Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

RAVPN Connectivity issue through ASR

Hi,

I have introduced a new ASR as well as an ISP in my network. Post actiivty we are unable to connect a few customer RAVPN. This connectiivty was working fine with old ISP with cisco 3945 router. For isolating the issue i have bypassed my firewall and tested a direct connection to my internet router however i am facing the same issue with RAVPN connectivity. We have checked the forward anf reverse trace route and confirmed the reachability.There is not access restriction from customer and this access is open over internet.

While connecting theis VPN with cisco vpn client software it will prompt for the credentials, after providing credentials the securityu negotiation is happening anf stopping at tjhis stage throwing an error " Not Connected" however the same credentials are working when i use a data card.

Packet Tracer

COGINBLRMBPB1INTF1# packet-tracer input INSIDE  udp 10.226.9.21 500 165.2.138.76 500 detailed

Phase: 1

Type: ROUTE-LOOKUP

Subtype: input

Result: ALLOW

Config:

Additional Information:

in   0.0.0.0         0.0.0.0         OUTSIDE

Phase: 2

Type: ROUTE-LOOKUP

Subtype: input

Result: ALLOW

Config:

Additional Information:

in   10.226.0.0      255.255.0.0     INSIDE

Phase: 3

Type: ACCESS-LIST

Subtype: log

Result: ALLOW

Config:

access-group inside in interface INSIDE

access-list inside extended permit ip host 10.226.9.21 any

Additional Information:

Forward Flow based lookup yields rule:

in  id=0x8e8134e0, priority=12, domain=permit, deny=false

        hits=111, user_data=0x9e7c5240, cs_id=0x0, flags=0x0, protocol=0

        src ip=10.226.9.21, mask=255.255.255.255, port=0

        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

Phase: 4

Type: IP-OPTIONS

Subtype:

Result: ALLOW

Config:

Additional Information:

Forward Flow based lookup yields rule:

in  id=0x9b8d9c20, priority=0, domain=inspect-ip-options, deny=true

        hits=15981449, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0

        src ip=0.0.0.0, mask=0.0.0.0, port=0

        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

Phase: 5

Type: FOVER

Subtype: standby-update

Result: ALLOW

Config:

Additional Information:

Forward Flow based lookup yields rule:

in  id=0x9b8dc8d8, priority=20, domain=lu, deny=false

        hits=14284592, user_data=0x0, cs_id=0x0, flags=0x0, protocol=17

        src ip=0.0.0.0, mask=0.0.0.0, port=0

        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

Phase: 6

Type: NAT

Subtype: host-limits

Result: ALLOW

Config:

static (INSIDE,DMZ) 10.226.0.0 10.226.0.0 netmask 255.255.0.0

nat-control

  match ip INSIDE 10.226.0.0 255.255.0.0 DMZ any

    static translation to 10.226.0.0

    translate_hits = 0, untranslate_hits = 373903

Additional Information:

Forward Flow based lookup yields rule:

in  id=0x53c5ca50, priority=5, domain=host, deny=false

        hits=24559939, user_data=0x53c5c408, cs_id=0x0, reverse, flags=0x0, protocol=0

        src ip=10.226.0.0, mask=255.255.0.0, port=0

        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

Phase: 7

Type: NAT

Subtype:

Result: ALLOW

Config:

nat (INSIDE) 99 10.226.9.21 255.255.255.255

nat-control

  match ip INSIDE host 10.226.9.21 OUTSIDE any

    dynamic translation to pool 99 (203.99.206.99)

    translate_hits = 1177, untranslate_hits = 17

Additional Information:

Dynamic translate 10.226.9.21/500 to 203.99.206.99/32 using netmask 255.255.255.255

Forward Flow based lookup yields rule:

in  id=0x52ea22e0, priority=1, domain=nat, deny=false

        hits=1850, user_data=0x52ea2220, cs_id=0x0, flags=0x0, protocol=0

        src ip=10.226.9.21, mask=255.255.255.255, port=0

        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

Phase: 8

Type: IP-OPTIONS

Subtype:

Result: ALLOW

Config:

Additional Information:

Reverse Flow based lookup yields rule:

in  id=0x9b8bed80, priority=0, domain=inspect-ip-options, deny=true

        hits=36179513, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0

        src ip=0.0.0.0, mask=0.0.0.0, port=0

        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

             

Phase: 9

Type: FLOW-CREATION

Subtype:

Result: ALLOW

Config:

Additional Information:

