Salve a tutti,
voglio premettere che non capisco molto di vpn e simili, comunque adesso espongo il mio problema.
Ho sempre avuto un client VPN Cisco installato sul mio pc per lavori che effettuo con alcuni clienti. Un giorno uno di questi clienti mi ha chiesto di installare un nuovo client VPN, per l'esattezza Checkpoint VPN-1 Securemote.
Bene, o meglio male... da quel giorno il mio client VPN Cisco non ha più funzionato.
Ecco cosa succede, effettua la connessione regolarmente ma quando cerco di andare su un server della rete del cliente non vado da nessuna parte, è come se rimanessi chiuso nel mio pc e non vado più da nessuna parte.
Non so più come fare, per me è un grande problema perchè non posso gestire gli applicativi che ho realizzato per i miei clienti da remoto.
Spero che qualcuno di voi possa aiutarmi e se è necessario che faccia qualcosa o vi invii i file di log fatemelo spare.
Per sicurezza vi allego un log.
Grazie ancora
mauro
Problemi con VPN CISCO Client
Moderatore: Federico.Lagni
-
- n00b
- Messaggi: 2
- Iscritto il: mer 10 set , 2008 10:40 am
Inserisco qui il log, non riesco a fare l'attachment:
------------------------------------------------------------------
Cisco Systems VPN Client Version 5.0.03.0560
Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Programmi\Cisco Systems\VPN Client\
1 14:23:26.937 09/09/08 Sev=Info/4 CM/0x63100002
Begin connection process
2 14:23:26.953 09/09/08 Sev=Info/4 CM/0x63100004
Establish secure connection
3 14:23:26.953 09/09/08 Sev=Info/4 CM/0x63100024
Attempt connection with server "213.205.5.253"
4 14:23:26.953 09/09/08 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 213.205.5.253.
5 14:23:26.968 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 213.205.5.253
6 14:23:27.171 09/09/08 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
7 14:23:27.171 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
8 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
9 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 213.205.5.253
10 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
11 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
12 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports DPD
13 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
14 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
15 14:23:27.406 09/09/08 Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 7h.
16 14:23:27.296 09/09/08 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
17 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 213.205.5.253
18 14:23:27.296 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
19 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x17ED, Remote Port = 0x1194
20 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
21 14:23:27.296 09/09/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
22 14:23:27.406 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
23 14:23:27.406 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253
24 14:23:27.406 09/09/08 Sev=Info/4 CM/0x63100015
Launch xAuth application
25 14:23:27.406 09/09/08 Sev=Info/4 CM/0x63100017
xAuth application returned
26 14:23:27.406 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253
27 14:23:27.875 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
28 14:23:27.875 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253
29 14:23:27.875 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253
30 14:23:27.875 09/09/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
31 14:23:27.890 09/09/08 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
32 14:23:27.890 09/09/08 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
33 14:23:27.906 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253
34 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
35 14:23:28.250 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253
36 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.139.3.107
37 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.248
38 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.39.20.161
39 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.39.20.162
40 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000001
41 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000008
42 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #1
subnet = 10.139.8.22
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
43 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #2
subnet = 10.139.8.23
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
44 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #3
subnet = 10.139.8.24
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
45 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #4
subnet = 10.139.8.25
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
46 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #5
subnet = 10.139.8.26
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
47 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #6
subnet = 10.139.8.27
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
48 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #7
subnet = 10.139.8.28
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
49 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #8
subnet = 10.139.8.29
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
50 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
51 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.1.7.I built by vmurphy on Nov 30 2005 01:39:53
52 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
53 14:23:28.250 09/09/08 Sev=Info/4 CM/0x63100019
Mode Config data received
54 14:23:28.265 09/09/08 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 10.139.3.107, GW IP = 213.205.5.253, Remote IP = 0.0.0.0
55 14:23:28.265 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 213.205.5.253
56 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
57 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 213.205.5.253
58 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
59 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 2 seconds, setting expiry to 86398 seconds from now
60 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
61 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 213.205.5.253
62 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds
63 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 213.205.5.253
64 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=73DCD762 OUTBOUND SPI = 0x4ED8ED5C INBOUND SPI = 0x06EB757A)
65 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x4ED8ED5C
66 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0x06EB757A
67 14:23:28.437 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
68 14:23:29.484 09/09/08 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=10.139.3.107/255.255.255.248
DNS=10.39.20.161,10.39.20.162
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=
69 14:23:29.484 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
70 14:23:29.500 09/09/08 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.
