cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
469
Views
0
Helpful
2
Replies

VPN over Cox@Home?

brnhornt
Level 1
Level 1

I have some users here at the office that at one time were able to connect but are now no longer able to connect to our concentrator using Cox@Home. I've talked with Cox and they're saying that no changes have been made on their end.

Here is the IPSec log file from one of the users having trouble....any ideas would be appreciated.

8 23:02:51.540 09/18/01 Sev=Info/6 DIALER/0x63300002

Initiating connection.

9 23:02:51.540 09/18/01 Sev=Info/4 CM/0x63100002

Begin connection process

10 23:02:51.600 09/18/01 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet

11 23:02:51.600 09/18/01 Sev=Info/4 CM/0x63100025

Attempt connection with server "209.57.186.7"

12 23:02:51.600 09/18/01 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with 209.57.186.7.

13 23:02:51.820 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID, VID, VID) to 209.57.186.7

14 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

15 23:02:52.200 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID, VID, VID, VID) from 209.57.186.7

16 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 12F5F28C457168A9702D9FE274CC0100

17 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

18 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 09002689DFD6B712

19 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x63000059

Vendor ID payload = AFCAD71368A1F1C96B8696FC77570100

20 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x63000001

Peer supports DPD

21 23:02:52.200 09/18/01 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 1F07F70EAA6514D3B0FA96542A500300

22 23:02:52.420 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) to 209.57.186.7

23 23:02:52.420 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

24 23:02:52.420 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (Retransmission) from 209.57.186.7

25 23:02:52.420 09/18/01 Sev=Info/4 IKE/0x63000021

Retransmitting last packet!

26 23:02:52.420 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(Retransmission) to 209.57.186.7

27 23:02:52.420 09/18/01 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

28 23:02:52.590 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

29 23:02:52.590 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 209.57.186.7

30 23:02:52.590 09/18/01 Sev=Info/4 CM/0x63100015

Launch xAuth application

31 23:02:52.590 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

32 23:02:52.590 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 209.57.186.7

33 23:02:52.590 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

34 23:02:52.590 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (Retransmission) from 209.57.186.7

35 23:02:52.700 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

36 23:02:52.700 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (Retransmission) from 209.57.186.7

37 23:02:52.700 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

38 23:02:52.700 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 209.57.186.7

39 23:02:52.700 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

40 23:02:52.700 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 209.57.186.7

41 23:02:59.010 09/18/01 Sev=Info/4 CM/0x63100016

xAuth application returned

42 23:02:59.010 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 209.57.186.7

43 23:02:59.400 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

44 23:02:59.400 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 209.57.186.7

45 23:02:59.400 09/18/01 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Phase 1 SA in the system

46 23:02:59.400 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 209.57.186.7

47 23:02:59.400 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 209.57.186.7

48 23:02:59.450 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

49 23:02:59.450 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 209.57.186.7

50 23:02:59.450 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 209.57.186.7

51 23:02:59.450 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 209.57.186.7

52 23:03:03.190 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

53 23:03:03.190 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ) from 209.57.186.7

54 23:03:03.190 09/18/01 Sev=Warning/3 IKE/0xA3000057

Received malformed message or negotiation no longer active (message id: 0xACC9F974)

55 23:03:03.190 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

56 23:03:03.190 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ) from 209.57.186.7

57 23:03:03.190 09/18/01 Sev=Warning/3 IKE/0xA3000057

Received malformed message or negotiation no longer active (message id: 0xACC9F974)

58 23:03:11.210 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

59 23:03:11.210 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ) from 209.57.186.7

60 23:03:11.210 09/18/01 Sev=Warning/3 IKE/0xA3000057

Received malformed message or negotiation no longer active (message id: 0xACC9F974)

61 23:03:11.210 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

62 23:03:11.210 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ) from 209.57.186.7

63 23:03:11.210 09/18/01 Sev=Warning/3 IKE/0xA3000057

Received malformed message or negotiation no longer active (message id: 0xACC9F974)

64 23:03:19.170 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

65 23:03:19.170 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ) from 209.57.186.7

66 23:03:19.170 09/18/01 Sev=Warning/3 IKE/0xA3000057

Received malformed message or negotiation no longer active (message id: 0xACC9F974)

67 23:03:19.170 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

68 23:03:19.170 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ) from 209.57.186.7

69 23:03:19.170 09/18/01 Sev=Warning/3 IKE/0xA3000057

Received malformed message or negotiation no longer active (message id: 0xACC9F974)

70 23:04:01.020 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

71 23:04:01.020 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 209.57.186.7

72 23:04:01.020 09/18/01 Sev=Info/5 IKE/0x6300003C

Received a DELETE payload for IKE SA with Cookies = E5B018A412E32851379E57F26D1FAC5D

73 23:04:01.020 09/18/01 Sev=Info/5 IKE/0x63000017

Marking IKE SA for deletion (COOKIES = E5B018A412E32851 379E57F26D1FAC5D) reason = DEL_REASON_PEER_DELETION

74 23:04:01.020 09/18/01 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 209.57.186.7

75 23:04:01.020 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

76 23:04:01.020 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 209.57.186.7

77 23:04:01.020 09/18/01 Sev=Info/4 IKE/0x63000057

Received an ISAKMP message for a non-active SA

78 23:04:01.130 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

79 23:04:01.130 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO (NOTIFY:INVALID_COOKIE) from 209.57.186.7

80 23:04:01.130 09/18/01 Sev=Info/4 IKE/0x63000057

Received an ISAKMP message for a non-active SA

81 23:04:01.130 09/18/01 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 209.57.186.7

82 23:04:01.130 09/18/01 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO (Retransmission) from 209.57.186.7

83 23:04:03.170 09/18/01 Sev=Info/4 CM/0x6310000F

Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_PEER_DELETION". 0 Phase 1 SA currently in the system

84 23:04:03.170 09/18/01 Sev=Info/5 CM/0x63100028

Initializing CVPNDrv

85 23:04:03.220 09/18/01 Sev=Warning/3 DIALER/0xE3300015

GI VPN start callback failed "CM_IKE_RECEIVED_DELETE_NOTIFICATION" (15h).

86 23:04:04.650 09/18/01 Sev=Info/4 IPSEC/0x63700012

Delete all keys associated with peer 209.57.186.7

87 23:04:04.650 09/18/01 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

2 Replies 2

bstremp
Level 2
Level 2

Try using NAT transparency mode. I bet they are blocking IP 50/51.

Thanks for a response...but we're already doing that using UDP port 10000....