New flow created with id 73973987, packet dispatched to next module

Module information for forward flow ...

snp_fp_tracer_drop

snp_fp_inspect_ip_options

snp_fp_translate

snp_fp_adjacency

snp_fp_fragment

snp_ifc_stat

Module information for reverse flow ...

snp_fp_tracer_drop

snp_fp_inspect_ip_options

snp_fp_translate

snp_fp_adjacency

snp_fp_fragment

snp_ifc_stat

Result:

input-interface: INSIDE

input-status: up

input-line-status: up

output-interface: OUTSIDE

output-status: up

output-line-status: up

Action: allow

COGINBLRMBPB1INTF1(config)# sh capture capinside

21 packets captured

   1: 19:22:28.128716 10.226.174.64.55181 > 165.2.138.75.500:  udp 871

   2: 19:22:28.390772 165.2.138.75.500 > 10.226.174.64.55181:  udp 448

   3: 19:22:28.401285 10.226.174.64.55182 > 165.2.138.75.4500:  udp 160

   4: 19:22:28.401453 10.226.174.64.55182 > 165.2.138.75.4500:  udp 1

   5: 19:22:28.667552 165.2.138.75.4500 > 10.226.174.64.55182:  udp 88

   6: 19:22:28.668697 10.226.174.64.55182 > 165.2.138.75.4500:  udp 88

   7: 19:22:29.353802 10.226.174.64.55184 > 165.2.138.76.500:  udp 871

   8: 19:22:29.615263 165.2.138.76.500 > 10.226.174.64.55184:  udp 448

   9: 19:22:29.625684 10.226.174.64.55185 > 165.2.138.76.4500:  udp 160

  10: 19:22:29.625837 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  11: 19:22:29.891769 165.2.138.76.4500 > 10.226.174.64.55185:  udp 72

  12: 19:22:39.976923 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  13: 19:22:42.373088 10.226.174.64.55185 > 165.2.138.76.4500:  udp 96

  14: 19:22:45.835299 165.2.138.76.4500 > 10.226.174.64.55185:  udp 64

  15: 19:22:45.836336 10.226.174.64.55185 > 165.2.138.76.4500:  udp 64

  16: 19:22:45.851854 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  17: 19:22:50.128426 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  18: 19:22:51.142997 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  19: 19:22:56.212131 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  20: 19:23:00.269593 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  21: 19:23:01.282562 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

21 packets shown

COGINBLRMBPB1INTF1(config)# sh capture capoutside

23 packets captured

   1: 19:22:28.128731 10.226.174.64.55181 > 165.2.138.75.500:  udp 871

   2: 19:22:28.390787 165.2.138.75.500 > 10.226.174.64.55181:  udp 448

   3: 19:22:28.401285 10.226.174.64.55182 > 165.2.138.75.4500:  udp 160

   4: 19:22:28.401468 10.226.174.64.55182 > 165.2.138.75.4500:  udp 1

   5: 19:22:28.667552 165.2.138.75.4500 > 10.226.174.64.55182:  udp 88

   6: 19:22:28.668697 10.226.174.64.55182 > 165.2.138.75.4500:  udp 88

   7: 19:22:29.353802 10.226.174.64.55184 > 165.2.138.76.500:  udp 871

   8: 19:22:29.615263 165.2.138.76.500 > 10.226.174.64.55184:  udp 448

   9: 19:22:29.625684 10.226.174.64.55185 > 165.2.138.76.4500:  udp 160

  10: 19:22:29.625837 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  11: 19:22:29.891769 165.2.138.76.4500 > 10.226.174.64.55185:  udp 72

  12: 19:22:39.976939 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  13: 19:22:42.373088 10.226.174.64.55185 > 165.2.138.76.4500:  udp 96

  14: 19:22:45.835299 165.2.138.76.4500 > 10.226.174.64.55185:  udp 64

  15: 19:22:45.836336 10.226.174.64.55185 > 165.2.138.76.4500:  udp 64

  16: 19:22:45.851854 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  17: 19:22:50.128426 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  18: 19:22:51.142997 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  19: 19:22:56.212131 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  20: 19:23:00.269593 10.226.174.64.55185 > 165.2.138.76.4500:  udp 1

  21: 19:23:01.282562 10.226.174.64.55185 > 165.2.138.76.4500:  udp 176

  22: 19:23:06.353100 10.226.174.64.55185 > 165.2.138.76.4500:  udp 88

  23: 19:23:06.353695 10.226.174.64.55185 > 165.2.138.76.4500:  udp 88

23 packets shown

Logs

isco Systems VPN Client Version 5.0.00.0340

Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.

