Question : Problems while connecting through Cisco Systems VPN Client Version 4.6.02.0011

hi  I am having a strange problem with my MS Windows 2003 Advance server while connecting through the Cisco Systems VPN Client Version 4.6.02.0011 >> it initiates connection >> asks for user id and psswrd >> then a status shows securing connection channel then suddenly it says not connected I am attaching the trace log , your help would be highly appreciated thanks in advance.

Trace Log.

Cisco Systems VPN Client Version 4.6.02.0011
Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.2.3790 Service Pack 1
Config file directory: D:\Program Files\Cisco Systems\VPN Client

1      03:54:18.812  11/23/06  Sev=Info/4      CM/0x63100002
Begin connection process

2      03:54:18.828  11/23/06  Sev=Info/4      CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully

3      03:54:18.828  11/23/06  Sev=Info/4      CM/0x63100004
Establish secure connection using Ethernet

4      03:54:18.828  11/23/06  Sev=Info/4      CM/0x63100024
Attempt connection with server "host.carquestlink.com"

5      03:54:19.609  11/23/06  Sev=Info/6      IKE/0x6300003B
Attempting to establish a connection with 66.192.59.65.

6      03:54:19.625  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 66.192.59.65

7      03:54:19.625  11/23/06  Sev=Info/4      IPSEC/0x63700008
IPSec driver successfully started

8      03:54:19.625  11/23/06  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

9      03:54:22.468  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.65

10     03:54:22.468  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 66.192.59.65

11     03:54:22.468  11/23/06  Sev=Info/5      IKE/0x63000001
Peer is a Cisco-Unity compliant peer

12     03:54:22.468  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports XAUTH

13     03:54:22.468  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports DPD

14     03:54:22.468  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports IKE fragmentation payloads

15     03:54:22.468  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports DWR Code and DWR Text

16     03:54:22.468  11/23/06  Sev=Info/6      IKE/0x63000001
IOS Vendor ID Contruction successful

17     03:54:22.468  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 66.192.59.65

18     03:54:22.468  11/23/06  Sev=Info/4      IKE/0x63000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

19     03:54:22.468  11/23/06  Sev=Info/4      CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

20     03:54:25.609  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.65

21     03:54:25.609  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 66.192.59.65

22     03:54:25.609  11/23/06  Sev=Info/4      CM/0x6310001B
Received alternative server address "66.192.59.66" from primary server

23     03:54:25.609  11/23/06  Sev=Info/4      IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=25D49D5427B8B9F5 R_Cookie=47745302D7D8E802) reason = DEL_REASON_LOAD_BALANCING

24     03:54:25.609  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 66.192.59.65

25     03:54:26.609  11/23/06  Sev=Info/4      IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=25D49D5427B8B9F5 R_Cookie=47745302D7D8E802) reason = DEL_REASON_LOAD_BALANCING

26     03:54:26.609  11/23/06  Sev=Info/4      CM/0x63100014
Unable to establish Phase 1 SA with server "host.carquestlink.com" because of "DEL_REASON_LOAD_BALANCING"

27     03:54:26.609  11/23/06  Sev=Info/4      CM/0x63100010
Try alternative server "66.192.59.66" given by the primary server

28     03:54:26.609  11/23/06  Sev=Info/4      CM/0x63100024
Attempt connection with server "66.192.59.66"

29     03:54:26.625  11/23/06  Sev=Info/6      IKE/0x6300003B
Attempting to establish a connection with 66.192.59.66.

30     03:54:26.625  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 66.192.59.66

31     03:54:28.609  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

32     03:54:28.609  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 66.192.59.66

33     03:54:28.609  11/23/06  Sev=Info/5      IKE/0x63000001
Peer is a Cisco-Unity compliant peer

34     03:54:28.609  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports XAUTH

35     03:54:28.609  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports DPD

36     03:54:28.609  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports IKE fragmentation payloads

37     03:54:28.609  11/23/06  Sev=Info/5      IKE/0x63000001
Peer supports DWR Code and DWR Text

38     03:54:28.609  11/23/06  Sev=Info/6      IKE/0x63000001
IOS Vendor ID Contruction successful

39     03:54:28.609  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 66.192.59.66

40     03:54:28.609  11/23/06  Sev=Info/4      IKE/0x63000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

41     03:54:28.609  11/23/06  Sev=Info/4      CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

42     03:54:30.781  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

43     03:54:30.781  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 66.192.59.66

44     03:54:30.781  11/23/06  Sev=Info/4      CM/0x63100015
Launch xAuth application

45     03:54:38.781  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 66.192.59.66

46     03:54:38.781  11/23/06  Sev=Info/6      IKE/0x63000053
Sent a keepalive on the IKE SA

47     03:54:59.031  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 66.192.59.66