71 14:23:29.500 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.139.8.22 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.23 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.24 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.25 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.26 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.27 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.28 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.29 255.255.255.255 10.139.3.107 10.139.3.107 1
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.2 255.255.255.255 192.168.1.103 192.168.1.103 1
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
213.205.5.253 255.255.255.255 192.168.1.2 192.168.1.103 1
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
72 14:23:29.500 09/09/08 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter
73 14:23:29.531 09/09/08 Sev=Info/4 CM/0x6310001A
One secure connection established
74 14:23:29.593 09/09/08 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.103. Current hostname: MAUIVAIO, Current address(es): 10.139.3.107, 192.168.1.103.
75 14:23:29.593 09/09/08 Sev=Info/4 CM/0x6310003B
Address watch added for 10.139.3.107. Current hostname: MAUIVAIO, Current address(es): 10.139.3.107, 192.168.1.103.
76 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
77 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
78 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x5cedd84e into key list
79 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
80 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x7a75eb06 into key list
81 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 10.139.3.107
82 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700037
Configure public interface: 192.168.1.103. SG: 213.205.5.253
83 14:23:29.593 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 1.
84 14:23:37.671 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
85 14:23:47.671 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
86 14:23:57.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
87 14:24:07.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
88 14:24:17.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
89 14:24:27.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
90 14:24:37.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
91 14:24:47.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
92 14:24:57.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
93 14:25:07.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
94 14:25:18.156 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
95 14:25:28.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
96 14:25:38.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
97 14:25:48.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
98 14:25:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
99 14:26:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
100 14:26:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
101 14:26:28.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
102 14:26:38.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
103 14:26:48.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
104 14:26:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
105 14:27:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
106 14:27:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
107 14:27:28.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
108 14:27:38.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
109 14:27:48.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
110 14:27:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
111 14:28:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
112 14:28:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
113 14:28:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
114 14:28:36.765 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
115 14:28:36.765 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
116 14:28:36.765 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276850, last seq# = 0
117 14:28:36.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
118 14:28:36.765 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276850
119 14:28:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
120 14:28:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
121 14:28:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
122 14:29:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
123 14:29:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
124 14:29:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
125 14:29:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
126 14:29:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
127 14:29:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
128 14:30:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
129 14:30:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
130 14:30:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
131 14:30:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
132 14:30:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
133 14:30:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
134 14:31:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
135 14:31:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
136 14:31:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
137 14:31:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
138 14:31:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
139 14:31:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
140 14:32:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
141 14:32:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
142 14:32:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
143 14:32:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
144 14:32:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
145 14:32:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
146 14:33:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
147 14:33:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
148 14:33:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
149 14:33:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
150 14:33:46.750 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
151 14:33:46.750 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
152 14:33:46.750 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276851, last seq# = 38276850
153 14:33:46.750 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
154 14:33:46.750 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276851
155 14:33:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
156 14:33:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
157 14:34:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
158 14:34:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
159 14:34:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
160 14:34:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
161 14:34:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
162 14:34:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
163 14:35:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
164 14:35:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
165 14:35:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
166 14:35:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
167 14:35:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
168 14:35:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
169 14:36:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
170 14:36:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
171 14:36:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
172 14:36:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
173 14:36:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
174 14:36:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
175 14:37:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
176 14:37:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
177 14:37:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
178 14:37:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
179 14:37:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
180 14:37:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
181 14:38:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
182 14:38:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
183 14:38:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
184 14:38:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
185 14:38:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
186 14:38:56.734 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
187 14:38:56.734 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
188 14:38:56.734 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276852, last seq# = 38276851
189 14:38:56.734 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
190 14:38:56.734 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276852
191 14:38:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
192 14:39:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
193 14:39:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
194 14:39:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
195 14:39:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
196 14:39:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
197 14:39:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
198 14:40:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
199 14:40:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
200 14:40:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
201 14:40:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
202 14:40:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
203 14:40:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
204 14:41:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
205 14:41:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
206 14:41:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
207 14:41:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
208 14:41:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
209 14:41:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
210 14:42:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
211 14:42:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
212 14:42:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
213 14:42:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
214 14:42:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
215 14:42:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
216 14:43:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
217 14:43:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
218 14:43:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
219 14:43:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
220 14:43:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
221 14:43:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
222 14:44:06.718 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
223 14:44:06.718 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
224 14:44:06.718 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276853, last seq# = 38276852
225 14:44:06.718 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
226 14:44:06.718 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276853
227 14:44:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
228 14:44:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
229 14:44:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
230 14:44:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
231 14:44:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
232 14:44:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
233 14:45:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
234 14:45:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
235 14:45:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
236 14:45:31.765 09/09/08 Sev=Info/6 GUI/0x63B0000D
Disconnecting VPN connection.
237 14:45:31.765 09/09/08 Sev=Info/4 CM/0x6310000A
Secure connections terminated
238 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
239 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 213.205.5.253
240 14:45:31.765 09/09/08 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 4ED8ED5C INBOUND SPI = 6EB757A)
241 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=73DCD762
242 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=C2862D2D2AFCE94E R_Cookie=215C36C0A79F967A) reason = DEL_REASON_RESET_SADB
243 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 213.205.5.253
244 14:45:31.781 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.139.8.22 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.23 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.24 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.25 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.26 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.27 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.28 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.29 255.255.255.255 10.139.3.107 10.139.3.107 1
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.2 255.255.255.255 192.168.1.103 192.168.1.103 1
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
213.205.5.253 255.255.255.255 192.168.1.2 192.168.1.103 1
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
245 14:45:31.781 09/09/08 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter
246 14:45:32.765 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
247 14:45:32.765 09/09/08 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled
248 14:45:32.765 09/09/08 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=C2862D2D2AFCE94E R_Cookie=215C36C0A79F967A) reason = DEL_REASON_RESET_SADB
249 14:45:32.765 09/09/08 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
250 14:45:32.765 09/09/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
251 14:45:32.765 09/09/08 Sev=Info/6 CM/0x63100031
Tunnel to headend device 213.205.5.253 disconnected: duration: 0 days 0:22:3
252 14:45:32.812 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
253 14:45:32.812 09/09/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
254 14:45:32.828 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
255 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x7a75eb06
256 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x7a75eb06
257 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x5cedd84e
258 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x5cedd84e
259 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
260 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
261 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
262 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
------------------------------------------------------------------
------------------------------------------------------------------
Cisco Systems VPN Client Version 5.0.03.0560
Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Programmi\Cisco Systems\VPN Client\
1 14:23:26.937 09/09/08 Sev=Info/4 CM/0x63100002
Begin connection process
2 14:23:26.953 09/09/08 Sev=Info/4 CM/0x63100004
Establish secure connection
3 14:23:26.953 09/09/08 Sev=Info/4 CM/0x63100024
Attempt connection with server "213.205.5.253"
4 14:23:26.953 09/09/08 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 213.205.5.253.
5 14:23:26.968 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 213.205.5.253
6 14:23:27.171 09/09/08 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
7 14:23:27.171 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
8 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
9 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 213.205.5.253
10 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
11 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
12 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports DPD
13 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
14 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
15 14:23:27.406 09/09/08 Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 7h.