Client Type(s): Windows, WinNT

Running on: 6.1.7601 Service Pack 1

Config file directory: C:\Program Files\Cisco Systems\VPN Client\

1      21:51:08.093  08/21/13  Sev=Info/6  CERT/0x63600025

Attempting to find a Certificate using Serial Hash.

2      21:51:08.093  08/21/13  Sev=Info/6  CERT/0x63600026

Found a Certificate using Serial Hash.

3      21:51:08.103  08/21/13  Sev=Info/6  GUI/0x63B00011

Reloaded the Certificates in all Certificate Stores successfully.

4      21:51:13.797  08/21/13  Sev=Info/4  CM/0x63100002

Begin connection process

5      21:51:13.997  08/21/13  Sev=Info/4  CM/0x63100004

Establish secure connection

6      21:51:13.997  08/21/13  Sev=Info/4  CM/0x63100024

Attempt connection with server "ihgvpn.ihg.com"

7      21:51:14.149  08/21/13  Sev=Info/6  IKE/0x6300003B

Attempting to establish a connection with 165.2.138.75.

8      21:51:14.558  08/21/13  Sev=Info/4  IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.75

9      21:51:14.558  08/21/13  Sev=Info/4  IPSEC/0x63700008

IPSec driver successfully started

10     21:51:14.558  08/21/13  Sev=Info/4 IPSEC/0x63700014

Deleted all keys

11     21:51:14.558  08/21/13  Sev=Info/4 IPSEC/0x6370000D

Key(s) deleted by Interface (10.226.174.64)

12     21:51:14.808  08/21/13  Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

13     21:51:14.808  08/21/13  Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.75

14     21:51:14.808  08/21/13  Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

15     21:51:14.808  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

16     21:51:14.808  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports DPD

17     21:51:14.818  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports NAT-T

18     21:51:14.818  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads

19     21:51:14.818  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports DWR Code and DWR Text

20     21:51:14.818  08/21/13  Sev=Info/6 IKE/0x63000001

IOS Vendor ID Contruction successful

21     21:51:14.818  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.75

22     21:51:14.818  08/21/13  Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

23     21:51:14.818  08/21/13  Sev=Info/4 IKE/0x63000083

IKE Port in use - Local Port =  0xE2FF, Remote Port = 0x1194

24     21:51:14.818  08/21/13  Sev=Info/5 IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

25     21:51:14.888  08/21/13  Sev=Info/4 CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

26     21:51:15.058  08/21/13  Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

27     21:51:15.058  08/21/13  Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 165.2.138.75

28     21:51:15.058  08/21/13  Sev=Info/4 CM/0x6310001B

Received alternative server address "165.2.138.77" from primary server

29     21:51:15.068  08/21/13  Sev=Info/4 IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=9C5ABF33619C3DC0 R_Cookie=E6748AAC49256A96) reason = DEL_REASON_LOAD_BALANCING

30     21:51:15.068  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.75

31     21:51:16.066  08/21/13  Sev=Info/4 IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=9C5ABF33619C3DC0 R_Cookie=E6748AAC49256A96) reason = DEL_REASON_LOAD_BALANCING

32     21:51:16.066  08/21/13  Sev=Info/4 CM/0x63100014

Unable to establish Phase 1 SA with server "ihgvpn.ihg.com" because of "DEL_REASON_LOAD_BALANCING"

33     21:51:16.066  08/21/13  Sev=Info/4 CM/0x63100010

Try alternative server "165.2.138.77" given by the primary server

34     21:51:16.066  08/21/13  Sev=Info/4 CM/0x63100024

Attempt connection with server "165.2.138.77"

35     21:51:16.066  08/21/13  Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with 165.2.138.77.

