Microsoft
Software
Hardware
Network
Question : Problems while connecting through Cisco Systems VPN Client Version 4.6.02.0011
hi I am having a strange problem with my MS Windows 2003 Advance server while connecting through the Cisco Systems VPN Client Version 4.6.02.0011 >> it initiates connection >> asks for user id and psswrd >> then a status shows securing connection channel then suddenly it says not connected I am attaching the trace log , your help would be highly appreciated thanks in advance.
Trace Log.
Cisco Systems VPN Client Version 4.6.02.0011
Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.2.3790 Service Pack 1
Config file directory: D:\Program Files\Cisco Systems\VPN Client
1 03:54:18.812 11/23/06 Sev=Info/4 CM/0x63100002
Begin connection process
2 03:54:18.828 11/23/06 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
3 03:54:18.828 11/23/06 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
4 03:54:18.828 11/23/06 Sev=Info/4 CM/0x63100024
Attempt connection with server "host.carquestlink.com"
5 03:54:19.609 11/23/06 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 66.192.59.65.
6 03:54:19.625 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 66.192.59.65
7 03:54:19.625 11/23/06 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
8 03:54:19.625 11/23/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
9 03:54:22.468 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.65
10 03:54:22.468 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 66.192.59.65
11 03:54:22.468 11/23/06 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
12 03:54:22.468 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
13 03:54:22.468 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports DPD
14 03:54:22.468 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
15 03:54:22.468 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
16 03:54:22.468 11/23/06 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
17 03:54:22.468 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONT
ACT, VID(?), VID(Unity)) to 66.192.59.65
18 03:54:22.468 11/23/06 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4
19 03:54:22.468 11/23/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
20 03:54:25.609 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.65
21 03:54:25.609 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 66.192.59.65
22 03:54:25.609 11/23/06 Sev=Info/4 CM/0x6310001B
Received alternative server address "66.192.59.66" from primary server
23 03:54:25.609 11/23/06 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=25D49D5427B8B9F5
R_Cookie=47745302D7D8E802)
reason = DEL_REASON_LOAD_BALANCING
24 03:54:25.609 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 66.192.59.65
25 03:54:26.609 11/23/06 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=25D49D5427B8B9F5
R_Cookie=47745302D7D8E802)
reason = DEL_REASON_LOAD_BALANCING
26 03:54:26.609 11/23/06 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "host.carquestlink.com" because of "DEL_REASON_LOAD_BALANCING
"
27 03:54:26.609 11/23/06 Sev=Info/4 CM/0x63100010
Try alternative server "66.192.59.66" given by the primary server
28 03:54:26.609 11/23/06 Sev=Info/4 CM/0x63100024
Attempt connection with server "66.192.59.66"
29 03:54:26.625 11/23/06 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 66.192.59.66.
30 03:54:26.625 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 66.192.59.66
31 03:54:28.609 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
32 03:54:28.609 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 66.192.59.66
33 03:54:28.609 11/23/06 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
34 03:54:28.609 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
35 03:54:28.609 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports DPD
36 03:54:28.609 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
37 03:54:28.609 11/23/06 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
38 03:54:28.609 11/23/06 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
39 03:54:28.609 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONT
ACT, VID(?), VID(Unity)) to 66.192.59.66
40 03:54:28.609 11/23/06 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4
41 03:54:28.609 11/23/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
42 03:54:30.781 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
43 03:54:30.781 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 66.192.59.66
44 03:54:30.781 11/23/06 Sev=Info/4 CM/0x63100015
Launch xAuth application
45 03:54:38.781 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 66.192.59.66
46 03:54:38.781 11/23/06 Sev=Info/6 IKE/0x63000053
Sent a keepalive on the IKE SA
47 03:54:59.031 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 66.192.59.66
48 03:54:59.031 11/23/06 Sev=Info/6 IKE/0x63000053
Sent a keepalive on the IKE SA
49 03:54:59.312 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
50 03:54:59.312 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 66.192.59.66
51 03:55:19.171 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 66.192.59.66
52 03:55:19.171 11/23/06 Sev=Info/6 IKE/0x63000053
Sent a keepalive on the IKE SA
53 03:55:22.375 11/23/06 Sev=Info/4 CM/0x63100017
xAuth application returned
54 03:55:22.375 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 66.192.59.66
55 03:55:26.890 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
56 03:55:26.890 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 66.192.59.66
57 03:55:26.890 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 66.192.59.66
58 03:55:26.890 11/23/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
59 03:55:26.906 11/23/06 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
60 03:55:26.906 11/23/06 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).
61 03:55:26.906 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 66.192.59.66
62 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
63 03:55:27.390 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 66.192.59.66
64 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.11.61.5
65 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.10.2.11
66 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.10.2.18
67 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000
68 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = carquestlink.com
69 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_UDP_NAT_PORT
, value = 0x00002710
70 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
71 03:55:27.390 11/23/06 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52
72 03:55:27.390 11/23/06 Sev=Info/4 CM/0x63100019
Mode Config data received
73 03:55:27.390 11/23/06 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 10.11.61.5, GW IP = 66.192.59.66, Remote IP = 0.0.0.0
74 03:55:27.390 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 66.192.59.66
75 03:55:27.859 11/23/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
76 03:55:28.281 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
77 03:55:28.281 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIM
E) from 66.192.59.66
78 03:55:28.281 11/23/06 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
79 03:55:28.281 11/23/06 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 62 seconds, setting expiry to 86338 seconds from now
80 03:55:28.296 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
81 03:55:28.296 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIM
E) from 66.192.59.66
82 03:55:28.296 11/23/06 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds
83 03:55:28.296 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 66.192.59.66
84 03:55:28.296 11/23/06 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=679CFBE4 OUTBOUND SPI = 0x7222E623 INBOUND SPI = 0xBADBB396)
85 03:55:28.296 11/23/06 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x7222E623
86 03:55:28.296 11/23/06 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0xBADBB396
87 03:55:28.390 11/23/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 58.65.194.121 58.65.194.124 20
58.65.194.120 255.255.255.248 58.65.194.124 58.65.194.124 20
58.65.194.124 255.255.255.255 127.0.0.1 127.0.0.1 20
58.255.255.255 255.255.255.255 58.65.194.124 58.65.194.124 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 58.65.194.124 58.65.194.124 20
255.255.255.255 255.255.255.255 58.65.194.124 58.65.194.124 1
88 03:55:39.250 11/23/06 Sev=Warning/3 CVPND/0xA340000D
The virtual adapter was not recognized by the operating system.