16 14:23:27.296 09/09/08 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
17 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 213.205.5.253
18 14:23:27.296 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
19 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x17ED, Remote Port = 0x1194
20 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
21 14:23:27.296 09/09/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
22 14:23:27.406 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
23 14:23:27.406 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253
24 14:23:27.406 09/09/08 Sev=Info/4 CM/0x63100015
Launch xAuth application
25 14:23:27.406 09/09/08 Sev=Info/4 CM/0x63100017
xAuth application returned
26 14:23:27.406 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253
27 14:23:27.875 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
28 14:23:27.875 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253
29 14:23:27.875 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253
30 14:23:27.875 09/09/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
31 14:23:27.890 09/09/08 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
32 14:23:27.890 09/09/08 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
33 14:23:27.906 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253
34 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
35 14:23:28.250 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253
36 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.139.3.107
37 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.248
38 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.39.20.161
39 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.39.20.162
40 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000001
41 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000008
42 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #1
subnet = 10.139.8.22
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
43 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #2
subnet = 10.139.8.23
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
44 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #3
subnet = 10.139.8.24
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
45 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #4
subnet = 10.139.8.25
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
46 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #5
subnet = 10.139.8.26
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
47 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #6
subnet = 10.139.8.27
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
48 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #7
subnet = 10.139.8.28
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
49 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #8
subnet = 10.139.8.29
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0
50 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
51 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.1.7.I built by vmurphy on Nov 30 2005 01:39:53
52 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
53 14:23:28.250 09/09/08 Sev=Info/4 CM/0x63100019
Mode Config data received
54 14:23:28.265 09/09/08 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 10.139.3.107, GW IP = 213.205.5.253, Remote IP = 0.0.0.0
55 14:23:28.265 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 213.205.5.253
56 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
57 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 213.205.5.253
58 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
59 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 2 seconds, setting expiry to 86398 seconds from now
60 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
61 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 213.205.5.253
62 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds
63 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 213.205.5.253
64 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=73DCD762 OUTBOUND SPI = 0x4ED8ED5C INBOUND SPI = 0x06EB757A)
65 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x4ED8ED5C
66 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0x06EB757A
67 14:23:28.437 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
68 14:23:29.484 09/09/08 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=10.139.3.107/255.255.255.248
DNS=10.39.20.161,10.39.20.162
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=
69 14:23:29.484 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
70 14:23:29.500 09/09/08 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.
71 14:23:29.500 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.139.8.22 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.23 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.24 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.25 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.26 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.27 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.28 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.29 255.255.255.255 10.139.3.107 10.139.3.107 1
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.2 255.255.255.255 192.168.1.103 192.168.1.103 1
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
213.205.5.253 255.255.255.255 192.168.1.2 192.168.1.103 1
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
72 14:23:29.500 09/09/08 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter
73 14:23:29.531 09/09/08 Sev=Info/4 CM/0x6310001A
One secure connection established
74 14:23:29.593 09/09/08 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.103. Current hostname: MAUIVAIO, Current address(es): 10.139.3.107, 192.168.1.103.
75 14:23:29.593 09/09/08 Sev=Info/4 CM/0x6310003B
Address watch added for 10.139.3.107. Current hostname: MAUIVAIO, Current address(es): 10.139.3.107, 192.168.1.103.
76 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
77 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
78 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x5cedd84e into key list
79 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
80 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x7a75eb06 into key list
81 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 10.139.3.107
82 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700037
Configure public interface: 192.168.1.103. SG: 213.205.5.253
83 14:23:29.593 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 1.
