:08.494  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 206.49.105.11

19     17:27:08.494  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer is a Cisco-Unity compliant peer

20     17:27:08.494  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports XAUTH

21     17:27:08.494  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DPD

22     17:27:08.494  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports IKE fragmentation payloads

23     17:27:08.494  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DWR Code and DWR Text

24     17:27:08.580  11/14/2008  Sev=Info/6      IKE/0x43000001
IOS Vendor ID Contruction successful

25     17:27:08.580  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 206.49.105.11

26     17:27:08.580  11/14/2008  Sev=Info/4      IKE/0x43000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

27     17:27:08.580  11/14/2008  Sev=Info/4      CM/0x4310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

28     17:27:08.717  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.11

29     17:27:08.717  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 206.49.105.11

30     17:27:08.717  11/14/2008  Sev=Info/4      CM/0x4310001B
Received alternative server address "206.49.105.13" from primary server

31     17:27:08.717  11/14/2008  Sev=Info/4      IKE/0x43000017
Marking IKE SA for deletion  (I_Cookie=5DA757B9D7D5C221 R_Cookie=AF1E169569C3EB0A) reason = DEL_REASON_LOAD_BALANCING

32     17:27:08.717  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 206.49.105.11

33     17:27:09.625  11/14/2008  Sev=Info/4      IKE/0x4300004B
Discarding IKE SA negotiation (I_Cookie=5DA757B9D7D5C221 R_Cookie=AF1E169569C3EB0A) reason = DEL_REASON_LOAD_BALANCING

34     17:27:09.625  11/14/2008  Sev=Info/4      CM/0x43100014
Unable to establish Phase 1 SA with server "server" because of "DEL_REASON_LOAD_BALANCING"

35     17:27:09.625  11/14/2008  Sev=Info/4      CM/0x43100010
Try alternative server "206.49.105.13" given by the primary server

36     17:27:09.625  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.105.13"

37     17:27:09.625  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

38     17:27:09.626  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.105.11, src port 49196, dst port 443

39     17:27:09.626  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.105.13, src port 49196, dst port 443

40     17:27:10.625  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.105.13, src port 443, dst port 49196

41     17:27:10.625  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.105.13, src port 49196, dst port 443

42     17:27:10.625  11/14/2008  Sev=Info/4      CM/0x43100029
TCP connection established on port 443 with server "206.49.105.13"

43     17:27:10.625  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.105.13"

44     17:27:10.626  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (500).

45     17:27:10.626  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (4500).

46     17:27:10.626  11/14/2008  Sev=Info/6      IKE/0x4300003B
Attempting to establish a connection with 206.49.105.13.

47     17:27:10.712  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 206.49.105.13

48     17:27:10.979  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

49     17:27:10.979  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 206.49.105.13

50     17:27:10.979  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer is a Cisco-Unity compliant peer

51     17:27:10.979  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports XAUTH

52     17:27:10.979  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DPD

53     17:27:10.979  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports IKE fragmentation payloads

54     17:27:10.979  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DWR Code and DWR Text

55     17:27:11.066  11/14/2008  Sev=Info/6      IKE/0x43000001
IOS Vendor ID Contruction successful

56     17:27:11.066  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 206.49.105.13

57     17:27:11.066  11/14/2008  Sev=Info/4      IKE/0x43000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

58     17:27:11.066  11/14/2008  Sev=Info/4      CM/0x4310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

59     17:27:11.182  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

60     17:27:11.182  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 206.49.105.13

61     17:27:11.182  11/14/2008  Sev=Info/4      CM/0x43100015
Launch xAuth application

62     17:27:17.777  11/14/2008  Sev=Info/4      CM/0x43100017
xAuth application returned

63     17:27:17.777  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 206.49.105.13

64     17:27:20.126  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

65     17:27:20.126  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 206.49.105.13

66     17:27:20.127  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 206.49.105.13

