[vpn-help] Cannot connect to Cisco 3000 Concentrator Version: vpn-client-2.1.6-beta-4

John Steskal steskalj at yahoo.com
Fri Feb 19 15:17:58 CST 2010


Cannot connect to Cisco 3000 Concentrator Version: vpn-client-2.1.6-beta-4
 
When I try to connect the tunnel comes up for a moment then disconnects remotely from the gateway.
 
Here is the IKE Debug:
 
10/02/19 16:05:50 ## : IKE Daemon, ver 2.1.6
10/02/19 16:05:50 ## : Copyright 2009 Shrew Soft Inc.
10/02/19 16:05:50 ## : This product linked OpenSSL 0.9.8h 28 May 2008
10/02/19 16:05:50 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
10/02/19 16:05:50 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-decrypt.cap'
10/02/19 16:05:50 ii : rebuilding vnet device list ...
10/02/19 16:05:50 ii : device ROOT\VNET\0000 disabled
10/02/19 16:05:50 ii : network process thread begin ...
10/02/19 16:05:50 ii : pfkey process thread begin ...
10/02/19 16:05:50 ii : ipc server process thread begin ...
10/02/19 16:07:01 ii : ipc client process thread begin ...
10/02/19 16:07:01 <A : peer config add message
10/02/19 16:07:01 DB : peer added ( obj count = 1 )
10/02/19 16:07:01 ii : local address 10.0.2.15 selected for peer
10/02/19 16:07:01 DB : tunnel added ( obj count = 1 )
10/02/19 16:07:01 <A : proposal config message
10/02/19 16:07:01 <A : proposal config message
10/02/19 16:07:01 <A : client config message
10/02/19 16:07:01 <A : xauth username message
10/02/19 16:07:01 <A : xauth password message
10/02/19 16:07:01 <A : local id 'everyone' message
10/02/19 16:07:01 <A : preshared key message
10/02/19 16:07:01 <A : remote resource message
10/02/19 16:07:01 <A : peer tunnel enable message
10/02/19 16:07:01 DB : new phase1 ( ISAKMP initiator )
10/02/19 16:07:01 DB : exchange type is aggressive
10/02/19 16:07:01 DB : 10.0.2.15:500 <-> 216.19.100.122:500
10/02/19 16:07:01 DB : 752635eaec506a6e:0000000000000000
10/02/19 16:07:01 DB : phase1 added ( obj count = 1 )
10/02/19 16:07:01 >> : security association payload
10/02/19 16:07:01 >> : - proposal #1 payload 
10/02/19 16:07:01 >> : -- transform #1 payload 
10/02/19 16:07:01 >> : -- transform #2 payload 
10/02/19 16:07:01 >> : -- transform #3 payload 
10/02/19 16:07:01 >> : -- transform #4 payload 
10/02/19 16:07:01 >> : -- transform #5 payload 
10/02/19 16:07:01 >> : -- transform #6 payload 
10/02/19 16:07:01 >> : -- transform #7 payload 
10/02/19 16:07:01 >> : -- transform #8 payload 
10/02/19 16:07:01 >> : -- transform #9 payload 
10/02/19 16:07:01 >> : -- transform #10 payload 
10/02/19 16:07:01 >> : -- transform #11 payload 
10/02/19 16:07:01 >> : -- transform #12 payload 
10/02/19 16:07:01 >> : -- transform #13 payload 
10/02/19 16:07:01 >> : -- transform #14 payload 
10/02/19 16:07:01 >> : -- transform #15 payload 
10/02/19 16:07:01 >> : -- transform #16 payload 
10/02/19 16:07:01 >> : -- transform #17 payload 
10/02/19 16:07:01 >> : -- transform #18 payload 
10/02/19 16:07:01 >> : key exchange payload
10/02/19 16:07:01 >> : nonce payload
10/02/19 16:07:01 >> : identification payload
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports XAUTH
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports nat-t ( draft v00 )
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports nat-t ( draft v01 )
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports nat-t ( draft v02 )
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports nat-t ( draft v03 )
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports nat-t ( rfc )
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local supports DPDv1
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local is SHREW SOFT compatible
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local is NETSCREEN compatible
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local is SIDEWINDER compatible
