×

Warning message

  • Cisco Support Forums is in Read Only mode while the site is being migrated.
  • Cisco Support Forums is in Read Only mode while the site is being migrated.

VPN Client 3.6 with Windows XP

Unanswered Question
Jan 23rd, 2003
User Badges:

I am unable to connect using Cisco VPN client 3.6 on Windows XP. I have gone thry google forms and disabled ICS/Firewall . Here is the Log ... - Sunil

===========================================

1 13:46:51.179 01/23/03 Sev=Info/4 PPP/0x63200015

Establish connection with client application


2 13:46:51.209 01/23/03 Sev=Info/4 PPP/0x6320001C

Processing enumerate phone book entries command


3 13:46:51.339 01/23/03 Sev=Info/4 PPP/0x6320000D

Retrieve dial entries


4 13:46:51.349 01/23/03 Sev=Info/4 PPP/0x63200017

Terminate connection with client application


5 13:47:26.349 01/23/03 Sev=Info/6 DIALER/0x63300002

Initiating connection.


6 13:47:26.360 01/23/03 Sev=Info/4 CM/0x63100002

Begin connection process


7 13:47:26.360 01/23/03 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet


8 13:47:26.360 01/23/03 Sev=Info/4 CM/0x63100026

Attempt connection with server "167.xxx.xxx.xxx"


9 13:47:26.360 01/23/03 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with 167.xxx.xxx.xxx.


10 13:47:26.410 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID, VID, VID, VID, VID) to 167.xxx.xxx.xxx


11 13:47:26.550 01/23/03 Sev=Info/4 IPSEC/0x63700014

Deleted all keys


12 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


13 13:47:27.621 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID, VID, VID, VID, VID) from 167.xxx.xxx.xxx


14 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 12F5F28C457168A9702D9FE274CC0100


15 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer


16 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 09002689DFD6B712


17 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer supports XAUTH


18 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = AFCAD71368A1F1C96B8696FC77570100


19 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer supports DPD


20 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000


21 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads


22 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 1F07F70EAA6514D3B0FA96542A500306


23 13:47:27.651 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) to 167.xxx.xxx.xxx


24 13:47:28.392 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


25 13:47:28.392 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx


26 13:47:28.392 01/23/03 Sev=Info/4 CM/0x63100015

Launch xAuth application


27 13:47:36.534 01/23/03 Sev=Info/4 CM/0x63100017

xAuth application returned


28 13:47:36.534 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


29 13:47:39.288 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


30 13:47:39.288 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx


31 13:47:39.288 01/23/03 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Phase 1 SA in the system


32 13:47:39.288 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


33 13:47:39.298 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator


34 13:47:39.298 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).


35 13:47:39.298 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


36 13:47:44.325 01/23/03 Sev=Info/4 IKE/0x63000056

Phase 2 exchange timed out (message id = 0xA88F72B8). Retry count: 1


37 13:47:44.325 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 167.xxx.xxx.xxx


38 13:47:47.300 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


39 13:47:47.300 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx


40 13:47:47.300 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


41 13:47:47.310 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator


42 13:47:47.310 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).


43 13:47:47.310 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


44 13:47:47.640 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


45 13:47:47.640 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx


46 13:47:47.640 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


47 13:47:47.660 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator


48 13:47:47.660 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).


49 13:47:47.660 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


50 13:47:48.281 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


51 13:47:48.281 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx


52 13:47:48.281 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


53 13:47:48.301 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator


54 13:47:48.301 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).


55 13:47:48.301 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


56 13:47:48.822 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


57 13:47:48.822 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 167.xxx.xxx.xxx


58 13:47:48.822 01/23/03 Sev=Info/5 IKE/0x6300003C

Received a DELETE payload for IKE SA with Cookies = 45D56E03448AF9BBDEB713F4A159FE53


59 13:47:48.822 01/23/03 Sev=Info/5 IKE/0x63000017

Marking IKE SA for deletion (COOKIES = 45D56E03448AF9BB DEB713F4A159FE53) reason = DEL_REASON_PEER_DELETION


60 13:47:48.842 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator


61 13:47:48.842 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).


62 13:47:48.842 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx


63 13:47:49.022 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


64 13:47:49.022 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO (NOTIFY:INVALID_COOKIE) from 167.xxx.xxx.xxx


65 13:47:49.022 01/23/03 Sev=Info/4 IKE/0x63000057

Received an ISAKMP message for a non-active SA


66 13:47:49.463 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx


67 13:47:49.463 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO (Retransmission) from 167.xxx.xxx.xxx


68 13:47:51.586 01/23/03 Sev=Info/4 CM/0x6310000F

Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_PEER_DELETION". 0 Phase 1 SA currently in the system


69 13:47:51.586 01/23/03 Sev=Info/5 CM/0x63100029

Initializing CVPNDrv


70 13:47:51.586 01/23/03 Sev=Info/4 IPSEC/0x63700012

Delete all keys associated with peer 167.xxx.xxx.xxx


71 13:47:51.586 01/23/03 Sev=Info/4 IPSEC/0x63700012

Delete all keys associated with peer 167.xxx.xxx.xxx


72 13:47:51.586 01/23/03 Sev=Info/4 IPSEC/0x63700014

Deleted all keys


73 13:47:51.636 01/23/03 Sev=Warning/3 DIALER/0xE3300008

GI VPNStart callback failed "CM_IKE_RECEIVED_DELETE_NOTIFICATION" (15h).


==========================================================


  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
Anonymous (not verified) Wed, 01/29/2003 - 12:40
User Badges:

Hi Sunil,

Verify that the built-in firewall in Windows XP is disabled, otherwise the VPN client would connect only to certain IP addresses.

In order to check if you have followed the right procedure to disable ICS, please refer the foll. document. http://www.cisco.com/warp/public/471/vpnclient_ics.html

Have you received any error message? It would be easier to troubleshoot using the error message. You could use the following doc to understand what the message indicates.

http://www.cisco.com/warp/public/707/ipsec_debug.html#sem



Actions

This Discussion