67     17:27:20.127  11/14/2008  Sev=Info/4      IKE/0x43000017
Marking IKE SA for deletion  (I_Cookie=3D84717A2EA43497 R_Cookie=CF51290F62DF808E) reason = DEL_REASON_WE_FAILED_AUTH

68     17:27:20.127  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 206.49.105.13

69     17:27:20.243  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

70     17:27:20.244  11/14/2008  Sev=Info/4      IKE/0x43000058
Received an ISAKMP message for a non-active SA, I_Cookie=3D84717A2EA43497 R_Cookie=CF51290F62DF808E

71     17:27:20.244  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 206.49.105.13

72     17:27:20.625  11/14/2008  Sev=Info/6      IPSEC/0x4370001D
TCP RST received from 206.49.105.13, src port 443, dst port 49196

73     17:27:21.143  11/14/2008  Sev=Info/4      IKE/0x4300004B
Discarding IKE SA negotiation (I_Cookie=3D84717A2EA43497 R_Cookie=CF51290F62DF808E) reason = DEL_REASON_WE_FAILED_AUTH

74     17:27:21.143  11/14/2008  Sev=Info/4      CM/0x43100014
Unable to establish Phase 1 SA with server "206.49.105.13" because of "DEL_REASON_WE_FAILED_AUTH"

75     17:27:21.143  11/14/2008  Sev=Info/5      CM/0x43100025
Initializing CVPNDrv

76     17:27:21.144  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

77     17:27:21.144  11/14/2008  Sev=Info/6      CM/0x43100030
Removed local TCP port 49196 for TCP connection.

78     17:27:21.145  11/14/2008  Sev=Info/4      CVPND/0x4340001F
Privilege Separation: restoring MTU on primary interface.

79     17:27:21.145  11/14/2008  Sev=Info/4      IKE/0x43000001
IKE received signal to terminate VPN connection

80     17:27:21.145  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.105.13, src port 49196, dst port 443

81     17:27:21.146  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

82     17:27:21.146  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

83     17:27:21.146  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

84     17:27:21.146  11/14/2008  Sev=Info/4      IPSEC/0x4370000A
IPSec driver successfully stopped

85     17:31:36.372  11/14/2008  Sev=Info/4      CM/0x43100002
Begin connection process

86     17:31:36.373  11/14/2008  Sev=Info/4      CM/0x43100004
Establish secure connection using Ethernet

87     17:31:36.373  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "server"

88     17:31:36.373  11/14/2008  Sev=Info/6      CM/0x4310002F
Allocated local TCP port 49283 for TCP connection.

89     17:31:36.625  11/14/2008  Sev=Info/4      IPSEC/0x43700008
IPSec driver successfully started

90     17:31:36.625  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

91     17:31:36.625  11/14/2008  Sev=Info/6      IPSEC/0x4370002C
Sent 8 packets, 0 were fragmented.

92     17:31:36.625  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.105.11, src port 49283, dst port 443

93     17:31:36.626  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.105.11, src port 443, dst port 49283

94     17:31:36.626  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.105.11, src port 49283, dst port 443

95     17:31:36.626  11/14/2008  Sev=Info/4      CM/0x43100029
TCP connection established on port 443 with server "server"

96     17:31:36.626  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "server"

97     17:31:36.626  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (500).

98     17:31:36.626  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (4500).

99     17:31:36.626  11/14/2008  Sev=Info/6      IKE/0x4300003B
Attempting to establish a connection with 206.49.105.11.