36     21:51:16.316  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.77

37     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

38     21:51:16.566  08/21/13  Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.77

39     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

40     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

41     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports DPD

42     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports NAT-T

43     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads

44     21:51:16.566  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports DWR Code and DWR Text

45     21:51:16.576  08/21/13  Sev=Info/6 IKE/0x63000001

IOS Vendor ID Contruction successful

46     21:51:16.576  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.77

47     21:51:16.576  08/21/13  Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

48     21:51:16.576  08/21/13  Sev=Info/4 IKE/0x63000083

IKE Port in use - Local Port =  0xE302, Remote Port = 0x1194

49     21:51:16.576  08/21/13  Sev=Info/5 IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

50     21:51:16.576  08/21/13  Sev=Info/4 CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

51     21:51:16.815  08/21/13  Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

52     21:51:16.815  08/21/13  Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.77

53     21:51:16.815  08/21/13  Sev=Info/4 CM/0x63100015

Launch xAuth application

54     21:51:26.715  08/21/13  Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

55     21:51:31.798  08/21/13  Sev=Info/4 CM/0x63100017

xAuth application returned

56     21:51:31.798  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.77

57     21:51:34.055  08/21/13  Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

58     21:51:34.055  08/21/13  Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.77

59     21:51:34.055  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.77

60     21:51:34.055  08/21/13  Sev=Info/4 CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

61     21:51:34.085  08/21/13  Sev=Info/5 IKE/0x6300005E

Client sending a firewall request to concentrator

62     21:51:34.085  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.77

63     21:51:36.914  08/21/13  Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

64     21:51:39.450  08/21/13  Sev=Info/4 IKE/0x63000021

Retransmitting last packet!

65     21:51:39.450  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 165.2.138.77

66     21:51:44.519  08/21/13  Sev=Info/4 IKE/0x63000021

Retransmitting last packet!

67     21:51:44.519  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 165.2.138.77

68     21:51:47.044  08/21/13  Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

69     21:51:49.731  08/21/13  Sev=Info/4 IKE/0x63000021

Retransmitting last packet!

70     21:51:49.731  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 165.2.138.77

71     21:51:54.827  08/21/13  Sev=Info/4 IKE/0x6300002D

Phase-2 retransmission count exceeded: MsgID=B65556F6

72     21:51:54.827  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 165.2.138.77

73     21:51:54.827  08/21/13  Sev=Info/6 IKE/0x6300003D

Sending DPD request to 165.2.138.77, our seq# = 625294116

74     21:51:54.827  08/21/13  Sev=Info/4 IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=D82A4B8D0AE3DB4C R_Cookie=E71B85E64DC3760E) reason = DEL_REASON_IKE_NEG_FAILED

75     21:51:54.827  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.77

76     21:51:57.883  08/21/13  Sev=Info/4 IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=D82A4B8D0AE3DB4C R_Cookie=E71B85E64DC3760E) reason = DEL_REASON_IKE_NEG_FAILED

77     21:51:57.883  08/21/13  Sev=Info/4 CM/0x6310000F

Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED".  0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

78     21:51:57.883  08/21/13  Sev=Info/4 CM/0x6310000C

All connection attempts with backup server failed

79     21:51:57.883  08/21/13  Sev=Info/5 CM/0x63100025

Initializing CVPNDrv

80     21:51:57.883  08/21/13  Sev=Info/6 CM/0x63100046

Set tunnel established flag in registry to 0.

81     21:51:57.883  08/21/13  Sev=Info/4 IKE/0x63000001

IKE received signal to terminate VPN connection

82     21:51:57.883  08/21/13  Sev=Info/4 IPSEC/0x63700014

Deleted all keys

83     21:51:57.883  08/21/13  Sev=Info/4 IPSEC/0x63700014

Deleted all keys

84     21:51:57.883  08/21/13  Sev=Info/4 IPSEC/0x63700014

Deleted all keys

85     21:51:57.883  08/21/13  Sev=Info/4 IPSEC/0x6370000A

IPSec driver successfully stopped

86     22:01:13.769  08/21/13  Sev=Info/4 CM/0x63100002

Begin connection process

87     22:01:13.829  08/21/13  Sev=Info/4 CM/0x63100004

Establish secure connection

88     22:01:13.829  08/21/13  Sev=Info/4 CM/0x63100024

Attempt connection with server "165.2.138.76"

89     22:01:13.849  08/21/13  Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with 165.2.138.76.

90     22:01:13.869  08/21/13  Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.76

91     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.76

92     22:01:14.129  08/21/13  Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.76

93     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

94     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

95     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports DPD

96     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports NAT-T

97     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads

98     22:01:14.129  08/21/13  Sev=Info/5 IKE/0x63000001

Peer supports DWR Code and DWR Text

99     22:01:14.139  08/21/13  Sev=Info/6 IKE/0x63000001

IOS Vendor ID Contruction successful

100    22:01:14.139  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.76

101    22:01:14.139  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

102    22:01:14.139  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xC1DB, Remote Port = 0x1194

