[Vpn-help] pcf and certificate imported, but gateway authentication error [2.1.5 rc1]
Daniel Sabanes Bove
daniel.sabanesbove at gmx.net
Wed Jul 8 12:52:48 CDT 2009
Aaron,
thanks for the quick response! Yes, I do know the group password, but
did not want to share it with the whole world :-)
I have tried the VPNC Front End you mention, but it needs some manual
adjustments (the pre- and postscripts mentioned in the linked web-page).
Since I am not experienced with the VPN internals, I do not want to mess
around with such things.
And I thought I was so close to the ShrewSoft solution, but it did not
work... but perhaps this can be solved?
Regards,
Daniel
-------- Original Message --------
Subject: Re: [Vpn-help] pcf and certificate imported, but gateway
authentication error [2.1.5 rc1]
From: Aaron Herkomer <aherkomer at techvision.com>
To: Daniel Sabanes Bove <daniel.sabanesbove at gmx.net>
Date: Wed Jul 08 2009 19:06:08 GMT+0200 (CEST)
> Daniel-
>
> Do you know the group password? If so you can try this build of VPNC
created by the university of Akron:
> http://support.uakron.edu/wiki/index.php/VPNC
> I use it for all 64-bit windows clients.
>
> -Aaron
>
> On Wed, Jul 8, 2009 at 9:52 AM, Daniel Sabanes Bove
<daniel.sabanesbove at gmx.net <mailto:daniel.sabanesbove at gmx.net>> wrote:
>
> Hi,
>
> I would like to connect to a university VPN using the ShrewSoft VPN
> client 2.1.5 rc1.
>
> After importing the pcf configuration file [find it attached, but the
> group password has been deleted] originally made for the Cisco VPN
> client, and also pointing to the correct root certificate, I was not
> able to get a connection. I always got a "gateway authentication
> error". I also tried several modifications of the imported VPN
> profile, without success - it got even worse with negotiation time
> outs etc.
>
> Exactly the same procedure with Cisco VPN client 5.0.0.3 succeeded, on
> the same Windows XP 32bit, on the same physical computer.
>
> What am I doing wrong? I also attach a log file where a correct Cisco
> VPN connection is logged. How can I log the ShrewSoft VPN client?
>
> Thank you very much in advance!
> Daniel
>
Cisco Systems VPN Client Version 5.0.03.0530
Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Programme\Cisco Systems\VPN Client\
1 13:45:19.804 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
2 13:45:21.587 07/08/09 Sev=Info/6 GUI/0x63B0000D
Disconnecting VPN connection.
3 13:45:21.587 07/08/09 Sev=Info/4 CM/0x6310000A
Secure connections terminated
4 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
5 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.250.140.242
6 13:45:21.587 07/08/09 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 6E4718D1 INBOUND SPI = 1969986D)
7 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=B80433D4
8 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=A39B8823916D6910
R_Cookie=A7C7EFC9B93A3CD1) reason = DEL_REASON_RESET_SADB
9 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.250.140.242
10 13:45:21.597 07/08/09 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface
Metric
0.0.0.0 0.0.0.0 137.250.137.175
137.250.137.175 1
127.0.0.0 255.0.0.0 127.0.0.1
127.0.0.1 1
137.250.136.0 255.255.252.0 137.250.137.175
137.250.137.175 20
137.250.137.175 255.255.255.255 127.0.0.1
127.0.0.1 20
137.250.140.242 255.255.255.255 192.168.1.1
192.168.1.4 1
137.250.255.255 255.255.255.255 137.250.137.175
137.250.137.175 20
192.168.1.0 255.255.255.0 192.168.1.4
192.168.1.4 20
192.168.1.4 255.255.255.255 127.0.0.1
127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.4
192.168.1.4 20
224.0.0.0 240.0.0.0 137.250.137.175
137.250.137.175 20
224.0.0.0 240.0.0.0 192.168.1.4
192.168.1.4 20
255.255.255.255 255.255.255.255 137.250.137.175
137.250.137.175 1
255.255.255.255 255.255.255.255 192.168.1.4
192.168.1.4 1
11 13:45:21.607 07/08/09 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter
12 13:45:22.178 07/08/09 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface
Metric
0.0.0.0 0.0.0.0 192.168.1.1
192.168.1.4 20
127.0.0.0 255.0.0.0 127.0.0.1
127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.4
192.168.1.4 20
192.168.1.4 255.255.255.255 127.0.0.1
127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.4
192.168.1.4 20
224.0.0.0 240.0.0.0 192.168.1.4
192.168.1.4 20
255.255.255.255 255.255.255.255 192.168.1.4
192.168.1.4 1
13 13:45:22.178 07/08/09 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled
14 13:45:22.178 07/08/09 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=A39B8823916D6910
R_Cookie=A7C7EFC9B93A3CD1) reason = DEL_REASON_RESET_SADB
15 13:45:22.178 07/08/09 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE
SA, 0 User Authenticated IKE SA in the system
16 13:45:22.178 07/08/09 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
17 13:45:22.178 07/08/09 Sev=Info/6 CM/0x63100031
Tunnel to headend device 137.250.140.242 disconnected: duration: 0 days
0:1:43
18 13:45:22.188 07/08/09 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
19 13:45:22.198 07/08/09 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
20 13:45:22.198 07/08/09 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
21 13:45:22.208 07/08/09 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
22 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x6d986919
23 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x6d986919
24 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0xd118476e
25 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0xd118476e
26 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
27 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
28 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
29 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
30 13:45:23.249 07/08/09 Sev=Info/4 CM/0x63100002
Begin connection process
31 13:45:23.269 07/08/09 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
32 13:45:23.269 07/08/09 Sev=Info/4 CM/0x63100004
Establish secure connection
33 13:45:23.269 07/08/09 Sev=Info/4 CM/0x63100024