100    17:31:36.712  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 206.49.105.11

101    17:31:36.997  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.11

102    17:31:36.997  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 206.49.105.11

103    17:31:36.997  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer is a Cisco-Unity compliant peer

104    17:31:36.997  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports XAUTH

105    17:31:36.997  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DPD

106    17:31:36.997  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports IKE fragmentation payloads

107    17:31:36.997  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DWR Code and DWR Text

108    17:31:37.083  11/14/2008  Sev=Info/6      IKE/0x43000001
IOS Vendor ID Contruction successful

109    17:31:37.083  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 206.49.105.11

110    17:31:37.083  11/14/2008  Sev=Info/4      IKE/0x43000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

111    17:31:37.083  11/14/2008  Sev=Info/4      CM/0x4310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

112    17:31:37.216  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.11

113    17:31:37.216  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 206.49.105.11

114    17:31:37.216  11/14/2008  Sev=Info/4      CM/0x4310001B
Received alternative server address "206.49.105.13" from primary server

115    17:31:37.217  11/14/2008  Sev=Info/4      IKE/0x43000017
Marking IKE SA for deletion  (I_Cookie=96C6D34E6C4D2EEE R_Cookie=9F395BA606C7327B) reason = DEL_REASON_LOAD_BALANCING

116    17:31:37.217  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 206.49.105.11

117    17:31:38.125  11/14/2008  Sev=Info/4      IKE/0x4300004B
Discarding IKE SA negotiation (I_Cookie=96C6D34E6C4D2EEE R_Cookie=9F395BA606C7327B) reason = DEL_REASON_LOAD_BALANCING

118    17:31:38.125  11/14/2008  Sev=Info/4      CM/0x43100014
Unable to establish Phase 1 SA with server "server" because of "DEL_REASON_LOAD_BALANCING"

119    17:31:38.125  11/14/2008  Sev=Info/4      CM/0x43100010
Try alternative server "206.49.105.13" given by the primary server

120    17:31:38.125  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.105.13"

121    17:31:38.125  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

122    17:31:38.126  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.105.11, src port 49283, dst port 443

123    17:31:38.126  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.105.13, src port 49283, dst port 443

124    17:31:39.125  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.105.13, src port 443, dst port 49283

125    17:31:39.125  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.105.13, src port 49283, dst port 443

126    17:31:39.125  11/14/2008  Sev=Info/4      CM/0x43100029
TCP connection established on port 443 with server "206.49.105.13"

127    17:31:39.125  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.105.13"

128    17:31:39.126  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (500).

129    17:31:39.126  11/14/2008  Sev=Info/4      CVPND/0x43400019
Privilege Separation: binding to port: (4500).

130    17:31:39.126  11/14/2008  Sev=Info/6      IKE/0x4300003B
Attempting to establish a connection with 206.49.105.13.

131    17:31:39.218  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 206.49.105.13

132    17:31:39.483  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

133    17:31:39.483  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 206.49.105.13

134    17:31:39.483  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer is a Cisco-Unity compliant peer

135    17:31:39.483  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports XAUTH

136    17:31:39.483  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DPD

137    17:31:39.483  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports IKE fragmentation payloads

138    17:31:39.483  11/14/2008  Sev=Info/5      IKE/0x43000001
Peer supports DWR Code and DWR Text

139    17:31:39.570  11/14/2008  Sev=Info/6      IKE/0x43000001
IOS Vendor ID Contruction successful

140    17:31:39.570  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 206.49.105.13

141    17:31:39.570  11/14/2008  Sev=Info/4      IKE/0x43000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

142    17:31:39.570  11/14/2008  Sev=Info/4      CM/0x4310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

143    17:31:39.689  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

144    17:31:39.689  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 206.49.105.13

145    17:31:39.689  11/14/2008  Sev=Info/4      CM/0x43100015
Launch xAuth application

146    17:31:50.171  11/14/2008  Sev=Info/4      CM/0x43100017
xAuth application returned

147    17:31:50.171  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 206.49.105.13

148    17:31:52.761  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

149    17:31:52.761  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 206.49.105.13

150    17:31:52.762  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 206.49.105.13

151    17:31:52.762  11/14/2008  Sev=Info/4      CM/0x4310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

152    17:31:52.763  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 206.49.105.13

153    17:31:53.695  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

154    17:31:53.696  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 206.49.105.13