84 14:23:37.671 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
85 14:23:47.671 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
86 14:23:57.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
87 14:24:07.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
88 14:24:17.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
89 14:24:27.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
90 14:24:37.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
91 14:24:47.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
92 14:24:57.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
93 14:25:07.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
94 14:25:18.156 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
95 14:25:28.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
96 14:25:38.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
97 14:25:48.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
98 14:25:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
99 14:26:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
100 14:26:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
101 14:26:28.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
102 14:26:38.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
103 14:26:48.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
104 14:26:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
105 14:27:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
106 14:27:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
107 14:27:28.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
108 14:27:38.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
109 14:27:48.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
110 14:27:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
111 14:28:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
112 14:28:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
113 14:28:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
114 14:28:36.765 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
115 14:28:36.765 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
116 14:28:36.765 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276850, last seq# = 0
117 14:28:36.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
118 14:28:36.765 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276850
119 14:28:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
120 14:28:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
121 14:28:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
122 14:29:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
123 14:29:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
124 14:29:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
125 14:29:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
126 14:29:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
127 14:29:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
128 14:30:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
129 14:30:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
130 14:30:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
131 14:30:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
132 14:30:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
133 14:30:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
134 14:31:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
135 14:31:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
136 14:31:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
137 14:31:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
138 14:31:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
139 14:31:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
140 14:32:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
141 14:32:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
142 14:32:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
143 14:32:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
144 14:32:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
145 14:32:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
146 14:33:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
147 14:33:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
148 14:33:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
149 14:33:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
150 14:33:46.750 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
151 14:33:46.750 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
152 14:33:46.750 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276851, last seq# = 38276850
153 14:33:46.750 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
154 14:33:46.750 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276851
155 14:33:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
156 14:33:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
157 14:34:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
158 14:34:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
159 14:34:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
160 14:34:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
161 14:34:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
162 14:34:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
163 14:35:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
164 14:35:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
165 14:35:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
166 14:35:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
167 14:35:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
168 14:35:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
169 14:36:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
170 14:36:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
171 14:36:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
172 14:36:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
173 14:36:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
174 14:36:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
175 14:37:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
176 14:37:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
177 14:37:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
178 14:37:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
179 14:37:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
180 14:37:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
181 14:38:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
182 14:38:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
183 14:38:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
184 14:38:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
185 14:38:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
186 14:38:56.734 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
187 14:38:56.734 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
188 14:38:56.734 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276852, last seq# = 38276851
189 14:38:56.734 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
190 14:38:56.734 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276852
191 14:38:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
192 14:39:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
193 14:39:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
194 14:39:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
195 14:39:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
196 14:39:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
197 14:39:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
198 14:40:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
199 14:40:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
200 14:40:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
201 14:40:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
202 14:40:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
203 14:40:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
204 14:41:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
205 14:41:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
206 14:41:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
207 14:41:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
208 14:41:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
209 14:41:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
210 14:42:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
211 14:42:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
212 14:42:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
213 14:42:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
214 14:42:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
215 14:42:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
216 14:43:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
217 14:43:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
218 14:43:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
219 14:43:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
220 14:43:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
221 14:43:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
222 14:44:06.718 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253
223 14:44:06.718 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253
224 14:44:06.718 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276853, last seq# = 38276852
225 14:44:06.718 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253
226 14:44:06.718 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276853
227 14:44:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
228 14:44:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
229 14:44:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
230 14:44:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
231 14:44:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
232 14:44:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
233 14:45:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
234 14:45:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
235 14:45:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
236 14:45:31.765 09/09/08 Sev=Info/6 GUI/0x63B0000D
Disconnecting VPN connection.
237 14:45:31.765 09/09/08 Sev=Info/4 CM/0x6310000A
Secure connections terminated
238 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
239 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 213.205.5.253
240 14:45:31.765 09/09/08 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 4ED8ED5C INBOUND SPI = 6EB757A)
241 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=73DCD762
242 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=C2862D2D2AFCE94E R_Cookie=215C36C0A79F967A) reason = DEL_REASON_RESET_SADB
243 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 213.205.5.253
244 14:45:31.781 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.139.8.22 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.23 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.24 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.25 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.26 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.27 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.28 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.29 255.255.255.255 10.139.3.107 10.139.3.107 1
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.2 255.255.255.255 192.168.1.103 192.168.1.103 1
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
213.205.5.253 255.255.255.255 192.168.1.2 192.168.1.103 1
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
245 14:45:31.781 09/09/08 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter
246 14:45:32.765 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1
247 14:45:32.765 09/09/08 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled
248 14:45:32.765 09/09/08 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=C2862D2D2AFCE94E R_Cookie=215C36C0A79F967A) reason = DEL_REASON_RESET_SADB
249 14:45:32.765 09/09/08 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
250 14:45:32.765 09/09/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
251 14:45:32.765 09/09/08 Sev=Info/6 CM/0x63100031
Tunnel to headend device 213.205.5.253 disconnected: duration: 0 days 0:22:3
252 14:45:32.812 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
253 14:45:32.812 09/09/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
254 14:45:32.828 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
255 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x7a75eb06
256 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x7a75eb06
257 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x5cedd84e
258 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x5cedd84e
259 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
260 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
261 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
262 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
------------------------------------------------------------------