89 03:55:39.250 11/23/06 Sev=Warning/2 CM/0xE310000A
The virtual adapter failed to enable
90 03:55:39.250 11/23/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 58.65.194.121 58.65.194.124 20
58.65.194.120 255.255.255.248 58.65.194.124 58.65.194.124 20
58.65.194.124 255.255.255.255 127.0.0.1 127.0.0.1 20
58.255.255.255 255.255.255.255 58.65.194.124 58.65.194.124 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 58.65.194.124 58.65.194.124 20
255.255.255.255 255.255.255.255 58.65.194.124 58.65.194.124 1
91 03:55:39.250 11/23/06 Sev=Info/6 CM/0x63100037
The routing table was returned to orginal state prior to Virtual Adapter
92 03:55:39.359 11/23/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 58.65.194.121 58.65.194.124 20
58.65.194.120 255.255.255.248 58.65.194.124 58.65.194.124 20
58.65.194.124 255.255.255.255 127.0.0.1 127.0.0.1 20
58.255.255.255 255.255.255.255 58.65.194.124 58.65.194.124 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 58.65.194.124 58.65.194.124 20
255.255.255.255 255.255.255.255 58.65.194.124 58.65.194.124 1
93 03:55:39.359 11/23/06 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled
94 03:55:39.359 11/23/06 Sev=Warning/2 IKE/0xE3000099
Failed to active IPSec SA: Unable to enable Virtual Adapter (NavigatorQM:936)
95 03:55:39.359 11/23/06 Sev=Warning/2 IKE/0xE30000A5
Unexpected SW error occurred while processing Quick Mode negotiator:(Navigator:2202
)
96 03:55:39.359 11/23/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 66.192.59.66
97 03:55:39.359 11/23/06 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 7222E623 INBOUND SPI = BADBB396)
98 03:55:39.359 11/23/06 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=679CFBE4
99 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
100 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x23e62272 into key list
101 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
102 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x96b3dbba into key list
103 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x96b3dbba
104 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x96b3dbba
105 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x23e62272
106 03:55:39.359 11/23/06 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x23e62272
107 03:55:39.359 11/23/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
108 03:55:40.390 11/23/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66
109 03:55:40.390 11/23/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 66.192.59.66
110 03:55:40.390 11/23/06 Sev=Info/4 IKE/0x63000081
Delete Reason Code: 4 --> PEER_DELETE-IKE_DELETE_NO_
ERROR.
111 03:55:40.390 11/23/06 Sev=Info/5 IKE/0x6300003C
Received a DELETE payload for IKE SA with Cookies: I_Cookie=A375630285269843 R_Cookie=98BA6DD49BB7916A
112 03:55:40.390 11/23/06 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=A375630285269843
R_Cookie=98BA6DD49BB7916A)
reason = PEER_DELETE-IKE_DELETE_NO_
ERROR
113 03:55:41.390 11/23/06 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=A375630285269843
R_Cookie=98BA6DD49BB7916A)
reason = PEER_DELETE-IKE_DELETE_NO_
ERROR
114 03:55:41.390 11/23/06 Sev=Info/4 CM/0x63100012
Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_NO
_ERROR". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
115 03:55:41.390 11/23/06 Sev=Info/4 CM/0x6310000C
All connection attempts with backup server failed
116 03:55:41.390 11/23/06 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
117 03:55:41.406 11/23/06 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
118 03:55:41.406 11/23/06 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
119 03:55:42.406 11/23/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
120 03:55:42.406 11/23/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
121 03:55:42.406 11/23/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
122 03:55:42.406 11/23/06 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
Answer : Problems while connecting through Cisco Systems VPN Client Version 4.6.02.0011
>is there any hope of such a cisco vpn client in near future?
Probably not. Cisco has never supported server OSes (going back to NT 4.0), so I don't think they ever will.
I really believe you're spinning your wheels on this. Notice in the client log output:
>88 03:55:39.250 11/23/06 Sev=Warning/3 CVPND/0xA340000D
>The virtual adapter was not recognized by the operating system
The OS doesn't support the VPN virtual adaptor, & without that, you absolutely won't be able to establish a tunnel from the server.
Do you by chance have a Cisco router/firewall at the server's location or some IPSec-capable device? A workaround could be setting up a site-site VPN between your router/firewall & the remote site you're trying to reach, provided the remote site is willing & able to do so.
>How can I download 4.8 ?
If you have a CCO login on Cisco's website, go here:
http://www.cisco.com/cgi-b
in/tablebu
ild.pl/win
dows
cheers
Random Solutions
How to ping physical address
nslookup in local dns
weather proofing routers
UIMPORT Problem
Windows 98, 90 mhz pentium, and network card
Solarwinds 2002 Engineers Edition
Wireless Area Network Modem Router and Adaptor problems connecting to the internet + security
Vista machine putting XP machine in "The following discovered devices can not be placed in the map", XP can't see Vista.
SBS 2008 Premium lost network settings
IIS SSL certificate generation for servers in a cluster