Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

Authentication failure after upgrading to ver 4.7.2B

I´ve got a Cisco 3005 concentrator, using Cisco client(ver 4.0.1) & for authentication onetime pwrd (Vacman middleware). Upgraded the 3005 from version 4.1 (i think) to ver 4.7.2B.

After the upgrade my users can´t authenticate with Vacman onetime pwrd. When i test to authenticate from the concentrator it works but not from the clients, any ideas?

  • Other Security Subjects
3 REPLIES
Silver

Re: Authentication failure after upgrading to ver 4.7.2B

What error message do see on your client?

New Member

Re: Authentication failure after upgrading to ver 4.7.2B

The Cisco vpn client gives me the following log:

Cisco Systems VPN Client Version 4.7.00.0533

Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.

Client Type(s): Windows, WinNT

Running on: 5.1.2600

Config file directory: C:\Program\Cisco Systems\VPN Client

1 10:42:58.765 12/05/05 Sev=Info/4 CM/0x63100002

Begin connection process

2 10:42:59.026 12/05/05 Sev=Info/4 CVPND/0xE3400001

Microsoft IPSec Policy Agent service stopped successfully

3 10:42:59.026 12/05/05 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet

4 10:42:59.056 12/05/05 Sev=Info/4 CM/0x63100024

Attempt connection with server "xxx.xxx.xxx.xxx"

5 10:43:00.057 12/05/05 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with xxx.xxx.xxx.xxx.

6 10:43:00.468 12/05/05 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to xxx.xxx.xxx.xxx

7 10:43:00.478 12/05/05 Sev=Info/4 IPSEC/0x63700008

IPSec driver successfully started

8 10:43:00.478 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

9 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = xxx.xxx.xxx.xxx

10 10:43:00.828 12/05/05 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from xxx.xxx.xxx.xxx

11 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

12 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

13 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports DPD

14 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports NAT-T

15 10:43:00.828 12/05/05 Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads

New Member

Re: Authentication failure after upgrading to ver 4.7.2B

16 10:43:00.928 12/05/05 Sev=Info/6 IKE/0x63000001

IOS Vendor ID Contruction successful

17 10:43:00.928 12/05/05 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to xxx.xxx.xxx.xxx

18 10:43:00.928 12/05/05 Sev=Info/4 IKE/0x63000083

IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4

19 10:43:00.928 12/05/05 Sev=Info/5 IKE/0x63000072

Automatic NAT Detection Status:

Remote end is NOT behind a NAT device

This end is NOT behind a NAT device

20 10:43:00.928 12/05/05 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

21 10:43:00.948 12/05/05 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = xxx.xxx.xxx.xxx

22 10:43:00.948 12/05/05 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from xxx.xxx.xxx.xxx

23 10:43:00.948 12/05/05 Sev=Info/4 CM/0x63100015

Launch xAuth application

24 10:43:17.112 12/05/05 Sev=Info/4 CM/0x63100017

xAuth application returned

25 10:43:17.112 12/05/05 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to xxx.xxx.xxx.xxx

26 10:43:18.544 12/05/05 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = xxx.xxx.xxx.xxx

27 10:43:18.544 12/05/05 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from xxx.xxx.xxx.xxx

28 10:43:18.544 12/05/05 Sev=Info/5 IKE/0x6300003C

Received a DELETE payload for IKE SA with Cookies: I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6

29 10:43:18.544 12/05/05 Sev=Info/4 IKE/0x63000017

Marking IKE SA for deletion (I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED

30 10:43:19.285 12/05/05 Sev=Info/4 IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=8D52EC708B2D4C78 R_Cookie=3925083A1144C1A6) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED

31 10:43:19.285 12/05/05 Sev=Info/4 CM/0x63100014

Unable to establish Phase 1 SA with server "xxx.xxx.xxx.xxx" because of "PEER_DELETE-IKE_DELETE_UNSPECIFIED"

32 10:43:19.285 12/05/05 Sev=Info/5 CM/0x63100025

Initializing CVPNDrv

33 10:43:19.325 12/05/05 Sev=Info/4 IKE/0x63000001

IKE received signal to terminate VPN connection

34 10:43:19.335 12/05/05 Sev=Info/4 IKE/0x63000086

Microsoft IPSec Policy Agent service started successfully

35 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

36 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

37 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

38 10:43:19.345 12/05/05 Sev=Info/4 IPSEC/0x6370000A

IPSec driver successfully stopped

236
Views
0
Helpful
3
Replies