Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

VPN connection stopped working?

All of the sudden my VPN connection is working. I have a PIX 515 using Cisco's VPN client 3.6.3(B). Currently using Cisco PIX Firewall Version 6.2(2).

I am able to authenticate (RADIUS) and connect to my internal network. IPCONFIG shows the internal DNS server was received. The status of the VPN connection shows that an internal network IP address was assigned by the PIX (ip local pool). The problem is once connected I can't ping anything. So basically I'm stuck at layer 3!

Nothing has changed on the PIX. My linksys router is basic configuration (let all return traffic in by default). I'm using windows XP Pro with ICS off.

Very strange why this just stopped.

Below is a capture taken with the VPN Client. Public addresses and some hashes have been changed for my protection. If it displays in an unreadable format let me know and I can email it direct.

Thanks in advance

1 20:27:39.929 11/19/03 Sev=Info/4 CM/0x63100002

Begin connection process

2 20:27:40.660 11/19/03 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet

3 20:27:40.660 11/19/03 Sev=Info/4 CM/0x63100024

Attempt connection with server "216.239.41.99"

4 20:27:40.670 11/19/03 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with 216.239.41.99.

5 20:27:40.780 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID, VID, VID) to 216.239.41.99

6 20:27:40.780 11/19/03 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

7 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

8 20:27:40.981 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK AG (SA, VID, VID, VID, KE, ID, NON, HASH) from 216.239.41.99

9 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = abcbebebtbaafere

10 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

11 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = abcbebebtbaafere

12 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000001

Peer supports DPD

13 20:27:40.981 11/19/03 Sev=Info/5 IKE/0x63000059

Vendor ID payload = abcbebebtbaafere

14 20:27:41.001 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) to 216.239.41.99

15 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

16 20:27:41.081 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 216.239.41.99

17 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x63000044

RESPONDER-LIFETIME notify has value of 3600 seconds

18 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x63000046

This SA has already been alive for 1 seconds, setting expiry to 3599 seconds from now

19 20:27:41.081 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

20 20:27:41.081 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 216.239.41.99

21 20:27:41.081 11/19/03 Sev=Info/4 CM/0x63100015

Launch xAuth application

22 20:27:45.157 11/19/03 Sev=Info/4 CM/0x63100017

xAuth application returned

23 20:27:45.157 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 216.239.41.99

24 20:27:45.267 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

25 20:27:45.267 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 216.239.41.99

26 20:27:45.267 11/19/03 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Phase 1 SA in the system

27 20:27:45.277 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 216.239.41.99

28 20:27:45.357 11/19/03 Sev=Info/5 IKE/0x6300005D

Client sending a firewall request to concentrator

29 20:27:45.357 11/19/03 Sev=Info/5 IKE/0x6300005C

Firewall Policy: Product=Cisco Integrated Client, Capability= (Centralized Protection Policy).

30 20:27:45.357 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 216.239.41.99

31 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

32 20:27:45.447 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 216.239.41.99

33 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x63000010

MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 172.16.15.1

34 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x63000010

MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 172.16.15.254

35 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x6300000E

MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = google.com

36 20:27:45.447 11/19/03 Sev=Info/5 IKE/0x6300000D

MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000001

37 20:27:45.447 11/19/03 Sev=Info/4 CM/0x63100019

Mode Config data received

38 20:27:45.457 11/19/03 Sev=Info/5 IKE/0x63000055

Received a key request from Driver for IP address 216.239.41.99, GW IP = 216.239.41.99

39 20:27:45.467 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 216.239.41.99

40 20:27:45.467 11/19/03 Sev=Info/5 IKE/0x63000055

Received a key request from Driver for IP address 10.10.10.255, GW IP = 216.239.41.99

41 20:27:45.487 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 216.239.41.99

42 20:27:45.787 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

43 20:27:45.787 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 216.239.41.99