103    22:01:14.139  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

104    22:01:14.139  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

105    22:01:14.249  08/21/13  Sev=Info/4               IPSEC/0x63700008

IPSec driver successfully started

106    22:01:14.249  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

107    22:01:14.389  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.76

108    22:01:14.389  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.76

109    22:01:14.389  08/21/13  Sev=Info/4               CM/0x63100015

Launch xAuth application

110    22:01:24.488  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

111    22:01:34.666  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

112    22:01:41.145  08/21/13  Sev=Info/4               CM/0x63100017

xAuth application returned

113    22:01:41.145  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.76

114    22:01:43.425  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.76

115    22:01:43.425  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.76

116    22:01:43.425  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.76

117    22:01:43.425  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

118    22:01:43.445  08/21/13  Sev=Info/5               IKE/0x6300005E

Client sending a firewall request to concentrator

119    22:01:43.445  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.76

120    22:01:44.805  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

121    22:01:48.874  08/21/13  Sev=Info/4               IKE/0x63000021

Retransmitting last packet!

122    22:01:48.874  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 165.2.138.76

123    22:01:53.933  08/21/13  Sev=Info/4               IKE/0x63000021

Retransmitting last packet!

124    22:01:53.933  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 165.2.138.76

125    22:01:54.953  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

126    22:01:59.052  08/21/13  Sev=Info/4               IKE/0x63000021

Retransmitting last packet!

127    22:01:59.052  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 165.2.138.76

128    22:02:04.122  08/21/13  Sev=Info/4               IKE/0x6300002D

Phase-2 retransmission count exceeded: MsgID=AD3A35C4

129    22:02:04.122  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 165.2.138.76

130    22:02:04.122  08/21/13  Sev=Info/6               IKE/0x6300003D

Sending DPD request to 165.2.138.76, our seq# = 1747237174

131    22:02:04.122  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=2A1D2C03664EE3AC R_Cookie=ED9D78145C87F192) reason = DEL_REASON_IKE_NEG_FAILED

132    22:02:04.122  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.76

133    22:02:07.161  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=2A1D2C03664EE3AC R_Cookie=ED9D78145C87F192) reason = DEL_REASON_IKE_NEG_FAILED

134    22:02:07.161  08/21/13  Sev=Info/4               CM/0x6310000F

Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED".  0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

135    22:02:07.161  08/21/13  Sev=Info/5               CM/0x63100025

Initializing CVPNDrv

136    22:02:07.211  08/21/13  Sev=Info/6               CM/0x63100046

Set tunnel established flag in registry to 0.

137    22:02:07.211  08/21/13  Sev=Info/4               IKE/0x63000001

IKE received signal to terminate VPN connection

138    22:02:07.661  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

139    22:02:07.661  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

140    22:02:07.661  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

141    22:02:07.661  08/21/13  Sev=Info/4               IPSEC/0x6370000A

IPSec driver successfully stopped

142    22:05:29.019  08/21/13  Sev=Info/4               PPP/0x63200015

Processing enumerate phone book entries command

143    22:05:29.029  08/21/13  Sev=Info/4               PPP/0x6320000D

Retrieved 1 dial entries

144    22:13:29.345  08/21/13  Sev=Info/4               CM/0x63100002

Begin connection process

145    22:13:29.385  08/21/13  Sev=Info/4               CM/0x63100004

Establish secure connection

146    22:13:29.385  08/21/13  Sev=Info/4               CM/0x63100024

Attempt connection with server "ihgvpn.ihg.com"

147    22:13:29.545  08/21/13  Sev=Info/6               IKE/0x6300003B

Attempting to establish a connection with 165.2.138.75.

148    22:13:29.575  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.75

149    22:13:29.675  08/21/13  Sev=Info/4               IPSEC/0x63700008

IPSec driver successfully started

150    22:13:29.675  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

151    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

152    22:13:29.825  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.75

153    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x63000001

Peer is a Cisco-Unity compliant peer

154    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports XAUTH

155    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DPD

156    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports NAT-T

157    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports IKE fragmentation payloads

158    22:13:29.825  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DWR Code and DWR Text

159    22:13:29.835  08/21/13  Sev=Info/6               IKE/0x63000001

IOS Vendor ID Contruction successful

160    22:13:29.835  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.75

161    22:13:29.845  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

162    22:13:29.845  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xDAE2, Remote Port = 0x1194

163    22:13:29.845  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

164    22:13:29.845  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

165    22:13:30.085  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

166    22:13:30.085  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 165.2.138.75

