cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
722
Views
0
Helpful
3
Replies

Authentication failure after upgrading to ver 4.7.2B

Engan23
Level 1
Level 1

I´ve got a Cisco 3005 concentrator, using Cisco client(ver 4.0.1) & for authentication onetime pwrd (Vacman middleware). Upgraded the 3005 from version 4.1 (i think) to ver 4.7.2B.

After the upgrade my users can´t authenticate with Vacman onetime pwrd. When i test to authenticate from the concentrator it works but not from the clients, any ideas?

3 Replies 3

ebreniz
Level 6
Level 6

What error message do see on your client?

The Cisco vpn client gives me the following log:

Cisco Systems VPN Client Version 4.7.00.0533

Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.

Client Type(s): Windows, WinNT

Running on: 5.1.2600

Config file directory: C:\Program\Cisco Systems\VPN Client

1 10:42:58.765 12/05/05 Sev=Info/4 CM/0x63100002

Begin connection process

2 10:42:59.026 12/05/05 Sev=Info/4 CVPND/0xE3400001

Microsoft IPSec Policy Agent service stopped successfully

3 10:42:59.026 12/05/05 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet

4 10:42:59.056 12/05/05 Sev=Info/4 CM/0x63100024

Attempt connection with server "xxx.xxx.xxx.xxx"

5 10:43:00.057 12/05/05 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with xxx.xxx.xxx.xxx.

6 10:43:00.468 12/05/05 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to xxx.xxx.xxx.xxx

7 10:43:00.478 12/05/05 Sev=Info/4 IPSEC/0x63700008

IPSec driver successfully started

8 10:43:00.478 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

9 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = xxx.xxx.xxx.xxx

10 10:43:00.828 12/05/05 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from xxx.xxx.xxx.xxx

11 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

12 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

13 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports DPD

14 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports NAT-T

15 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads

16 10:43:00.928 12/05/05 Sev=Info/6 IKE/0x63000001

IOS Vendor ID Contruction successful

17 10:43:00.928 12/05/05 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to xxx.xxx.xxx.xxx

18 10:43:00.928 12/05/05 Sev=Info/4 IKE/0x63000083

IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4

19 10:43:00.928 12/05/05 Sev=Info/5 IKE/0x63000072

Automatic NAT Detection Status:

Remote end is NOT behind a NAT device

This end is NOT behind a NAT device

20 10:43:00.928 12/05/05 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

21 10:43:00.948 12/05/05 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = xxx.xxx.xxx.xxx

22 10:43:00.948 12/05/05 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from xxx.xxx.xxx.xxx

23 10:43:00.948 12/05/05 Sev=Info/4 CM/0x63100015

Launch xAuth application

24 10:43:17.112 12/05/05 Sev=Info/4 CM/0x63100017

xAuth application returned

25 10:43:17.112 12/05/05 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to xxx.xxx.xxx.xxx

26 10:43:18.544 12/05/05 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = xxx.xxx.xxx.xxx

27 10:43:18.544 12/05/05 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from xxx.xxx.xxx.xxx

28 10:43:18.544 12/05/05 Sev=Info/5 IKE/0x6300003C

Received a DELETE payload for IKE SA with Cookies: I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6

29 10:43:18.544 12/05/05 Sev=Info/4 IKE/0x63000017

Marking IKE SA for deletion (I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED

30 10:43:19.285 12/05/05 Sev=Info/4 IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED

31 10:43:19.285 12/05/05 Sev=Info/4 CM/0x63100014

Unable to establish Phase 1 SA with server "xxx.xxx.xxx.xxx" because of "PEER_DELETE-IKE_DELETE_UNSPECIFIED"

32 10:43:19.285 12/05/05 Sev=Info/5 CM/0x63100025

Initializing CVPNDrv

33 10:43:19.325 12/05/05 Sev=Info/4 IKE/0x63000001

IKE received signal to terminate VPN connection

34 10:43:19.335 12/05/05 Sev=Info/4 IKE/0x63000086

Microsoft IPSec Policy Agent service started successfully

35 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

36 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

37 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

38 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x6370000A

IPSec driver successfully stopped