44 20:27:45.787 11/19/03 Sev=Info/5 IKE/0x63000044

RESPONDER-LIFETIME notify has value of 28800 seconds

45 20:27:45.787 11/19/03 Sev=Info/5 IKE/0x63000045

RESPONDER-LIFETIME notify has value of 4608000 kb

46 20:27:45.787 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK QM *(HASH) to 216.239.41.99

47 20:27:45.807 11/19/03 Sev=Info/5 IKE/0x63000058

Loading IPsec SA (Message ID = 0xF00F6D01 OUTBOUND SPI = 0xD0CC69AA INBOUND SPI = 0x52EF5491)

48 20:27:45.807 11/19/03 Sev=Info/5 IKE/0x63000025

Loaded OUTBOUND ESP SPI: 0xD0CC69AA

49 20:27:45.807 11/19/03 Sev=Info/5 IKE/0x63000026

Loaded INBOUND ESP SPI: 0x52EF5491

50 20:27:45.807 11/19/03 Sev=Info/4 CM/0x6310001A

One secure connection established

51 20:27:45.848 11/19/03 Sev=Info/6 DIALER/0x63300003

Connection established.

52 20:27:45.858 11/19/03 Sev=Info/6 CVPND/0x63400011

Found matching adapter

53 20:27:45.898 11/19/03 Sev=Info/4 CM/0x63100037

Address watch added for 192.168.1.3. Current addresses are 192.168.1.3.

54 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

55 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x63700010

Created a new key structure

56 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x6370000F

Added key with SPI=0xaa69ccd0 into key list

57 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x63700010

Created a new key structure

58 20:27:46.008 11/19/03 Sev=Info/4 IPSEC/0x6370000F

Added key with SPI=0x9154ef52 into key list

59 20:27:46.168 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

60 20:27:46.168 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 216.239.41.99

61 20:27:46.168 11/19/03 Sev=Info/5 IKE/0x63000044

RESPONDER-LIFETIME notify has value of 28800 seconds

62 20:27:46.168 11/19/03 Sev=Info/5 IKE/0x63000045

RESPONDER-LIFETIME notify has value of 4608000 kb

63 20:27:46.168 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK QM *(HASH) to 216.239.41.99

64 20:27:46.188 11/19/03 Sev=Info/5 IKE/0x63000058

Loading IPsec SA (Message ID = 0xAB2B7EDF OUTBOUND SPI = 0xCEC6FB5A INBOUND SPI = 0xB2D56F0F)

65 20:27:46.188 11/19/03 Sev=Info/5 IKE/0x63000025

Loaded OUTBOUND ESP SPI: 0xCEC6FB5A

66 20:27:46.188 11/19/03 Sev=Info/5 IKE/0x63000026

Loaded INBOUND ESP SPI: 0xB2D56F0F

67 20:27:46.188 11/19/03 Sev=Info/4 CM/0x63100021

Additional Phase 2 SA established.

68 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x63700010

Created a new key structure

69 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x6370000F

Added key with SPI=0x5afbc6ce into key list

70 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x63700010

Created a new key structure

71 20:27:47.250 11/19/03 Sev=Info/4 IPSEC/0x6370000F

Added key with SPI=0x0f6fd5b2 into key list

72 20:27:55.762 11/19/03 Sev=Info/6 IKE/0x6300003D

Sending DPD request to 216.239.41.99, seq# = 1234668764

73 20:27:55.762 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 216.239.41.99

74 20:27:55.842 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

75 20:27:55.842 11/19/03 Sev=Info/4 IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 216.239.41.99

76 20:27:55.842 11/19/03 Sev=Info/5 IKE/0x6300003F

Received DPD ACK from 216.239.41.99, seq# received = 1233558764, seq# expected = 1234668764

77 20:28:16.291 11/19/03 Sev=Info/6 IKE/0x6300003D

Sending DPD request to 216.239.41.99, seq# = 1234668764

78 20:28:16.291 11/19/03 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 216.239.41.99

79 20:28:16.371 11/19/03 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = 216.239.41.99

1 REPLY
New Member

Re: VPN connection stopped working?

I am not really sure, but I guess this could have to do something with xp

155
Views
0
Helpful
1
Replies