155    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.98.24.39

156    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.240.0

157    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.98.3.20

158    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.98.3.21

159    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 10.98.3.20

160    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 10.98.3.21

161    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000

162    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000

163    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.1.7.R built by vmurphy on Jun 11 2007 15:30:19

164    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000004

165    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000F
LOCAL_NET #1
      subnet = 10.3.0.0
      mask = 255.255.0.0
      protocol = 0
      src port = 0
      dest port=0

166    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000F
LOCAL_NET #2
      subnet = 64.68.96.0
      mask = 255.255.224.0
      protocol = 0
      src port = 0
      dest port=0

167    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000F
LOCAL_NET #3
      subnet = 66.114.160.0
      mask = 255.255.240.0
      protocol = 0
      src port = 0
      dest port=0

168    17:31:53.696  11/14/2008  Sev=Info/5      IKE/0x4300000F
LOCAL_NET #4
      subnet = 72.246.0.0
      mask = 255.254.0.0
      protocol = 0
      src port = 0
      dest port=0

169    17:31:53.696  11/14/2008  Sev=Info/4      CVPND/0x43400018
Privilege Separation: opening file: (/etc/opt/cisco-vpnclient/Profiles/BP.pcf).

170    17:31:53.699  11/14/2008  Sev=Info/4      CM/0x43100019
Mode Config data received

171    17:31:53.699  11/14/2008  Sev=Info/4      IKE/0x43000056
Received a key request from Driver: Local IP = 10.3.15.245, GW IP = 206.49.105.13, Remote IP = 0.0.0.0

172    17:31:53.700  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 206.49.105.13

173    17:31:53.701  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

174    17:31:53.701  11/14/2008  Sev=Info/6      IPSEC/0x4370002C
Sent 8 packets, 0 were fragmented.

175    17:31:53.823  11/14/2008  Sev=Info/5      IKE/0x4300002F
Received ISAKMP packet: peer = 206.49.105.13

176    17:31:53.823  11/14/2008  Sev=Info/4      IKE/0x43000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 206.49.105.13

177    17:31:53.823  11/14/2008  Sev=Info/4      IKE/0x43000081
Delete Reason Code: 11 --> PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH.

178    17:31:53.823  11/14/2008  Sev=Info/5      IKE/0x4300003C
Received a DELETE payload for IKE SA with Cookies:  I_Cookie=5836D663E3716D8E R_Cookie=F5AE08F95B2DB0B6

179    17:31:53.824  11/14/2008  Sev=Info/4      IKE/0x43000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 206.49.105.13

180    17:31:53.824  11/14/2008  Sev=Info/4      IKE/0x43000049
Discarding IPsec SA negotiation, MsgID=7BD94A3B

181    17:31:53.824  11/14/2008  Sev=Info/4      IKE/0x43000017
Marking IKE SA for deletion  (I_Cookie=5836D663E3716D8E R_Cookie=F5AE08F95B2DB0B6) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH

182    17:31:54.625  11/14/2008  Sev=Info/6      IPSEC/0x4370001D
TCP RST received from 206.49.105.13, src port 443, dst port 49283

183    17:31:54.626  11/14/2008  Sev=Info/4      IKE/0x4300004B
Discarding IKE SA negotiation (I_Cookie=5836D663E3716D8E R_Cookie=F5AE08F95B2DB0B6) reason = PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH

184    17:31:54.626  11/14/2008  Sev=Info/4      CM/0x43100012
Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_FIREWALL_MISMATCH".  0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

185    17:31:54.626  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.106.146"

186    17:31:54.626  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

187    17:31:55.625  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.105.13, src port 49283, dst port 443

188    17:31:55.625  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.106.146, src port 49283, dst port 443

189    17:31:55.625  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.106.146, src port 443, dst port 49283

190    17:31:55.626  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.106.146, src port 49283, dst port 443