167    22:13:30.085  08/21/13  Sev=Info/4               CM/0x6310001B

Received alternative server address "165.2.138.77" from primary server

168    22:13:30.085  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=FEBCD71A4568C80A R_Cookie=9848570799C15106) reason = DEL_REASON_LOAD_BALANCING

169    22:13:30.085  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.75

170    22:13:30.695  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=FEBCD71A4568C80A R_Cookie=9848570799C15106) reason = DEL_REASON_LOAD_BALANCING

171    22:13:30.695  08/21/13  Sev=Info/4               CM/0x63100014

Unable to establish Phase 1 SA with server "ihgvpn.ihg.com" because of "DEL_REASON_LOAD_BALANCING"

172    22:13:30.695  08/21/13  Sev=Info/4               CM/0x63100010

Try alternative server "165.2.138.77" given by the primary server

173    22:13:30.695  08/21/13  Sev=Info/4               CM/0x63100024

Attempt connection with server "165.2.138.77"

174    22:13:30.695  08/21/13  Sev=Info/6               IKE/0x6300003B

Attempting to establish a connection with 165.2.138.77.

175    22:13:30.715  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.77

176    22:13:30.965  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

177    22:13:30.965  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.77

178    22:13:30.995  08/21/13  Sev=Info/5               IKE/0x63000001

Peer is a Cisco-Unity compliant peer

179    22:13:30.995  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports XAUTH

180    22:13:30.995  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DPD

181    22:13:30.995  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports NAT-T

182    22:13:30.995  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports IKE fragmentation payloads

183    22:13:30.995  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DWR Code and DWR Text

184    22:13:31.005  08/21/13  Sev=Info/6               IKE/0x63000001

IOS Vendor ID Contruction successful

185    22:13:31.005  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.77

186    22:13:31.005  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

187    22:13:31.005  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xDAE5, Remote Port = 0x1194

188    22:13:31.005  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

189    22:13:31.005  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

190    22:13:31.255  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

191    22:13:31.255  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.77

192    22:13:31.255  08/21/13  Sev=Info/4               CM/0x63100015

Launch xAuth application

193    22:13:33.015  08/21/13  Sev=Info/4               CM/0x63100017

xAuth application returned

194    22:13:33.015  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.77

195    22:13:33.015  08/21/13  Sev=Info/4               CM/0x63100018

User does not provide any authentication data

196    22:13:33.015  08/21/13  Sev=Info/4               IKE/0x63000001

IKE received signal to terminate VPN connection

197    22:13:33.015  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=6857263F5BACEAA8 R_Cookie=1175A58126B6501D) reason = DEL_REASON_RESET_SADB

198    22:13:33.015  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.77

199    22:13:33.015  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=6857263F5BACEAA8 R_Cookie=1175A58126B6501D) reason = DEL_REASON_RESET_SADB

200    22:13:33.015  08/21/13  Sev=Info/5               CM/0x63100025

Initializing CVPNDrv

201    22:13:33.025  08/21/13  Sev=Info/6               CM/0x63100046

Set tunnel established flag in registry to 0.

202    22:13:33.235  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

203    22:13:33.235  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

204    22:13:33.235  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

205    22:13:33.235  08/21/13  Sev=Info/4               IPSEC/0x6370000A

IPSec driver successfully stopped

206    22:13:34.635  08/21/13  Sev=Info/4               CM/0x63100002

Begin connection process

207    22:13:34.655  08/21/13  Sev=Info/4               CM/0x63100004

Establish secure connection

208    22:13:34.655  08/21/13  Sev=Info/4               CM/0x63100024

Attempt connection with server "ihgvpn.ihg.com"

209    22:13:34.655  08/21/13  Sev=Info/6               IKE/0x6300003B

Attempting to establish a connection with 165.2.138.75.

210    22:13:34.675  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.75

211    22:13:34.745  08/21/13  Sev=Info/4               IPSEC/0x63700008

IPSec driver successfully started

212    22:13:34.745  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

213    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

214    22:13:34.935  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.75

215    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000001

Peer is a Cisco-Unity compliant peer

216    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports XAUTH

217    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DPD

218    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports NAT-T

219    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports IKE fragmentation payloads

220    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DWR Code and DWR Text

221    22:13:34.935  08/21/13  Sev=Info/6               IKE/0x63000001

IOS Vendor ID Contruction successful

222    22:13:34.935  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.75

223    22:13:34.935  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

224    22:13:34.935  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xDAE8, Remote Port = 0x1194