48     03:54:59.031  11/23/06  Sev=Info/6      IKE/0x63000053
Sent a keepalive on the IKE SA

49     03:54:59.312  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

50     03:54:59.312  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 66.192.59.66

51     03:55:19.171  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 66.192.59.66

52     03:55:19.171  11/23/06  Sev=Info/6      IKE/0x63000053
Sent a keepalive on the IKE SA

53     03:55:22.375  11/23/06  Sev=Info/4      CM/0x63100017
xAuth application returned

54     03:55:22.375  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 66.192.59.66

55     03:55:26.890  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

56     03:55:26.890  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 66.192.59.66

57     03:55:26.890  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 66.192.59.66

58     03:55:26.890  11/23/06  Sev=Info/4      CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

59     03:55:26.906  11/23/06  Sev=Info/5      IKE/0x6300005E
Client sending a firewall request to concentrator

60     03:55:26.906  11/23/06  Sev=Info/5      IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).

61     03:55:26.906  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 66.192.59.66

62     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

63     03:55:27.390  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 66.192.59.66

64     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.11.61.5

65     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.10.2.11

66     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.10.2.18

67     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000

68     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = carquestlink.com

69     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_UDP_NAT_PORT, value = 0x00002710

70     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000

71     03:55:27.390  11/23/06  Sev=Info/5      IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52

72     03:55:27.390  11/23/06  Sev=Info/4      CM/0x63100019
Mode Config data received

73     03:55:27.390  11/23/06  Sev=Info/4      IKE/0x63000056
Received a key request from Driver: Local IP = 10.11.61.5, GW IP = 66.192.59.66, Remote IP = 0.0.0.0

74     03:55:27.390  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 66.192.59.66

75     03:55:27.859  11/23/06  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

76     03:55:28.281  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

77     03:55:28.281  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 66.192.59.66

78     03:55:28.281  11/23/06  Sev=Info/5      IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds

79     03:55:28.281  11/23/06  Sev=Info/5      IKE/0x63000047
This SA has already been alive for 62 seconds, setting expiry to 86338 seconds from now

80     03:55:28.296  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

81     03:55:28.296  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 66.192.59.66

82     03:55:28.296  11/23/06  Sev=Info/5      IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds

83     03:55:28.296  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 66.192.59.66

84     03:55:28.296  11/23/06  Sev=Info/5      IKE/0x63000059
Loading IPsec SA (MsgID=679CFBE4 OUTBOUND SPI = 0x7222E623 INBOUND SPI = 0xBADBB396)

85     03:55:28.296  11/23/06  Sev=Info/5      IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x7222E623

86     03:55:28.296  11/23/06  Sev=Info/5      IKE/0x63000026
Loaded INBOUND ESP SPI: 0xBADBB396

87     03:55:28.390  11/23/06  Sev=Info/5      CVPND/0x63400013
    Destination           Netmask           Gateway         Interface   Metric
        0.0.0.0           0.0.0.0     58.65.194.121     58.65.194.124       20
  58.65.194.120   255.255.255.248     58.65.194.124     58.65.194.124       20
  58.65.194.124   255.255.255.255         127.0.0.1         127.0.0.1       20
 58.255.255.255   255.255.255.255     58.65.194.124     58.65.194.124       20
      127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
      224.0.0.0         240.0.0.0     58.65.194.124     58.65.194.124       20
255.255.255.255   255.255.255.255     58.65.194.124     58.65.194.124        1


88     03:55:39.250  11/23/06  Sev=Warning/3      CVPND/0xA340000D
The virtual adapter was not recognized by the operating system.

89     03:55:39.250  11/23/06  Sev=Warning/2      CM/0xE310000A
The virtual adapter failed to enable

90     03:55:39.250  11/23/06  Sev=Info/5      CVPND/0x63400013
    Destination           Netmask           Gateway         Interface   Metric
        0.0.0.0           0.0.0.0     58.65.194.121     58.65.194.124       20
  58.65.194.120   255.255.255.248     58.65.194.124     58.65.194.124       20
  58.65.194.124   255.255.255.255         127.0.0.1         127.0.0.1       20
 58.255.255.255   255.255.255.255     58.65.194.124     58.65.194.124       20
      127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
      224.0.0.0         240.0.0.0     58.65.194.124     58.65.194.124       20
255.255.255.255   255.255.255.255     58.65.194.124     58.65.194.124        1


91     03:55:39.250  11/23/06  Sev=Info/6      CM/0x63100037
The routing table was returned to orginal state prior to Virtual Adapter