191    17:32:00.125  11/14/2008  Sev=Info/4      CM/0x4310002A
Unable to establish TCP connection on port 443 with server "206.49.106.146"

192    17:32:00.125  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.105.11"

193    17:32:00.125  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

194    17:32:00.125  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.106.146, src port 49283, dst port 443

195    17:32:00.126  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.105.11, src port 49283, dst port 443

196    17:32:01.125  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.105.11, src port 443, dst port 49283

197    17:32:01.125  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.105.11, src port 49283, dst port 443

198    17:32:05.125  11/14/2008  Sev=Info/4      CM/0x4310002A
Unable to establish TCP connection on port 443 with server "206.49.105.11"

199    17:32:05.125  11/14/2008  Sev=Info/4      CM/0x43100024
Attempt connection with server "206.49.106.16"

200    17:32:05.125  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

201    17:32:05.625  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.105.11, src port 49283, dst port 443

202    17:32:05.625  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.106.16, src port 49283, dst port 443

203    17:32:05.625  11/14/2008  Sev=Info/6      IPSEC/0x4370001C
TCP SYN-ACK received from 206.49.106.16, src port 443, dst port 49283

204    17:32:05.626  11/14/2008  Sev=Info/6      IPSEC/0x43700021
TCP ACK sent to 206.49.106.16, src port 49283, dst port 443

205    17:32:10.125  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.106.16, src port 49283, dst port 443

206    17:32:15.625  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.106.16, src port 49283, dst port 443

207    17:32:20.625  11/14/2008  Sev=Info/6      IPSEC/0x43700020
TCP SYN sent to 206.49.106.16, src port 49283, dst port 443

208    17:32:25.125  11/14/2008  Sev=Info/4      CM/0x4310002A
Unable to establish TCP connection on port 443 with server "206.49.106.16"

209    17:32:25.125  11/14/2008  Sev=Info/4      CM/0x4310000C
All connection attempts with backup server failed

210    17:32:25.125  11/14/2008  Sev=Info/5      CM/0x43100025
Initializing CVPNDrv

211    17:32:25.126  11/14/2008  Sev=Info/4      CM/0x4310002D
Resetting TCP connection on port 443

212    17:32:25.126  11/14/2008  Sev=Info/6      CM/0x43100030
Removed local TCP port 49283 for TCP connection.

213    17:32:25.126  11/14/2008  Sev=Info/4      CVPND/0x4340001F
Privilege Separation: restoring MTU on primary interface.

214    17:32:25.126  11/14/2008  Sev=Info/4      IKE/0x43000001
IKE received signal to terminate VPN connection

215    17:32:25.127  11/14/2008  Sev=Info/6      IPSEC/0x43700023
TCP RST sent to 206.49.106.16, src port 49283, dst port 443

216    17:32:25.127  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

217    17:32:25.127  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

218    17:32:25.127  11/14/2008  Sev=Info/4      IPSEC/0x43700014
Deleted all keys

219    17:32:25.127  11/14/2008  Sev=Info/4      IPSEC/0x4370000A
IPSec driver successfully stopped
0
Comment
Question by:marrodbe
2 Comments
 
LVL 4

Accepted Solution

by:
DJDecay earned 1000 total points
ID: 22965134
On the other end of this conversation is a mis-configured vpn concentrator or asa or two.
Could you send relevant cisco cryptomap/isakmp config lines.

It looks like you're getting bounced from .11 to .13  - .13 is denying you AUTH, bounces back to .11 bounces back to .13  - the pcf file you get is not valid on .13
0
 

Author Comment

by:marrodbe
ID: 22967779
Well, i've got that .pfc from another pc which is working fine, i didnt modify that .pfc, just imported from the cisco vpn client.. so i don't think that the .pfc is wrong..
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We could spend the next millennium discussing the differences of the Mac and Windows platforms. The next century will continue to have fanatics on both side of the equation and neither side will win the war. However, that’s not why we are here. W…
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question