225    22:13:34.935  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

226    22:13:34.935  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

227    22:13:35.175  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

228    22:13:35.175  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 165.2.138.75

229    22:13:35.175  08/21/13  Sev=Info/4               CM/0x6310001B

Received alternative server address "165.2.138.77" from primary server

230    22:13:35.175  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=21088E1193F33444 R_Cookie=FA5CD3B5FD01EF35) reason = DEL_REASON_LOAD_BALANCING

231    22:13:35.175  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.75

232    22:13:35.755  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=21088E1193F33444 R_Cookie=FA5CD3B5FD01EF35) reason = DEL_REASON_LOAD_BALANCING

233    22:13:35.755  08/21/13  Sev=Info/4               CM/0x63100014

Unable to establish Phase 1 SA with server "ihgvpn.ihg.com" because of "DEL_REASON_LOAD_BALANCING"

234    22:13:35.755  08/21/13  Sev=Info/4               CM/0x63100010

Try alternative server "165.2.138.77" given by the primary server

235    22:13:35.755  08/21/13  Sev=Info/4               CM/0x63100024

Attempt connection with server "165.2.138.77"

236    22:13:35.755  08/21/13  Sev=Info/6               IKE/0x6300003B

Attempting to establish a connection with 165.2.138.77.

237    22:13:35.775  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.77

238    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

239    22:13:36.015  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.77

240    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x63000001

Peer is a Cisco-Unity compliant peer

241    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports XAUTH

242    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DPD

243    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports NAT-T

244    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports IKE fragmentation payloads

245    22:13:36.015  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DWR Code and DWR Text

246    22:13:36.025  08/21/13  Sev=Info/6               IKE/0x63000001

IOS Vendor ID Contruction successful

247    22:13:36.025  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.77

248    22:13:36.025  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

249    22:13:36.025  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xDAEB, Remote Port = 0x1194

250    22:13:36.025  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

251    22:13:36.025  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

252    22:13:36.275  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

253    22:13:36.275  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.77

254    22:13:36.275  08/21/13  Sev=Info/4               CM/0x63100015

Launch xAuth application

255    22:13:46.465  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

256    22:13:49.865  08/21/13  Sev=Info/4               CM/0x63100017

xAuth application returned

257    22:13:49.865  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.77

258    22:13:49.865  08/21/13  Sev=Info/4               CM/0x63100018

User does not provide any authentication data

259    22:13:49.865  08/21/13  Sev=Info/4               IKE/0x63000001

IKE received signal to terminate VPN connection

260    22:13:49.865  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=DFAAD9AF41FE9FD6 R_Cookie=7F4F98E882EC7309) reason = DEL_REASON_RESET_SADB

261    22:13:49.865  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.77

262    22:13:49.865  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=DFAAD9AF41FE9FD6 R_Cookie=7F4F98E882EC7309) reason = DEL_REASON_RESET_SADB

263    22:13:49.865  08/21/13  Sev=Info/5               CM/0x63100025

Initializing CVPNDrv

264    22:13:49.875  08/21/13  Sev=Info/6               CM/0x63100046

Set tunnel established flag in registry to 0.

265    22:13:50.005  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

266    22:13:50.005  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

267    22:13:50.005  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

268    22:13:50.005  08/21/13  Sev=Info/4               IPSEC/0x6370000A

IPSec driver successfully stopped

269    22:31:36.291  08/21/13  Sev=Info/4               CM/0x63100002

Begin connection process

270    22:31:36.951  08/21/13  Sev=Info/4               CM/0x63100004

Establish secure connection

271    22:31:36.951  08/21/13  Sev=Info/4               CM/0x63100024

Attempt connection with server "ihgvpn.ihg.com"

272    22:31:37.321  08/21/13  Sev=Info/6               IKE/0x6300003B

Attempting to establish a connection with 165.2.138.75.