Attempt connection with server "vpn.uni-augsburg.de
<http://vpn.uni-augsburg.de>"
34 13:45:23.340 07/08/09 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 137.250.140.240.
35 13:45:23.370 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
VID(Frag), VID(Nat-T), VID(Unity)) to 137.250.140.240
36 13:45:23.370 07/08/09 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
37 13:45:23.370 07/08/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
38 13:45:23.370 07/08/09 Sev=Info/6 IPSEC/0x6370002C
Sent 573 packets, 0 were fragmented.
39 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
40 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
41 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
42 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
43 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
44 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
45 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
46 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
47 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
48 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
49 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
50 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
51 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
52 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
53 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
54 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
55 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
56 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
57 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
58 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
59 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
60 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240
61 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x63000073
All fragments received.
62 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, CERT, CERT, CERT, CERT,
SIG, VID(Unity), VID(Xauth), VID(Nat-T), NAT-D, NAT-D, VID(Frag),
VID(?), VID(?)) from 137.250.140.240
63 13:45:23.860 07/08/09 Sev=Info/4 CERT/0x6360000E
Discarding ROOT CA cert sent from peer.
64 13:45:23.870 07/08/09 Sev=Info/4 CERT/0x63600015
Cert (cn=vpn1.rz.uni-augsburg.de
<http://vpn1.rz.uni-augsburg.de>,ou=Rechenzentrum,o=Universitaet
Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded.
65 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
66 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
67 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
68 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
69 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
70 13:45:23.900 07/08/09 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
71 13:45:23.900 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT,
NOTIFY:PRESHARED_KEY_HASH, NAT-D, NAT-D, VID(?), VID(Unity)) to
137.250.140.240
72 13:45:23.900 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
73 13:45:23.900 07/08/09 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
74 13:45:23.900 07/08/09 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
75 13:45:23.900 07/08/09 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated
IKE SA in the system
76 13:45:23.980 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.240
77 13:45:23.980 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from
137.250.140.240
78 13:45:23.980 07/08/09 Sev=Info/4 CM/0x6310001B
Received alternative server address "137.250.140.242" from primary server
79 13:45:25.593 07/08/09 Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 7h.
80 13:45:23.980 07/08/09 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=A84B134FB531D88B
R_Cookie=64C6E6D518531AA2) reason = DEL_REASON_LOAD_BALANCING
81 13:45:23.980 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.250.140.240
82 13:45:24.852 07/08/09 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=A84B134FB531D88B
R_Cookie=64C6E6D518531AA2) reason = DEL_REASON_LOAD_BALANCING
83 13:45:24.852 07/08/09 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "vpn.uni-augsburg.de
<http://vpn.uni-augsburg.de>" because of "DEL_REASON_LOAD_BALANCING"
84 13:45:24.852 07/08/09 Sev=Info/4 CM/0x63100010
Try alternative server "137.250.140.242" given by the primary server
85 13:45:24.852 07/08/09 Sev=Info/4 CM/0x63100024
Attempt connection with server "137.250.140.242"
86 13:45:24.862 07/08/09 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 137.250.140.242.
87 13:45:24.882 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
VID(Frag), VID(Nat-T), VID(Unity)) to 137.250.140.242
88 13:45:25.423 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
89 13:45:25.423 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
90 13:45:25.423 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
91 13:45:25.423 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
92 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
93 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
94 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
95 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
96 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
97 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
98 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
99 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
100 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
101 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
102 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
103 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
104 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
105 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
106 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
107 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
108 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
109 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242
110 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x63000073
All fragments received.
