11-20-2003 06:47 AM - edited 02-21-2020 12:53 PM
All of the sudden my VPN connection is working. I have a PIX 515 using Cisco's VPN client 3.6.3(B). Currently using Cisco PIX Firewall Version 6.2(2).
I am able to authenticate (RADIUS) and connect to my internal network. IPCONFIG shows the internal DNS server was received. The status of the VPN connection shows that an internal network IP address was assigned by the PIX (ip local pool). The problem is once connected I can't ping anything. So basically I'm stuck at layer 3!
Nothing has changed on the PIX. My linksys router is basic configuration (let all return traffic in by default). I'm using windows XP Pro with ICS off.
Very strange why this just stopped.
Below is a capture taken with the VPN Client. Public addresses and some hashes have been changed for my protection. If it displays in an unreadable format let me know and I can email it direct.
Thanks in advance
1 20:27:39.929 11/19/03 Sev=Info/4 CM/0x63100002
Begin connection process
2 20:27:40.660 11/19/03 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
3 20:27:40.660 11/19/03 Sev=Info/4 CM/0x63100024
Attempt connection with server "216.239.41.99"
4 20:27:40.670 11/19/03 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 216.239.41.99.
5 20:27:40.780 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID, VID, VID) to 216.239.41.99
6 20:27:40.780 11/19/03 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
7 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
8 20:27:40.981 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID, VID, VID, KE, ID, NON, HASH) from 216.239.41.99
9 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000059
Vendor ID payload = abcbebebtbaafere
10 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
11 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000059
Vendor ID payload = abcbebebtbaafere
12 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000001
Peer supports DPD
13 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000059
Vendor ID payload = abcbebebtbaafere
14 20:27:41.001 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) to 216.239.41.99
15 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
16 20:27:41.081 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 216.239.41.99
17 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x63000044
RESPONDER-LIFETIME notify has value of 3600 seconds
18 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x63000046
This SA has already been alive for 1 seconds, setting expiry to 3599 seconds from now
19 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
20 20:27:41.081 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 216.239.41.99
21 20:27:41.081 11/19/03 Sev=Info/4 CM/0x63100015
Launch xAuth application
22 20:27:45.157 11/19/03 Sev=Info/4 CM/0x63100017
xAuth application returned
23 20:27:45.157 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 216.239.41.99
24 20:27:45.267 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
25 20:27:45.267 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 216.239.41.99
26 20:27:45.267 11/19/03 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Phase 1 SA in the system
27 20:27:45.277 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 216.239.41.99
28 20:27:45.357 11/19/03 Sev=Info/5 IKE/0x6300005D
Client sending a firewall request to concentrator
29 20:27:45.357 11/19/03 Sev=Info/5 IKE/0x6300005C
Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).
30 20:27:45.357 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 216.239.41.99
31 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
32 20:27:45.447 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 216.239.41.99
33 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 172.16.15.1
34 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 172.16.15.254
35 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = google.com
36 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000001
37 20:27:45.447 11/19/03 Sev=Info/4 CM/0x63100019
Mode Config data received
38 20:27:45.457 11/19/03 Sev=Info/5 IKE/0x63000055
Received a key request from Driver for IP address 216.239.41.99, GW IP = 216.239.41.99
39 20:27:45.467 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 216.239.41.99
40 20:27:45.467 11/19/03 Sev=Info/5 IKE/0x63000055
Received a key request from Driver for IP address 10.10.10.255, GW IP = 216.239.41.99
41 20:27:45.487 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 216.239.41.99
42 20:27:45.787 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
43 20:27:45.787 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 216.239.41.99
44 20:27:45.787 11/19/03 Sev=Info/5 IKE/0x63000044
RESPONDER-LIFETIME notify has value of 28800 seconds
45 20:27:45.787 11/19/03 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 4608000 kb
46 20:27:45.787 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 216.239.41.99
47 20:27:45.807 11/19/03 Sev=Info/5 IKE/0x63000058
Loading IPsec SA (Message ID = 0xF00F6D01 OUTBOUND SPI = 0xD0CC69AA INBOUND SPI = 0x52EF5491)
48 20:27:45.807 11/19/03 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0xD0CC69AA
49 20:27:45.807 11/19/03 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0x52EF5491
50 20:27:45.807 11/19/03 Sev=Info/4 CM/0x6310001A
One secure connection established
51 20:27:45.848 11/19/03 Sev=Info/6 DIALER/0x63300003
Connection established.
52 20:27:45.858 11/19/03 Sev=Info/6 CVPND/0x63400011
Found matching adapter
53 20:27:45.898 11/19/03 Sev=Info/4 CM/0x63100037
Address watch added for 192.168.1.3. Current addresses are 192.168.1.3.
54 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
55 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
56 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0xaa69ccd0 into key list
57 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
58 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x9154ef52 into key list
59 20:27:46.168 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
60 20:27:46.168 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 216.239.41.99
61 20:27:46.168 11/19/03 Sev=Info/5 IKE/0x63000044
RESPONDER-LIFETIME notify has value of 28800 seconds
62 20:27:46.168 11/19/03 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 4608000 kb
63 20:27:46.168 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 216.239.41.99
64 20:27:46.188 11/19/03 Sev=Info/5 IKE/0x63000058
Loading IPsec SA (Message ID = 0xAB2B7EDF OUTBOUND SPI = 0xCEC6FB5A INBOUND SPI = 0xB2D56F0F)
65 20:27:46.188 11/19/03 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0xCEC6FB5A
66 20:27:46.188 11/19/03 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0xB2D56F0F
67 20:27:46.188 11/19/03 Sev=Info/4 CM/0x63100021
Additional Phase 2 SA established.
68 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
69 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x5afbc6ce into key list
70 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
71 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x0f6fd5b2 into key list
72 20:27:55.762 11/19/03 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 216.239.41.99, seq# = 1234668764
73 20:27:55.762 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 216.239.41.99
74 20:27:55.842 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
75 20:27:55.842 11/19/03 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 216.239.41.99
76 20:27:55.842 11/19/03 Sev=Info/5 IKE/0x6300003F
Received DPD ACK from 216.239.41.99, seq# received = 1233558764, seq# expected = 1234668764
77 20:28:16.291 11/19/03 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 216.239.41.99, seq# = 1234668764
78 20:28:16.291 11/19/03 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 216.239.41.99
79 20:28:16.371 11/19/03 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.239.41.99
11-26-2003 11:56 PM
I am not really sure, but I guess this could have to do something with xp
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide