Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Community Member

VPN Client 3.6 with Windows XP

I am unable to connect using Cisco VPN client 3.6 on Windows XP. I have gone thry google forms and disabled ICS/Firewall . Here is the Log ... - Sunil

===========================================

1 13:46:51.179 01/23/03 Sev=Info/4 PPP/0x63200015

Establish connection with client application

2 13:46:51.209 01/23/03 Sev=Info/4 PPP/0x6320001C

Processing enumerate phone book entries command

3 13:46:51.339 01/23/03 Sev=Info/4 PPP/0x6320000D

Retrieve dial entries

4 13:46:51.349 01/23/03 Sev=Info/4 PPP/0x63200017

Terminate connection with client application

5 13:47:26.349 01/23/03 Sev=Info/6 DIALER/0x63300002

Initiating connection.

6 13:47:26.360 01/23/03 Sev=Info/4 CM/0x63100002

Begin connection process

7 13:47:26.360 01/23/03 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet

8 13:47:26.360 01/23/03 Sev=Info/4 CM/0x63100026

Attempt connection with server "167.xxx.xxx.xxx"

9 13:47:26.360 01/23/03 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with 167.xxx.xxx.xxx.

10 13:47:26.410 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID, VID, VID, VID, VID) to 167.xxx.xxx.xxx

11 13:47:26.550 01/23/03 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

12 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

13 13:47:27.621 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID, VID, VID, VID, VID) from 167.xxx.xxx.xxx

14 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 12F5F28C457168A9702D9FE274CC0100

15 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

16 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 09002689DFD6B712

17 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

18 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = AFCAD71368A1F1C96B8696FC77570100

19 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer supports DPD

20 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000

21 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000001

Peer supports IKE fragmentation payloads

22 13:47:27.621 01/23/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = 1F07F70EAA6514D3B0FA96542A500306

23 13:47:27.651 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) to 167.xxx.xxx.xxx

24 13:47:28.392 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

25 13:47:28.392 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx

26 13:47:28.392 01/23/03 Sev=Info/4 CM/0x63100015

Launch xAuth application

27 13:47:36.534 01/23/03 Sev=Info/4 CM/0x63100017

xAuth application returned

28 13:47:36.534 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

29 13:47:39.288 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

30 13:47:39.288 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx

31 13:47:39.288 01/23/03 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Phase 1 SA in the system

32 13:47:39.288 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

33 13:47:39.298 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator

34 13:47:39.298 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).

35 13:47:39.298 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

36 13:47:44.325 01/23/03 Sev=Info/4 IKE/0x63000056

Phase 2 exchange timed out (message id = 0xA88F72B8). Retry count: 1

37 13:47:44.325 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 167.xxx.xxx.xxx

38 13:47:47.300 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

39 13:47:47.300 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx

40 13:47:47.300 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

41 13:47:47.310 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator

42 13:47:47.310 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).

43 13:47:47.310 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

44 13:47:47.640 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

45 13:47:47.640 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx

46 13:47:47.640 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

47 13:47:47.660 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator

48 13:47:47.660 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).

49 13:47:47.660 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

50 13:47:48.281 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

51 13:47:48.281 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 167.xxx.xxx.xxx

52 13:47:48.281 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

53 13:47:48.301 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator

54 13:47:48.301 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).

55 13:47:48.301 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

56 13:47:48.822 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

57 13:47:48.822 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 167.xxx.xxx.xxx

58 13:47:48.822 01/23/03 Sev=Info/5 IKE/0x6300003C

Received a DELETE payload for IKE SA with Cookies = 45D56E03448AF9BBDEB713F4A159FE53

59 13:47:48.822 01/23/03 Sev=Info/5 IKE/0x63000017

Marking IKE SA for deletion (COOKIES = 45D56E03448AF9BB DEB713F4A159FE53) reason = DEL_REASON_PEER_DELETION

60 13:47:48.842 01/23/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator

61 13:47:48.842 01/23/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).

62 13:47:48.842 01/23/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 167.xxx.xxx.xxx

63 13:47:49.022 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

64 13:47:49.022 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO (NOTIFY:INVALID_COOKIE) from 167.xxx.xxx.xxx

65 13:47:49.022 01/23/03 Sev=Info/4 IKE/0x63000057

Received an ISAKMP message for a non-active SA

66 13:47:49.463 01/23/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 167.xxx.xxx.xxx

67 13:47:49.463 01/23/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO (Retransmission) from 167.xxx.xxx.xxx

68 13:47:51.586 01/23/03 Sev=Info/4 CM/0x6310000F

Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_PEER_DELETION". 0 Phase 1 SA currently in the system

69 13:47:51.586 01/23/03 Sev=Info/5 CM/0x63100029

Initializing CVPNDrv

70 13:47:51.586 01/23/03 Sev=Info/4 IPSEC/0x63700012

Delete all keys associated with peer 167.xxx.xxx.xxx

71 13:47:51.586 01/23/03 Sev=Info/4 IPSEC/0x63700012

Delete all keys associated with peer 167.xxx.xxx.xxx

72 13:47:51.586 01/23/03 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

73 13:47:51.636 01/23/03 Sev=Warning/3 DIALER/0xE3300008

GI VPNStart callback failed "CM_IKE_RECEIVED_DELETE_NOTIFICATION" (15h).

==========================================================

1 REPLY
Anonymous
N/A

Re: VPN Client 3.6 with Windows XP

Hi Sunil,

Verify that the built-in firewall in Windows XP is disabled, otherwise the VPN client would connect only to certain IP addresses.

In order to check if you have followed the right procedure to disable ICS, please refer the foll. document. http://www.cisco.com/warp/public/471/vpnclient_ics.html

Have you received any error message? It would be easier to troubleshoot using the error message. You could use the following doc to understand what the message indicates.

http://www.cisco.com/warp/public/707/ipsec_debug.html#sem

106
Views
0
Helpful
1
Replies
CreatePlease to create content