111 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, CERT, CERT, CERT, CERT,
SIG, VID(Unity), VID(Xauth), VID(Nat-T), NAT-D, NAT-D, VID(Frag),
VID(?), VID(?)) from 137.250.140.242
112 13:45:25.433 07/08/09 Sev=Info/4 CERT/0x6360000E
Discarding ROOT CA cert sent from peer.
113 13:45:25.483 07/08/09 Sev=Info/4 CERT/0x63600015
Cert (cn=vpn1.rz.uni-augsburg.de
<http://vpn1.rz.uni-augsburg.de>,ou=Rechenzentrum,o=Universitaet
Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded.
114 13:45:25.483 07/08/09 Sev=Info/4 CERT/0x63600015
Cert (cn=vpn1.rz.uni-augsburg.de
<http://vpn1.rz.uni-augsburg.de>,ou=Rechenzentrum,o=Universitaet
Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded.
115 13:45:25.493 07/08/09 Sev=Info/4 CERT/0x63600015
Cert (cn=vpn1.rz.uni-augsburg.de
<http://vpn1.rz.uni-augsburg.de>,ou=Rechenzentrum,o=Universitaet
Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded.
116 13:45:25.503 07/08/09 Sev=Info/4 CERT/0x63600015
Cert (cn=vpn2.rz.uni-augsburg.de
<http://vpn2.rz.uni-augsburg.de>,ou=Rechenzentrum,o=Universitaet
Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded.
117 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
118 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
119 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
120 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
121 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
122 13:45:25.513 07/08/09 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
123 13:45:25.513 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT,
NOTIFY:PRESHARED_KEY_HASH, NAT-D, NAT-D, VID(?), VID(Unity)) to
137.250.140.242
124 13:45:25.513 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
125 13:45:25.513 07/08/09 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
126 13:45:25.513 07/08/09 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
127 13:45:25.513 07/08/09 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated
IKE SA in the system
128 13:45:25.583 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
129 13:45:25.583 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.250.140.242
130 13:45:25.583 07/08/09 Sev=Info/4 CM/0x63100015
Launch xAuth application
131 13:45:29.308 07/08/09 Sev=Info/4 CM/0x63100017
xAuth application returned
132 13:45:29.308 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.250.140.242
133 13:45:30.480 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
134 13:45:30.480 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.250.140.242
135 13:45:30.480 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.250.140.242
136 13:45:30.480 07/08/09 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated
IKE SA in the system
137 13:45:30.500 07/08/09 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
138 13:45:30.510 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.250.140.242
139 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
140 13:45:31.421 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.250.140.242
141 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 137.250.137.116
142 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.252.0
143 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.250.1.254
144 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 137.250.1.30
145 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : ,
value = 137.250.1.20
146 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = Herzlich
Willkommen am VPN der Universit??t Augsburg
Hinweis: Der gesamte Datenverkehr wird ??ber die Universit??t Augsburg
getunnelt!
147 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000
148 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000001
149 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems,
Inc./VPN 3000 Concentrator Version 4.7.2.O built by vmurphy on Mar 05
2008 16:24:28
150 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of
local_nets), value = 0x00000001
151 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000F
LOCAL_NET #1
subnet = 192.168.1.0
mask = 255.255.255.0
protocol = 0
src port = 0
dest port=0
152 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value
= 0x00001194
153 13:45:31.431 07/08/09 Sev=Info/4 CM/0x63100019
Mode Config data received
154 13:45:31.431 07/08/09 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 137.250.137.116, GW IP =
137.250.140.242, Remote IP = 0.0.0.0
155 13:45:31.461 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 137.250.140.242
156 13:45:31.461 07/08/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
157 13:45:31.561 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
158 13:45:31.561 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from
137.250.140.242
159 13:45:31.561 07/08/09 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
160 13:45:31.561 07/08/09 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 7 seconds, setting expiry to 86393
seconds from now
161 13:45:31.591 07/08/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 137.250.140.242