10/02/19 16:07:01 >> : vendor id payload
10/02/19 16:07:01 ii : local is CISCO UNITY compatible
10/02/19 16:07:01 >= : cookies 752635eaec506a6e:0000000000000000
10/02/19 16:07:01 >= : message 00000000
10/02/19 16:07:01 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 1160 bytes )
10/02/19 16:07:01 DB : phase1 resend event scheduled ( ref count = 2 )
10/02/19 16:07:01 <- : recv IKE packet 216.19.100.122:500 -> 10.0.2.15:500 ( 388 bytes )
10/02/19 16:07:01 DB : phase1 found
10/02/19 16:07:01 ii : processing phase1 packet ( 388 bytes )
10/02/19 16:07:01 =< : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 =< : message 00000000
10/02/19 16:07:01 << : security association payload
10/02/19 16:07:01 << : - propsal #1 payload 
10/02/19 16:07:01 << : -- transform #13 payload 
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != aes )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != aes )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != aes )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != aes )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != aes )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != aes )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != blowfish )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != blowfish )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != blowfish )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != blowfish )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != blowfish )
10/02/19 16:07:01 ii : unmatched isakmp proposal/transform
10/02/19 16:07:01 ii : cipher type ( 3des != blowfish )
10/02/19 16:07:01 ii : matched isakmp proposal #1 transform #13
10/02/19 16:07:01 ii : - transform    = ike
10/02/19 16:07:01 ii : - cipher type  = 3des
10/02/19 16:07:01 ii : - key length   = default
10/02/19 16:07:01 ii : - hash type    = md5
10/02/19 16:07:01 ii : - dh group     = modp-1024
10/02/19 16:07:01 ii : - auth type    = xauth-initiator-psk
10/02/19 16:07:01 ii : - life seconds = 86400
10/02/19 16:07:01 ii : - life kbytes  = 0
10/02/19 16:07:01 << : key exchange payload
10/02/19 16:07:01 << : nonce payload
10/02/19 16:07:01 << : identification payload
10/02/19 16:07:01 ii : phase1 id target is any
10/02/19 16:07:01 ii : phase1 id match 
10/02/19 16:07:01 ii : received = ipv4-host 216.19.100.122
10/02/19 16:07:01 << : hash payload
10/02/19 16:07:01 << : vendor id payload
10/02/19 16:07:01 ii : peer is CISCO UNITY compatible
10/02/19 16:07:01 << : vendor id payload
10/02/19 16:07:01 ii : peer supports XAUTH
10/02/19 16:07:01 << : vendor id payload
10/02/19 16:07:01 ii : peer supports DPDv1
10/02/19 16:07:01 << : vendor id payload
10/02/19 16:07:01 ii : unknown vendor id ( 20 bytes )
10/02/19 16:07:01 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
10/02/19 16:07:01 << : vendor id payload
10/02/19 16:07:01 ii : unknown vendor id ( 16 bytes )
10/02/19 16:07:01 0x : 4482ae67 aaa2dba4 c08360bd 7e17ee98
10/02/19 16:07:01 << : vendor id payload
10/02/19 16:07:01 ii : unknown vendor id ( 16 bytes )
10/02/19 16:07:01 0x : 1f07f70e aa6514d3 b0fa9654 2a500401
10/02/19 16:07:01 ii : nat-t is unsupported by remote peer
10/02/19 16:07:01 == : DH shared secret ( 128 bytes )
10/02/19 16:07:01 == : SETKEYID ( 16 bytes )
10/02/19 16:07:01 == : SETKEYID_d ( 16 bytes )
10/02/19 16:07:01 == : SETKEYID_a ( 16 bytes )
10/02/19 16:07:01 == : SETKEYID_e ( 16 bytes )
10/02/19 16:07:01 == : cipher key ( 32 bytes )
10/02/19 16:07:01 == : cipher iv ( 8 bytes )
10/02/19 16:07:01 == : phase1 hash_i ( computed ) ( 16 bytes )
10/02/19 16:07:01 >> : hash payload
10/02/19 16:07:01 >= : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 >= : message 00000000
10/02/19 16:07:01 >= : encrypt iv ( 8 bytes )
10/02/19 16:07:01 == : encrypt packet ( 48 bytes )
10/02/19 16:07:01 == : stored iv ( 8 bytes )
10/02/19 16:07:01 DB : phase1 resend event canceled ( ref count = 1 )
10/02/19 16:07:01 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 80 bytes )
10/02/19 16:07:01 == : phase1 hash_r ( computed ) ( 16 bytes )
10/02/19 16:07:01 == : phase1 hash_r ( received ) ( 16 bytes )
10/02/19 16:07:01 ii : phase1 sa established
10/02/19 16:07:01 ii : 216.19.100.122:500 <-> 10.0.2.15:500
10/02/19 16:07:01 ii : 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 ii : sending peer INITIAL-CONTACT notification
10/02/19 16:07:01 ii : - 10.0.2.15:500 -> 216.19.100.122:500
10/02/19 16:07:01 ii : - isakmp spi = 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 ii : - data size 0
10/02/19 16:07:01 >> : hash payload
10/02/19 16:07:01 >> : notification payload
10/02/19 16:07:01 == : new informational hash ( 16 bytes )
10/02/19 16:07:01 == : new informational iv ( 8 bytes )
10/02/19 16:07:01 >= : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 >= : message 2681f11b
10/02/19 16:07:01 >= : encrypt iv ( 8 bytes )
10/02/19 16:07:01 == : encrypt packet ( 76 bytes )
10/02/19 16:07:01 == : stored iv ( 8 bytes )
10/02/19 16:07:01 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 104 bytes )
10/02/19 16:07:01 DB : phase2 not found
10/02/19 16:07:01 <- : recv IKE packet 216.19.100.122:500 -> 10.0.2.15:500 ( 108 bytes )
10/02/19 16:07:01 DB : phase1 found
10/02/19 16:07:01 ii : processing config packet ( 108 bytes )
10/02/19 16:07:01 DB : config not found
10/02/19 16:07:01 DB : config added ( obj count = 1 )
10/02/19 16:07:01 == : new config iv ( 8 bytes )
10/02/19 16:07:01 =< : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 =< : message f5c44783
10/02/19 16:07:01 =< : decrypt iv ( 8 bytes )
10/02/19 16:07:01 == : decrypt packet ( 108 bytes )
10/02/19 16:07:01 <= : trimmed packet padding ( 4 bytes )
10/02/19 16:07:01 <= : stored iv ( 8 bytes )
10/02/19 16:07:01 << : hash payload
10/02/19 16:07:01 << : attribute payload
10/02/19 16:07:01 == : configure hash_i ( computed ) ( 16 bytes )
10/02/19 16:07:01 == : configure hash_c ( computed ) ( 16 bytes )
10/02/19 16:07:01 ii : configure hash verified
10/02/19 16:07:01 ii : - xauth authentication type
10/02/19 16:07:01 ii : - xauth username
10/02/19 16:07:01 !! : warning, unhandled xauth attribute 32136
10/02/19 16:07:01 ii : - xauth passcode
10/02/19 16:07:01 ii : received basic xauth request - Enter Username and Password.
10/02/19 16:07:01 ii : - standard xauth username
10/02/19 16:07:01 ii : - standard xauth passcode
10/02/19 16:07:01 ii : sending xauth response for jsteskal
10/02/19 16:07:01 >> : hash payload
10/02/19 16:07:01 >> : attribute payload
10/02/19 16:07:01 == : new configure hash ( 16 bytes )
10/02/19 16:07:01 >= : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:01 >= : message f5c44783
10/02/19 16:07:01 >= : encrypt iv ( 8 bytes )
10/02/19 16:07:01 == : encrypt packet ( 86 bytes )
10/02/19 16:07:01 == : stored iv ( 8 bytes )
10/02/19 16:07:01 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 120 bytes )
10/02/19 16:07:01 DB : config resend event scheduled ( ref count = 2 )
10/02/19 16:07:03 <- : recv IKE packet 216.19.100.122:500 -> 10.0.2.15:500 ( 60 bytes )
10/02/19 16:07:03 DB : phase1 found
10/02/19 16:07:03 ii : processing config packet ( 60 bytes )
10/02/19 16:07:03 DB : config found
10/02/19 16:07:03 == : new config iv ( 8 bytes )
10/02/19 16:07:03 =< : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:03 =< : message bb1d7555
10/02/19 16:07:03 =< : decrypt iv ( 8 bytes )
10/02/19 16:07:03 == : decrypt packet ( 60 bytes )
10/02/19 16:07:03 <= : stored iv ( 8 bytes )
10/02/19 16:07:03 << : hash payload
10/02/19 16:07:03 << : attribute payload
10/02/19 16:07:03 == : configure hash_i ( computed ) ( 16 bytes )
10/02/19 16:07:03 == : configure hash_c ( computed ) ( 16 bytes )
10/02/19 16:07:03 ii : configure hash verified
10/02/19 16:07:03 ii : received xauth result - 
10/02/19 16:07:03 ii : user jsteskal authentication succeeded
10/02/19 16:07:03 ii : sending xauth acknowledge
10/02/19 16:07:03 >> : hash payload
10/02/19 16:07:03 >> : attribute payload
10/02/19 16:07:03 == : new configure hash ( 16 bytes )
10/02/19 16:07:03 >= : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:03 >= : message bb1d7555
10/02/19 16:07:03 >= : encrypt iv ( 8 bytes )
10/02/19 16:07:03 == : encrypt packet ( 56 bytes )
10/02/19 16:07:03 == : stored iv ( 8 bytes )
10/02/19 16:07:03 DB : config resend event canceled ( ref count = 1 )
10/02/19 16:07:03 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 88 bytes )
10/02/19 16:07:03 DB : config resend event scheduled ( ref count = 2 )
10/02/19 16:07:03 ii : building config attribute list
10/02/19 16:07:03 ii : - IP4 Address
10/02/19 16:07:03 ii : - Address Expiry
10/02/19 16:07:03 ii : - IP4 Netamask
10/02/19 16:07:03 ii : - IP4 DNS Server
10/02/19 16:07:03 ii : - IP4 WINS Server
10/02/19 16:07:03 ii : - DNS Suffix
10/02/19 16:07:03 ii : - Split DNS Domain
10/02/19 16:07:03 ii : - Login Banner
10/02/19 16:07:03 ii : - PFS Group
10/02/19 16:07:03 ii : - Save Password
10/02/19 16:07:03 ii : - Application Version = Cisco Systems VPN Client 4.8.01.0300:WinNT
10/02/19 16:07:03 ii : - Firewall Type = CISCO-UNKNOWN
10/02/19 16:07:03 == : new config iv ( 8 bytes )
10/02/19 16:07:03 ii : sending config pull request
10/02/19 16:07:03 >> : hash payload
10/02/19 16:07:03 >> : attribute payload
10/02/19 16:07:03 == : new configure hash ( 16 bytes )
10/02/19 16:07:03 >= : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:03 >= : message 9be9abf0
10/02/19 16:07:03 >= : encrypt iv ( 8 bytes )
10/02/19 16:07:03 == : encrypt packet ( 158 bytes )
10/02/19 16:07:03 == : stored iv ( 8 bytes )
10/02/19 16:07:03 DB : config resend event canceled ( ref count = 1 )
10/02/19 16:07:03 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 192 bytes )
10/02/19 16:07:03 DB : config resend event scheduled ( ref count = 2 )
10/02/19 16:07:04 <- : recv IKE packet 216.19.100.122:500 -> 10.0.2.15:500 ( 492 bytes )
10/02/19 16:07:04 DB : phase1 found
10/02/19 16:07:04 ii : processing config packet ( 492 bytes )
10/02/19 16:07:04 DB : config found
10/02/19 16:07:04 =< : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:04 =< : message 9be9abf0
10/02/19 16:07:04 =< : decrypt iv ( 8 bytes )
10/02/19 16:07:04 == : decrypt packet ( 492 bytes )
10/02/19 16:07:04 <= : trimmed packet padding ( 6 bytes )
10/02/19 16:07:04 <= : stored iv ( 8 bytes )
10/02/19 16:07:04 << : hash payload
10/02/19 16:07:04 << : attribute payload
10/02/19 16:07:04 == : configure hash_i ( computed ) ( 16 bytes )
10/02/19 16:07:04 == : configure hash_c ( computed ) ( 16 bytes )
10/02/19 16:07:04 ii : configure hash verified
10/02/19 16:07:04 ii : received config pull response
10/02/19 16:07:04 ii : - IP4 Address = 10.238.252.55
10/02/19 16:07:04 ii : - IP4 Netmask = 255.255.252.0
10/02/19 16:07:04 ii : - IP4 DNS Server = 172.25.53.201
10/02/19 16:07:04 ii : - IP4 DNS Server = 172.25.53.202
10/02/19 16:07:04 ii : - IP4 WINS Server = 172.25.53.201
10/02/19 16:07:04 ii : - IP4 WINS Server = 172.25.53.202
10/02/19 16:07:04 ii : - Login Banner = This is a priva ...
10/02/19 16:07:04 ii : - Save Password = 0
10/02/19 16:07:04 ii : - DNS Suffix = na.choicepoint.net
10/02/19 16:07:04 ii : - PFS Group = 1
10/02/19 16:07:04 ii : - Application Version = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.1.7.F built by vmurphy on May 17 2005 00:23:08
10/02/19 16:07:04 DB : config resend event canceled ( ref count = 1 )
10/02/19 16:07:04 ii : enabled adapter ROOT\VNET\0000 
10/02/19 16:07:04 ii : apapter ROOT\VNET\0000 MTU is 1500
10/02/19 16:07:04 ii : creating NONE INBOUND policy ANY:216.19.100.122:* -> ANY:10.0.2.15:*
10/02/19 16:07:04 DB : policy added ( obj count = 1 )
10/02/19 16:07:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 DB : policy found
10/02/19 16:07:04 ii : creating NONE OUTBOUND policy ANY:10.0.2.15:* -> ANY:216.19.100.122:*
10/02/19 16:07:04 ii : created NONE policy route for 216.19.100.122/32
10/02/19 16:07:04 DB : policy added ( obj count = 2 )
10/02/19 16:07:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 DB : policy found
10/02/19 16:07:04 ii : calling init phase2 for initial policy
10/02/19 16:07:04 DB : policy found
10/02/19 16:07:04 DB : policy not found
10/02/19 16:07:04 !! : unable to locate inbound policy for init phase2
10/02/19 16:07:04 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:10.238.252.55:*
10/02/19 16:07:04 DB : policy added ( obj count = 3 )
10/02/19 16:07:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 DB : policy found
10/02/19 16:07:04 ii : creating IPSEC OUTBOUND policy ANY:10.238.252.55:* -> ANY:0.0.0.0/0:*
10/02/19 16:07:04 ii : created IPSEC policy route for 0.0.0.0
10/02/19 16:07:04 DB : policy added ( obj count = 4 )
10/02/19 16:07:04 K> : send pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 K< : recv pfkey X_SPDADD UNSPEC message
10/02/19 16:07:04 DB : policy found
10/02/19 16:07:04 ii : split DNS bypassed ( no split domains defined )
10/02/19 16:07:08 K< : recv pfkey ACQUIRE UNSPEC message
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 DB : tunnel found
10/02/19 16:07:08 DB : new phase2 ( IPSEC initiator )
10/02/19 16:07:08 DB : phase2 added ( obj count = 1 )
10/02/19 16:07:08 K> : send pfkey GETSPI ESP message
10/02/19 16:07:08 K< : recv pfkey GETSPI ESP message
10/02/19 16:07:08 DB : phase2 found
10/02/19 16:07:08 ii : updated spi for 1 ipsec-esp proposal
10/02/19 16:07:08 DB : phase1 found
10/02/19 16:07:08 >> : hash payload
10/02/19 16:07:08 >> : security association payload
10/02/19 16:07:08 >> : - proposal #1 payload 
10/02/19 16:07:08 >> : -- transform #1 payload 
10/02/19 16:07:08 >> : -- transform #2 payload 
10/02/19 16:07:08 >> : -- transform #3 payload 
10/02/19 16:07:08 >> : -- transform #4 payload 
10/02/19 16:07:08 >> : -- transform #5 payload 
10/02/19 16:07:08 >> : -- transform #6 payload 
10/02/19 16:07:08 >> : -- transform #7 payload 
10/02/19 16:07:08 >> : -- transform #8 payload 
10/02/19 16:07:08 >> : -- transform #9 payload 
10/02/19 16:07:08 >> : -- transform #10 payload 
10/02/19 16:07:08 >> : -- transform #11 payload 
10/02/19 16:07:08 >> : -- transform #12 payload 
10/02/19 16:07:08 >> : -- transform #13 payload 
10/02/19 16:07:08 >> : -- transform #14 payload 
10/02/19 16:07:08 >> : -- transform #15 payload 
10/02/19 16:07:08 >> : -- transform #16 payload 
10/02/19 16:07:08 >> : -- transform #17 payload 
10/02/19 16:07:08 >> : -- transform #18 payload 
10/02/19 16:07:08 >> : nonce payload
10/02/19 16:07:08 >> : key exchange payload
10/02/19 16:07:08 >> : identification payload
10/02/19 16:07:08 >> : identification payload
10/02/19 16:07:08 == : phase2 hash_i ( input ) ( 804 bytes )
10/02/19 16:07:08 == : phase2 hash_i ( computed ) ( 16 bytes )
10/02/19 16:07:08 == : new phase2 iv ( 8 bytes )
10/02/19 16:07:08 >= : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:08 >= : message 35005d57
10/02/19 16:07:08 >= : encrypt iv ( 8 bytes )
10/02/19 16:07:08 == : encrypt packet ( 848 bytes )
10/02/19 16:07:08 == : stored iv ( 8 bytes )
10/02/19 16:07:08 -> : send IKE packet 10.0.2.15:500 -> 216.19.100.122:500 ( 880 bytes )
10/02/19 16:07:08 DB : phase2 resend event scheduled ( ref count = 2 )
10/02/19 16:07:08 <- : recv IKE packet 216.19.100.122:500 -> 10.0.2.15:500 ( 76 bytes )
10/02/19 16:07:08 DB : phase1 found
10/02/19 16:07:08 ii : processing informational packet ( 76 bytes )
10/02/19 16:07:08 == : new informational iv ( 8 bytes )
10/02/19 16:07:08 =< : cookies 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:08 =< : message 1ad3b768
10/02/19 16:07:08 =< : decrypt iv ( 8 bytes )
10/02/19 16:07:08 == : decrypt packet ( 76 bytes )
10/02/19 16:07:08 <= : stored iv ( 8 bytes )
10/02/19 16:07:08 << : hash payload
10/02/19 16:07:08 << : delete payload
10/02/19 16:07:08 == : informational hash_i ( computed ) ( 16 bytes )
10/02/19 16:07:08 == : informational hash_c ( received ) ( 16 bytes )
10/02/19 16:07:08 ii : informational hash verified
10/02/19 16:07:08 ii : received peer DELETE message
10/02/19 16:07:08 ii : - 216.19.100.122:500 -> 10.0.2.15:500
10/02/19 16:07:08 ii : - isakmp spi = 752635eaec506a6e:b145097aaaa3dba4
10/02/19 16:07:08 DB : phase1 found
10/02/19 16:07:08 ii : cleanup, marked phase1 752635eaec506a6e:b145097aaaa3dba4 for removal
10/02/19 16:07:08 DB : phase1 soft event canceled ( ref count = 4 )
10/02/19 16:07:08 DB : phase1 hard event canceled ( ref count = 3 )
10/02/19 16:07:08 DB : phase1 dead event canceled ( ref count = 2 )
10/02/19 16:07:08 DB : config deleted ( obj count = 0 )
10/02/19 16:07:08 ii : phase1 removal before expire time
10/02/19 16:07:08 DB : phase1 not found
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:10.238.252.55:*
10/02/19 16:07:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 ii : removing IPSEC OUTBOUND policy ANY:10.238.252.55:* -> ANY:0.0.0.0/0:*
10/02/19 16:07:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 ii : removed IPSEC policy route for ANY:0.0.0.0/0:*
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 ii : removing NONE INBOUND policy ANY:216.19.100.122:* -> ANY:10.0.2.15:*
10/02/19 16:07:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 ii : removing NONE OUTBOUND policy ANY:10.0.2.15:* -> ANY:216.19.100.122:*
10/02/19 16:07:08 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 ii : removed NONE policy route for ANY:216.19.100.122:*
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 DB : phase1 deleted ( obj count = 0 )
10/02/19 16:07:08 DB : policy deleted ( obj count = 3 )
10/02/19 16:07:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 DB : policy deleted ( obj count = 2 )
10/02/19 16:07:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 DB : policy deleted ( obj count = 1 )
10/02/19 16:07:08 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/02/19 16:07:08 DB : policy found
10/02/19 16:07:08 DB : policy deleted ( obj count = 0 )
10/02/19 16:07:08 ii : disable adapter ROOT\VNET\0000
10/02/19 16:07:09 DB : tunnel dpd event canceled ( ref count = 3 )
10/02/19 16:07:09 DB : tunnel stats event canceled ( ref count = 2 )
10/02/19 16:07:09 DB : removing tunnel config references
10/02/19 16:07:09 DB : removing tunnel phase2 references
10/02/19 16:07:09 DB : phase2 resend event canceled ( ref count = 1 )
10/02/19 16:07:09 ii : phase2 removal before expire time
10/02/19 16:07:09 DB : phase2 deleted ( obj count = 0 )
10/02/19 16:07:09 DB : removing tunnel phase1 references
10/02/19 16:07:09 DB : tunnel deleted ( obj count = 0 )
10/02/19 16:07:09 DB : removing all peer tunnel refrences
10/02/19 16:07:09 DB : peer deleted ( obj count = 0 )
10/02/19 16:07:09 ii : ipc client process thread exit ..

Can you please help.

Thanks,

John

steskalj at yahoo.com


      
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20100219/2f76c913/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: iked.log
Type: application/octet-stream
Size: 23499 bytes
Desc: not available
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20100219/2f76c913/attachment-0001.obj>


More information about the vpn-help mailing list