273    22:31:37.341  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.75

274    22:31:37.341  08/21/13  Sev=Info/4               IPSEC/0x63700008

IPSec driver successfully started

275    22:31:37.341  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

276    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

277    22:31:37.591  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.75

278    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x63000001

Peer is a Cisco-Unity compliant peer

279    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports XAUTH

280    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DPD

281    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports NAT-T

282    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports IKE fragmentation payloads

283    22:31:37.591  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DWR Code and DWR Text

284    22:31:37.601  08/21/13  Sev=Info/6               IKE/0x63000001

IOS Vendor ID Contruction successful

285    22:31:37.601  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.75

286    22:31:37.601  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

287    22:31:37.601  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xC705, Remote Port = 0x1194

288    22:31:37.601  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

289    22:31:37.601  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

290    22:31:37.851  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.75

291    22:31:37.851  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 165.2.138.75

292    22:31:37.851  08/21/13  Sev=Info/4               CM/0x6310001B

Received alternative server address "165.2.138.77" from primary server

293    22:31:37.851  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=20362EA202221F2A R_Cookie=1D53C01FE0F035F1) reason = DEL_REASON_LOAD_BALANCING

294    22:31:37.851  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.75

295    22:31:38.671  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=20362EA202221F2A R_Cookie=1D53C01FE0F035F1) reason = DEL_REASON_LOAD_BALANCING

296    22:31:38.671  08/21/13  Sev=Info/4               CM/0x63100014

Unable to establish Phase 1 SA with server "ihgvpn.ihg.com" because of "DEL_REASON_LOAD_BALANCING"

297    22:31:38.671  08/21/13  Sev=Info/4               CM/0x63100010

Try alternative server "165.2.138.77" given by the primary server

298    22:31:38.671  08/21/13  Sev=Info/4               CM/0x63100024

Attempt connection with server "165.2.138.77"

299    22:31:38.671  08/21/13  Sev=Info/6               IKE/0x6300003B

Attempting to establish a connection with 165.2.138.77.

300    22:31:38.691  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 165.2.138.77

301    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

302    22:31:38.941  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 165.2.138.77

303    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x63000001

Peer is a Cisco-Unity compliant peer

304    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports XAUTH

305    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DPD

306    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports NAT-T

307    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports IKE fragmentation payloads

308    22:31:38.941  08/21/13  Sev=Info/5               IKE/0x63000001

Peer supports DWR Code and DWR Text

309    22:31:38.951  08/21/13  Sev=Info/6               IKE/0x63000001

IOS Vendor ID Contruction successful

310    22:31:38.951  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 165.2.138.77

311    22:31:38.951  08/21/13  Sev=Info/6               IKE/0x63000055

Sent a keepalive on the IPSec SA

312    22:31:38.951  08/21/13  Sev=Info/4               IKE/0x63000083

IKE Port in use - Local Port =  0xC708, Remote Port = 0x1194

313    22:31:38.951  08/21/13  Sev=Info/5               IKE/0x63000072

Automatic NAT Detection Status:

   Remote end is NOT behind a NAT device

   This   end IS behind a NAT device

314    22:31:38.951  08/21/13  Sev=Info/4               CM/0x6310000E

Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

315    22:31:39.201  08/21/13  Sev=Info/5               IKE/0x6300002F

Received ISAKMP packet: peer = 165.2.138.77

316    22:31:39.201  08/21/13  Sev=Info/4               IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 165.2.138.77

317    22:31:39.201  08/21/13  Sev=Info/4               CM/0x63100015

Launch xAuth application

318    22:31:40.381  08/21/13  Sev=Info/4               CM/0x63100017

xAuth application returned

319    22:31:40.381  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 165.2.138.77

320    22:31:40.381  08/21/13  Sev=Info/4               CM/0x63100018

User does not provide any authentication data

321    22:31:40.381  08/21/13  Sev=Info/4               IKE/0x63000001

IKE received signal to terminate VPN connection

322    22:31:40.381  08/21/13  Sev=Info/4               IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=51D221E08BE90CB5 R_Cookie=06B2572995AB291A) reason = DEL_REASON_RESET_SADB

323    22:31:40.381  08/21/13  Sev=Info/4               IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 165.2.138.77

324    22:31:40.381  08/21/13  Sev=Info/4               IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=51D221E08BE90CB5 R_Cookie=06B2572995AB291A) reason = DEL_REASON_RESET_SADB

325    22:31:40.381  08/21/13  Sev=Info/5               CM/0x63100025

Initializing CVPNDrv

326    22:31:40.381  08/21/13  Sev=Info/6               CM/0x63100046

Set tunnel established flag in registry to 0.

327    22:31:40.691  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

328    22:31:40.691  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

329    22:31:40.691  08/21/13  Sev=Info/4               IPSEC/0x63700014

Deleted all keys

330    22:31:40.691  08/21/13  Sev=Info/4               IPSEC/0x6370000A

IPSec driver successfully stopped

194
Views
0
Helpful
0
Replies
CreatePlease login to create content