162 13:45:31.591 07/08/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID,
NOTIFY:STATUS_RESP_LIFETIME) from 137.250.140.242
163 13:45:31.591 07/08/09 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds
164 13:45:31.611 07/08/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 137.250.140.242
165 13:45:31.611 07/08/09 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=87786B8C OUTBOUND SPI = 0x23BEF5A1 INBOUND SPI =
0xE897968A)
166 13:45:31.611 07/08/09 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x23BEF5A1
167 13:45:31.611 07/08/09 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0xE897968A
168 13:45:31.782 07/08/09 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface
Metric
0.0.0.0 0.0.0.0 192.168.1.1
192.168.1.4 20
127.0.0.0 255.0.0.0 127.0.0.1
127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.4
192.168.1.4 20
192.168.1.4 255.255.255.255 127.0.0.1
127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.4
192.168.1.4 20
224.0.0.0 240.0.0.0 192.168.1.4
192.168.1.4 20
255.255.255.255 255.255.255.255 192.168.1.4
192.168.1.4 1
169 13:45:36.899 07/08/09 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=137.250.137.116/255.255.252.0
<http://137.250.137.116/255.255.252.0>
DNS=137.250.1.254,137.250.1.30
WINS=137.250.1.20,0.0.0.0
Domain=
Split DNS Names=
170 13:45:36.899 07/08/09 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface
Metric
0.0.0.0 0.0.0.0 137.250.137.116
137.250.137.116 1
0.0.0.0 0.0.0.0 192.168.1.1
192.168.1.4 20
127.0.0.0 255.0.0.0 127.0.0.1
127.0.0.1 1
137.250.136.0 255.255.252.0 137.250.137.116
137.250.137.116 20
137.250.137.116 255.255.255.255 127.0.0.1
127.0.0.1 20
137.250.255.255 255.255.255.255 137.250.137.116
137.250.137.116 20
192.168.1.0 255.255.255.0 192.168.1.4
192.168.1.4 20
192.168.1.4 255.255.255.255 127.0.0.1
127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.4
192.168.1.4 20
224.0.0.0 240.0.0.0 137.250.137.116
137.250.137.116 20
224.0.0.0 240.0.0.0 192.168.1.4
192.168.1.4 20
255.255.255.255 255.255.255.255 137.250.137.116
137.250.137.116 1
255.255.255.255 255.255.255.255 192.168.1.4
192.168.1.4 1
171 13:45:36.909 07/08/09 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.
172 13:45:36.909 07/08/09 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface
Metric
0.0.0.0 0.0.0.0 137.250.137.116
137.250.137.116 1
127.0.0.0 255.0.0.0 127.0.0.1
127.0.0.1 1
137.250.136.0 255.255.252.0 137.250.137.116
137.250.137.116 20
137.250.137.116 255.255.255.255 127.0.0.1
127.0.0.1 20
137.250.140.242 255.255.255.255 192.168.1.1
192.168.1.4 1
137.250.255.255 255.255.255.255 137.250.137.116
137.250.137.116 20
192.168.1.0 255.255.255.0 192.168.1.4
192.168.1.4 20
192.168.1.4 255.255.255.255 127.0.0.1
127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.4
192.168.1.4 20
224.0.0.0 240.0.0.0 137.250.137.116
137.250.137.116 20
224.0.0.0 240.0.0.0 192.168.1.4
192.168.1.4 20
255.255.255.255 255.255.255.255 137.250.137.116
137.250.137.116 1
255.255.255.255 255.255.255.255 192.168.1.4
192.168.1.4 1
173 13:45:36.909 07/08/09 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter
174 13:45:36.949 07/08/09 Sev=Info/4 CM/0x6310001A
One secure connection established
175 13:45:37.009 07/08/09 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.4. Current hostname: Daniel, Current
address(es): 137.250.137.116, 192.168.1.4.
176 13:45:37.009 07/08/09 Sev=Info/4 CM/0x6310003B
Address watch added for 137.250.137.116. Current hostname: Daniel,
Current address(es): 137.250.137.116, 192.168.1.4.
177 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
178 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0xa1f5be23 into key list
179 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
180 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x8a9697e8 into key list
181 13:45:37.019 07/08/09 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 137.250.137.116
182 13:45:37.019 07/08/09 Sev=Info/4 IPSEC/0x63700037
Configure public interface: 192.168.1.4. SG: 137.250.140.242
183 13:45:37.019 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
184 13:45:39.072 07/08/09 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 1.
185 13:45:39.363 07/08/09 Sev=Info/4 IPSEC/0x63700019
Activate outbound key with SPI=0xa1f5be23 for inbound key with
SPI=0x8a9697e8
186 13:45:57.368 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
187 13:46:07.383 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
188 13:46:17.397 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
189 13:46:27.412 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
190 13:46:37.426 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
191 13:46:47.440 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
192 13:46:57.455 07/08/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
_______________________________________________
vpn-help mailing list
vpn-help at lists.shrew.net <mailto:vpn-help at lists.shrew.net>
http://lists.shrew.net/mailman/listinfo/vpn-help
More information about the vpn-help
mailing list