Cisco Systems VPN Client Version 5.0.00.0340 Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 6.0.6000 Config file directory: C:\Program Files\Cisco Systems\VPN Client\ 1 15:40:12.736 01/02/08 Sev=Info/4 CM/0x63100002 Begin connection process 2 15:40:12.739 01/02/08 Sev=Info/4 CM/0x63100004 Establish secure connection 3 15:40:12.739 01/02/08 Sev=Info/4 CM/0x63100024 Attempt connection with server "xxxxxx.xxxxxxx.com" 4 15:40:12.745 01/02/08 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with xx.xxx.xxx.x. 5 15:40:12.754 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to xx.xxx.xxx.x 6 15:40:12.819 01/02/08 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 15:40:12.819 01/02/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 15:40:12.876 01/02/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xx.xxx.xxx.x 9 15:40:12.876 01/02/08 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, VID(Xauth), VID(dpd), VID(Unity), VID(?), KE, ID, NON, HASH) from xx.xxx.xxx.x 10 15:40:12.876 01/02/08 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 11 15:40:12.876 01/02/08 Sev=Info/5 IKE/0x63000001 Peer supports DPD 12 15:40:12.876 01/02/08 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 13 15:40:12.876 01/02/08 Sev=Info/5 IKE/0x63000082 Received IOS Vendor ID with unknown capabilities flag 0x00000025 14 15:40:12.881 01/02/08 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 15 15:40:12.881 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to xx.xxx.xxx.x 16 15:40:12.881 01/02/08 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0xC0C1, Remote Port = 0x01F4 17 15:40:12.881 01/02/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 18 15:40:12.974 01/02/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xx.xxx.xxx.x 19 15:40:12.974 01/02/08 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from xx.xxx.xxx.x 20 15:40:12.974 01/02/08 Sev=Info/5 IKE/0x63000045 RESPONDER-LIFETIME notify has value of 86400 seconds 21 15:40:12.974 01/02/08 Sev=Info/5 IKE/0x63000047 This SA has already been alive for 0 seconds, setting expiry to 86400 seconds from now 22 15:40:12.978 01/02/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xx.xxx.xxx.x 23 15:40:12.978 01/02/08 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from xx.xxx.xxx.x 24 15:40:12.978 01/02/08 Sev=Info/4 CM/0x63100015 Launch xAuth application 25 15:40:17.540 01/02/08 Sev=Info/4 CM/0x63100017 xAuth application returned 26 15:40:17.540 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to xx.xxx.xxx.x 27 15:40:22.959 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 28 15:40:22.959 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 29 15:40:43.240 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 30 15:40:43.240 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 31 15:41:03.532 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 32 15:41:03.532 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 33 15:41:23.811 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 34 15:41:23.811 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 35 15:41:44.091 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 36 15:41:44.091 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 37 15:42:04.369 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 38 15:42:04.369 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 39 15:42:24.664 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 40 15:42:24.664 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 41 15:42:44.943 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 42 15:42:44.943 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 43 15:43:05.222 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 44 15:43:05.222 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 45 15:43:25.516 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 46 15:43:25.516 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 47 15:43:45.797 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 48 15:43:45.797 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 49 15:44:06.075 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 50 15:44:06.075 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 51 15:44:26.369 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 52 15:44:26.369 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 53 15:44:46.650 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 54 15:44:46.650 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 55 15:45:06.929 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to xx.xxx.xxx.x 56 15:45:06.929 01/02/08 Sev=Info/6 IKE/0x63000053 Sent a keepalive on the IKE SA 57 15:45:13.026 01/02/08 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=5C7A8A3368F5DA76 R_Cookie=E34D6CA3161A7671) reason = DEL_REASON_CANNOT_AUTH 58 15:45:13.026 01/02/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to xx.xxx.xxx.x 59 15:45:14.040 01/02/08 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=5C7A8A3368F5DA76 R_Cookie=E34D6CA3161A7671) reason = DEL_REASON_CANNOT_AUTH 60 15:45:14.040 01/02/08 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "xxxxxx.xxxxxx.xxx" because of "DEL_REASON_CANNOT_AUTH" 61 15:45:14.040 01/02/08 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 62 15:45:14.042 01/02/08 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0. 63 15:45:14.042 01/02/08 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 64 15:45:14.541 01/02/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 65 15:45:14.541 01/02/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 66 15:45:14.541 01/02/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 67 15:45:14.541 01/02/08 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped