Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 543
  • Last Modified:

cisco vpn client 5.0.01.0600_peer_not_responding

Below is log file. Any ideas as to 'why' greatly appreciated. Many thanks

Cisco Systems VPN Client Version 5.0.01.0600
Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2

1      14:14:38.895  02/09/09  Sev=Info/4      CM/0x63100002
Begin connection process

2      14:14:38.895  02/09/09  Sev=Info/4      CM/0x63100004
Establish secure connection

3      14:14:38.895  02/09/09  Sev=Info/4      CM/0x63100024
Attempt connection with server "4.4.4.4"

4      14:14:38.895  02/09/09  Sev=Info/6      CM/0x6310002F
Allocated local TCP port 2695 for TCP connection.

5      14:14:38.926  02/09/09  Sev=Info/4      IPSEC/0x63700008
IPSec driver successfully started

6      14:14:38.926  02/09/09  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

7      14:14:38.926  02/09/09  Sev=Info/6      IPSEC/0x6370002C
Sent 4 packets, 0 were fragmented.

8      14:14:38.926  02/09/09  Sev=Info/6      IPSEC/0x63700020
TCP SYN sent to 4.4.4.4, src port 2695, dst port 10000

9      14:14:39.426  02/09/09  Sev=Info/6      IPSEC/0x6370001C
TCP SYN-ACK received from 4.4.4.4, src port 10000, dst port 2695

10     14:14:39.426  02/09/09  Sev=Info/6      IPSEC/0x63700021
TCP ACK sent to 4.4.4.4, src port 2695, dst port 10000

11     14:14:39.426  02/09/09  Sev=Info/4      CM/0x63100029
TCP connection established on port 10000 with server "4.4.4.4"

12     14:14:39.926  02/09/09  Sev=Info/4      CM/0x63100024
Attempt connection with server "4.4.4.4"

13     14:14:39.926  02/09/09  Sev=Info/6      IKE/0x6300003B
Attempting to establish a connection with 4.4.4.4.

14     14:14:39.926  02/09/09  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 4.4.4.4

15     14:14:44.926  02/09/09  Sev=Info/4      IKE/0x63000021
Retransmitting last packet!

16     14:14:44.926  02/09/09  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 4.4.4.4

17     14:14:49.926  02/09/09  Sev=Info/4      IKE/0x63000021
Retransmitting last packet!

18     14:14:49.926  02/09/09  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 4.4.4.4

19     14:14:54.926  02/09/09  Sev=Info/4      IKE/0x63000021
Retransmitting last packet!

20     14:14:54.926  02/09/09  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 4.4.4.4

21     14:14:59.926  02/09/09  Sev=Info/4      IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=2BDD19A785CCE2AC R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

22     14:15:00.426  02/09/09  Sev=Info/4      IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=2BDD19A785CCE2AC R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

23     14:15:00.426  02/09/09  Sev=Info/4      CM/0x63100014
Unable to establish Phase 1 SA with server "4.4.4.4" because of "DEL_REASON_PEER_NOT_RESPONDING"

24     14:15:00.426  02/09/09  Sev=Info/5      CM/0x63100025
Initializing CVPNDrv

25     14:15:00.426  02/09/09  Sev=Info/4      CM/0x6310002D
Resetting TCP connection on port 10000

26     14:15:00.426  02/09/09  Sev=Info/6      CM/0x63100030
Removed local TCP port 2695 for TCP connection.

27     14:15:00.426  02/09/09  Sev=Info/6      CM/0x63100046
Set tunnel established flag in registry to 0.

28     14:15:00.426  02/09/09  Sev=Info/4      IKE/0x63000001
IKE received signal to terminate VPN connection

29     14:15:00.426  02/09/09  Sev=Info/6      IPSEC/0x63700023
TCP RST sent to 4.4.4.4, src port 2695, dst port 10000

30     14:15:00.426  02/09/09  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

31     14:15:00.426  02/09/09  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

32     14:15:00.426  02/09/09  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

33     14:15:00.426  02/09/09  Sev=Info/4      IPSEC/0x6370000A
IPSec driver successfully stopped
0
chardavis5044
Asked:
chardavis5044
2 Solutions
 
RPPreacherCommented:
What are you connecting to?  Can you post the configuration?
0
 
chardavis5044Author Commented:
This individual is passing through a firewall and natted into a network and then vpn across that network to a vpn concentrator located at another remote site. What type of concentrator I don't know but evidently it must work if an rdp unit can reach it. Individual can rdp to another unit and establish vpn session but is located on another network. Do not know if that unit is natted as well. Guess I should try and get the ip of concentrator and see if he can at least ping interface ie. if interface will respond to a ping.
0
 
bignewfCommented:
Phase I not forming, could be preshared key not matching and NAT firewall/router as I see port 10000 tcp resets
so NAT-T (nat-traversal) could also be issue due to router/firewall

config please so we can troubleshoot


thanks
0

Featured Post

Get Certified for a Job in Cybersecurity

Want an exciting career in an emerging field? Earn your MS in Cybersecurity and get certified in ethical hacking or computer forensic investigation. WGU’s MSCSIA degree program was designed to meet the most recent U.S. Department of Homeland Security (DHS) and NSA guidelines.  

Tackle projects and never again get stuck behind a technical roadblock.
Join Now