92     03:55:39.359  11/23/06  Sev=Info/5      CVPND/0x63400013
    Destination           Netmask           Gateway         Interface   Metric
        0.0.0.0           0.0.0.0     58.65.194.121     58.65.194.124       20
  58.65.194.120   255.255.255.248     58.65.194.124     58.65.194.124       20
  58.65.194.124   255.255.255.255         127.0.0.1         127.0.0.1       20
 58.255.255.255   255.255.255.255     58.65.194.124     58.65.194.124       20
      127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
      224.0.0.0         240.0.0.0     58.65.194.124     58.65.194.124       20
255.255.255.255   255.255.255.255     58.65.194.124     58.65.194.124        1


93     03:55:39.359  11/23/06  Sev=Info/4      CM/0x63100035
The Virtual Adapter was disabled

94     03:55:39.359  11/23/06  Sev=Warning/2      IKE/0xE3000099
Failed to active IPSec SA: Unable to enable Virtual Adapter (NavigatorQM:936)

95     03:55:39.359  11/23/06  Sev=Warning/2      IKE/0xE30000A5
Unexpected SW error occurred while processing Quick Mode negotiator:(Navigator:2202)

96     03:55:39.359  11/23/06  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 66.192.59.66

97     03:55:39.359  11/23/06  Sev=Info/5      IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 7222E623 INBOUND SPI = BADBB396)

98     03:55:39.359  11/23/06  Sev=Info/4      IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=679CFBE4

99     03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x63700010
Created a new key structure

100    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x6370000F
Added key with SPI=0x23e62272 into key list

101    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x63700010
Created a new key structure

102    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x6370000F
Added key with SPI=0x96b3dbba into key list

103    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x63700013
Delete internal key with SPI=0x96b3dbba

104    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x6370000C
Key deleted by SPI 0x96b3dbba

105    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x63700013
Delete internal key with SPI=0x23e62272

106    03:55:39.359  11/23/06  Sev=Info/4      IPSEC/0x6370000C
Key deleted by SPI 0x23e62272

107    03:55:39.359  11/23/06  Sev=Info/6      IKE/0x63000055
Sent a keepalive on the IPSec SA

108    03:55:40.390  11/23/06  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = 66.192.59.66

109    03:55:40.390  11/23/06  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 66.192.59.66

110    03:55:40.390  11/23/06  Sev=Info/4      IKE/0x63000081
Delete Reason Code: 4 --> PEER_DELETE-IKE_DELETE_NO_ERROR.

111    03:55:40.390  11/23/06  Sev=Info/5      IKE/0x6300003C
Received a DELETE payload for IKE SA with Cookies:  I_Cookie=A375630285269843 R_Cookie=98BA6DD49BB7916A

112    03:55:40.390  11/23/06  Sev=Info/4      IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=A375630285269843 R_Cookie=98BA6DD49BB7916A) reason = PEER_DELETE-IKE_DELETE_NO_ERROR

113    03:55:41.390  11/23/06  Sev=Info/4      IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=A375630285269843 R_Cookie=98BA6DD49BB7916A) reason = PEER_DELETE-IKE_DELETE_NO_ERROR

114    03:55:41.390  11/23/06  Sev=Info/4      CM/0x63100012
Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_NO_ERROR".  0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

115    03:55:41.390  11/23/06  Sev=Info/4      CM/0x6310000C
All connection attempts with backup server failed

116    03:55:41.390  11/23/06  Sev=Info/5      CM/0x63100025
Initializing CVPNDrv

117    03:55:41.406  11/23/06  Sev=Info/4      IKE/0x63000001
IKE received signal to terminate VPN connection

118    03:55:41.406  11/23/06  Sev=Info/4      IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully

119    03:55:42.406  11/23/06  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

120    03:55:42.406  11/23/06  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

121    03:55:42.406  11/23/06  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

122    03:55:42.406  11/23/06  Sev=Info/4      IPSEC/0x6370000A
IPSec driver successfully stopped

 

Answer : Problems while connecting through Cisco Systems VPN Client Version 4.6.02.0011

>is there any hope of such a cisco vpn client in near future?
   Probably not.  Cisco has never supported server OSes (going back to NT 4.0), so I don't think they ever will.

   I really believe you're spinning your wheels on this.  Notice in the client log output:
>88     03:55:39.250  11/23/06  Sev=Warning/3     CVPND/0xA340000D
>The virtual adapter was not recognized by the operating system
  The OS doesn't support the VPN virtual adaptor, & without that, you absolutely won't be able to establish a tunnel from the server.

  Do you by chance have a Cisco router/firewall at the server's location or some IPSec-capable device? A workaround could be setting up a site-site VPN between your router/firewall & the remote site you're trying to reach, provided the remote site is willing & able to do so.

>How can I download 4.8 ?
  If you have a CCO login on Cisco's website, go here:  http://www.cisco.com/cgi-bin/tablebuild.pl/windows

cheers
Random Solutions  
 
programming4us programming4us