11-28-2005 12:13 AM - edited 02-21-2020 10:13 AM
I´ve got a Cisco 3005 concentrator, using Cisco client(ver 4.0.1) & for authentication onetime pwrd (Vacman middleware). Upgraded the 3005 from version 4.1 (i think) to ver 4.7.2B.
After the upgrade my users can´t authenticate with Vacman onetime pwrd. When i test to authenticate from the concentrator it works but not from the clients, any ideas?
12-01-2005 02:22 PM
What error message do see on your client?
12-05-2005 01:55 AM
The Cisco vpn client gives me the following log:
Cisco Systems VPN Client Version 4.7.00.0533
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600
Config file directory: C:\Program\Cisco Systems\VPN Client
1 10:42:58.765 12/05/05 Sev=Info/4 CM/0x63100002
Begin connection process
2 10:42:59.026 12/05/05 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
3 10:42:59.026 12/05/05 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
4 10:42:59.056 12/05/05 Sev=Info/4 CM/0x63100024
Attempt connection with server "xxx.xxx.xxx.xxx"
5 10:43:00.057 12/05/05 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with xxx.xxx.xxx.xxx.
6 10:43:00.468 12/05/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to xxx.xxx.xxx.xxx
7 10:43:00.478 12/05/05 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
8 10:43:00.478 12/05/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
9 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = xxx.xxx.xxx.xxx
10 10:43:00.828 12/05/05 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from xxx.xxx.xxx.xxx
11 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
12 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
13 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001
Peer supports DPD
14 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
15 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
12-05-2005 01:55 AM
16 10:43:00.928 12/05/05 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
17 10:43:00.928 12/05/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to xxx.xxx.xxx.xxx
18 10:43:00.928 12/05/05 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4
19 10:43:00.928 12/05/05 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end is NOT behind a NAT device
20 10:43:00.928 12/05/05 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
21 10:43:00.948 12/05/05 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = xxx.xxx.xxx.xxx
22 10:43:00.948 12/05/05 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from xxx.xxx.xxx.xxx
23 10:43:00.948 12/05/05 Sev=Info/4 CM/0x63100015
Launch xAuth application
24 10:43:17.112 12/05/05 Sev=Info/4 CM/0x63100017
xAuth application returned
25 10:43:17.112 12/05/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to xxx.xxx.xxx.xxx
26 10:43:18.544 12/05/05 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = xxx.xxx.xxx.xxx
27 10:43:18.544 12/05/05 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from xxx.xxx.xxx.xxx
28 10:43:18.544 12/05/05 Sev=Info/5 IKE/0x6300003C
Received a DELETE payload for IKE SA with Cookies: I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6
29 10:43:18.544 12/05/05 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
30 10:43:19.285 12/05/05 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
31 10:43:19.285 12/05/05 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "xxx.xxx.xxx.xxx" because of "PEER_DELETE-IKE_DELETE_UNSPECIFIED"
32 10:43:19.285 12/05/05 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
33 10:43:19.325 12/05/05 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
34 10:43:19.335 12/05/05 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
35 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
36 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
37 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
38 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide