Cisco Systems VPN Client Version 5.0.03.0530 Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 3 Config file directory: C:\Programme\Cisco Systems\VPN Client\ 1 13:45:19.804 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 2 13:45:21.587 07/08/09 Sev=Info/6 GUI/0x63B0000D Disconnecting VPN connection. 3 13:45:21.587 07/08/09 Sev=Info/4 CM/0x6310000A Secure connections terminated 4 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 5 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.250.140.242 6 13:45:21.587 07/08/09 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 6E4718D1 INBOUND SPI = 1969986D) 7 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000049 Discarding IPsec SA negotiation, MsgID=B80433D4 8 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A39B8823916D6910 R_Cookie=A7C7EFC9B93A3CD1) reason = DEL_REASON_RESET_SADB 9 13:45:21.587 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.250.140.242 10 13:45:21.597 07/08/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 137.250.137.175 137.250.137.175 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 137.250.136.0 255.255.252.0 137.250.137.175 137.250.137.175 20 137.250.137.175 255.255.255.255 127.0.0.1 127.0.0.1 20 137.250.140.242 255.255.255.255 192.168.1.1 192.168.1.4 1 137.250.255.255 255.255.255.255 137.250.137.175 137.250.137.175 20 192.168.1.0 255.255.255.0 192.168.1.4 192.168.1.4 20 192.168.1.4 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.1.255 255.255.255.255 192.168.1.4 192.168.1.4 20 224.0.0.0 240.0.0.0 137.250.137.175 137.250.137.175 20 224.0.0.0 240.0.0.0 192.168.1.4 192.168.1.4 20 255.255.255.255 255.255.255.255 137.250.137.175 137.250.137.175 1 255.255.255.255 255.255.255.255 192.168.1.4 192.168.1.4 1 11 13:45:21.607 07/08/09 Sev=Info/6 CM/0x63100037 The routing table was returned to original state prior to Virtual Adapter 12 13:45:22.178 07/08/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.4 20 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 192.168.1.0 255.255.255.0 192.168.1.4 192.168.1.4 20 192.168.1.4 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.1.255 255.255.255.255 192.168.1.4 192.168.1.4 20 224.0.0.0 240.0.0.0 192.168.1.4 192.168.1.4 20 255.255.255.255 255.255.255.255 192.168.1.4 192.168.1.4 1 13 13:45:22.178 07/08/09 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 14 13:45:22.178 07/08/09 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=A39B8823916D6910 R_Cookie=A7C7EFC9B93A3CD1) reason = DEL_REASON_RESET_SADB 15 13:45:22.178 07/08/09 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 16 13:45:22.178 07/08/09 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 17 13:45:22.178 07/08/09 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.250.140.242 disconnected: duration: 0 days 0:1:43 18 13:45:22.188 07/08/09 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0. 19 13:45:22.198 07/08/09 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully 20 13:45:22.198 07/08/09 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 21 13:45:22.208 07/08/09 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0. 22 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x6d986919 23 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x6d986919 24 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd118476e 25 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd118476e 26 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 27 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 28 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 29 13:45:22.208 07/08/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 30 13:45:23.249 07/08/09 Sev=Info/4 CM/0x63100002 Begin connection process 31 13:45:23.269 07/08/09 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully 32 13:45:23.269 07/08/09 Sev=Info/4 CM/0x63100004 Establish secure connection 33 13:45:23.269 07/08/09 Sev=Info/4 CM/0x63100024 Attempt connection with server "vpn.uni-augsburg.de" 34 13:45:23.340 07/08/09 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.250.140.240. 35 13:45:23.370 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 137.250.140.240 36 13:45:23.370 07/08/09 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 37 13:45:23.370 07/08/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 38 13:45:23.370 07/08/09 Sev=Info/6 IPSEC/0x6370002C Sent 573 packets, 0 were fragmented. 39 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 40 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 41 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 42 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 43 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 44 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 45 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 46 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 47 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 48 13:45:23.850 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 49 13:45:23.850 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 50 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 51 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 52 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 53 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 54 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 55 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 56 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 57 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 58 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 59 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 60 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.240 61 13:45:23.860 07/08/09 Sev=Info/5 IKE/0x63000073 All fragments received. 62 13:45:23.860 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, CERT, CERT, CERT, CERT, SIG, VID(Unity), VID(Xauth), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 137.250.140.240 63 13:45:23.860 07/08/09 Sev=Info/4 CERT/0x6360000E Discarding ROOT CA cert sent from peer. 64 13:45:23.870 07/08/09 Sev=Info/4 CERT/0x63600015 Cert (cn=vpn1.rz.uni-augsburg.de,ou=Rechenzentrum,o=Universitaet Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded. 65 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 66 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 67 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports NAT-T 68 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 69 13:45:23.880 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 70 13:45:23.900 07/08/09 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 71 13:45:23.900 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NOTIFY:PRESHARED_KEY_HASH, NAT-D, NAT-D, VID(?), VID(Unity)) to 137.250.140.240 72 13:45:23.900 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 73 13:45:23.900 07/08/09 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194 74 13:45:23.900 07/08/09 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device 75 13:45:23.900 07/08/09 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 76 13:45:23.980 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.240 77 13:45:23.980 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.250.140.240 78 13:45:23.980 07/08/09 Sev=Info/4 CM/0x6310001B Received alternative server address "137.250.140.242" from primary server 79 13:45:25.593 07/08/09 Sev=Info/6 GUI/0x63B00012 Authentication request attributes is 7h. 80 13:45:23.980 07/08/09 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A84B134FB531D88B R_Cookie=64C6E6D518531AA2) reason = DEL_REASON_LOAD_BALANCING 81 13:45:23.980 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.250.140.240 82 13:45:24.852 07/08/09 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=A84B134FB531D88B R_Cookie=64C6E6D518531AA2) reason = DEL_REASON_LOAD_BALANCING 83 13:45:24.852 07/08/09 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "vpn.uni-augsburg.de" because of "DEL_REASON_LOAD_BALANCING" 84 13:45:24.852 07/08/09 Sev=Info/4 CM/0x63100010 Try alternative server "137.250.140.242" given by the primary server 85 13:45:24.852 07/08/09 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.250.140.242" 86 13:45:24.862 07/08/09 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.250.140.242. 87 13:45:24.882 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 137.250.140.242 88 13:45:25.423 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 89 13:45:25.423 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 90 13:45:25.423 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 91 13:45:25.423 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 92 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 93 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 94 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 95 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 96 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 97 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 98 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 99 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 100 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 101 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 102 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 103 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 104 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 105 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 106 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 107 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 108 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 109 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (FRAG) from 137.250.140.242 110 13:45:25.433 07/08/09 Sev=Info/5 IKE/0x63000073 All fragments received. 111 13:45:25.433 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, CERT, CERT, CERT, CERT, SIG, VID(Unity), VID(Xauth), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 137.250.140.242 112 13:45:25.433 07/08/09 Sev=Info/4 CERT/0x6360000E Discarding ROOT CA cert sent from peer. 113 13:45:25.483 07/08/09 Sev=Info/4 CERT/0x63600015 Cert (cn=vpn1.rz.uni-augsburg.de,ou=Rechenzentrum,o=Universitaet Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded. 114 13:45:25.483 07/08/09 Sev=Info/4 CERT/0x63600015 Cert (cn=vpn1.rz.uni-augsburg.de,ou=Rechenzentrum,o=Universitaet Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded. 115 13:45:25.493 07/08/09 Sev=Info/4 CERT/0x63600015 Cert (cn=vpn1.rz.uni-augsburg.de,ou=Rechenzentrum,o=Universitaet Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded. 116 13:45:25.503 07/08/09 Sev=Info/4 CERT/0x63600015 Cert (cn=vpn2.rz.uni-augsburg.de,ou=Rechenzentrum,o=Universitaet Augsburg,l=Augsburg,st=Bayern,c=DE) verification succeeded. 117 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 118 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 119 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports NAT-T 120 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 121 13:45:25.503 07/08/09 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 122 13:45:25.513 07/08/09 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 123 13:45:25.513 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NOTIFY:PRESHARED_KEY_HASH, NAT-D, NAT-D, VID(?), VID(Unity)) to 137.250.140.242 124 13:45:25.513 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 125 13:45:25.513 07/08/09 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194 126 13:45:25.513 07/08/09 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device 127 13:45:25.513 07/08/09 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 128 13:45:25.583 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 129 13:45:25.583 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.250.140.242 130 13:45:25.583 07/08/09 Sev=Info/4 CM/0x63100015 Launch xAuth application 131 13:45:29.308 07/08/09 Sev=Info/4 CM/0x63100017 xAuth application returned 132 13:45:29.308 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.250.140.242 133 13:45:30.480 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 134 13:45:30.480 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.250.140.242 135 13:45:30.480 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.250.140.242 136 13:45:30.480 07/08/09 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 137 13:45:30.500 07/08/09 Sev=Info/5 IKE/0x6300005E Client sending a firewall request to concentrator 138 13:45:30.510 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.250.140.242 139 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 140 13:45:31.421 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.250.140.242 141 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 137.250.137.116 142 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.252.0 143 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.250.1.254 144 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 137.250.1.30 145 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 137.250.1.20 146 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = Herzlich Willkommen am VPN der Universit??t Augsburg Hinweis: Der gesamte Datenverkehr wird ??ber die Universit??t Augsburg getunnelt! 147 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 148 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000001 149 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.O built by vmurphy on Mar 05 2008 16:24:28 150 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 151 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 152 13:45:31.421 07/08/09 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194 153 13:45:31.431 07/08/09 Sev=Info/4 CM/0x63100019 Mode Config data received 154 13:45:31.431 07/08/09 Sev=Info/4 IKE/0x63000056 Received a key request from Driver: Local IP = 137.250.137.116, GW IP = 137.250.140.242, Remote IP = 0.0.0.0 155 13:45:31.461 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 137.250.140.242 156 13:45:31.461 07/08/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 157 13:45:31.561 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 158 13:45:31.561 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.250.140.242 159 13:45:31.561 07/08/09 Sev=Info/5 IKE/0x63000045 RESPONDER-LIFETIME notify has value of 86400 seconds 160 13:45:31.561 07/08/09 Sev=Info/5 IKE/0x63000047 This SA has already been alive for 7 seconds, setting expiry to 86393 seconds from now 161 13:45:31.591 07/08/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.250.140.242 162 13:45:31.591 07/08/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.250.140.242 163 13:45:31.591 07/08/09 Sev=Info/5 IKE/0x63000045 RESPONDER-LIFETIME notify has value of 28800 seconds 164 13:45:31.611 07/08/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.250.140.242 165 13:45:31.611 07/08/09 Sev=Info/5 IKE/0x63000059 Loading IPsec SA (MsgID=87786B8C OUTBOUND SPI = 0x23BEF5A1 INBOUND SPI = 0xE897968A) 166 13:45:31.611 07/08/09 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x23BEF5A1 167 13:45:31.611 07/08/09 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xE897968A 168 13:45:31.782 07/08/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.4 20 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 192.168.1.0 255.255.255.0 192.168.1.4 192.168.1.4 20 192.168.1.4 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.1.255 255.255.255.255 192.168.1.4 192.168.1.4 20 224.0.0.0 240.0.0.0 192.168.1.4 192.168.1.4 20 255.255.255.255 255.255.255.255 192.168.1.4 192.168.1.4 1 169 13:45:36.899 07/08/09 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=137.250.137.116/255.255.252.0 DNS=137.250.1.254,137.250.1.30 WINS=137.250.1.20,0.0.0.0 Domain= Split DNS Names= 170 13:45:36.899 07/08/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 137.250.137.116 137.250.137.116 1 0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.4 20 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 137.250.136.0 255.255.252.0 137.250.137.116 137.250.137.116 20 137.250.137.116 255.255.255.255 127.0.0.1 127.0.0.1 20 137.250.255.255 255.255.255.255 137.250.137.116 137.250.137.116 20 192.168.1.0 255.255.255.0 192.168.1.4 192.168.1.4 20 192.168.1.4 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.1.255 255.255.255.255 192.168.1.4 192.168.1.4 20 224.0.0.0 240.0.0.0 137.250.137.116 137.250.137.116 20 224.0.0.0 240.0.0.0 192.168.1.4 192.168.1.4 20 255.255.255.255 255.255.255.255 137.250.137.116 137.250.137.116 1 255.255.255.255 255.255.255.255 192.168.1.4 192.168.1.4 1 171 13:45:36.909 07/08/09 Sev=Info/4 CM/0x63100038 Successfully saved route changes to file. 172 13:45:36.909 07/08/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 137.250.137.116 137.250.137.116 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 137.250.136.0 255.255.252.0 137.250.137.116 137.250.137.116 20 137.250.137.116 255.255.255.255 127.0.0.1 127.0.0.1 20 137.250.140.242 255.255.255.255 192.168.1.1 192.168.1.4 1 137.250.255.255 255.255.255.255 137.250.137.116 137.250.137.116 20 192.168.1.0 255.255.255.0 192.168.1.4 192.168.1.4 20 192.168.1.4 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.1.255 255.255.255.255 192.168.1.4 192.168.1.4 20 224.0.0.0 240.0.0.0 137.250.137.116 137.250.137.116 20 224.0.0.0 240.0.0.0 192.168.1.4 192.168.1.4 20 255.255.255.255 255.255.255.255 137.250.137.116 137.250.137.116 1 255.255.255.255 255.255.255.255 192.168.1.4 192.168.1.4 1 173 13:45:36.909 07/08/09 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 174 13:45:36.949 07/08/09 Sev=Info/4 CM/0x6310001A One secure connection established 175 13:45:37.009 07/08/09 Sev=Info/4 CM/0x6310003B Address watch added for 192.168.1.4. Current hostname: Daniel, Current address(es): 137.250.137.116, 192.168.1.4. 176 13:45:37.009 07/08/09 Sev=Info/4 CM/0x6310003B Address watch added for 137.250.137.116. Current hostname: Daniel, Current address(es): 137.250.137.116, 192.168.1.4. 177 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 178 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa1f5be23 into key list 179 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 180 13:45:37.009 07/08/09 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8a9697e8 into key list 181 13:45:37.019 07/08/09 Sev=Info/4 IPSEC/0x6370002F Assigned VA private interface addr 137.250.137.116 182 13:45:37.019 07/08/09 Sev=Info/4 IPSEC/0x63700037 Configure public interface: 192.168.1.4. SG: 137.250.140.242 183 13:45:37.019 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 184 13:45:39.072 07/08/09 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 1. 185 13:45:39.363 07/08/09 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xa1f5be23 for inbound key with SPI=0x8a9697e8 186 13:45:57.368 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 187 13:46:07.383 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 188 13:46:17.397 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 189 13:46:27.412 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 190 13:46:37.426 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 191 13:46:47.440 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA 192 13:46:57.455 07/08/09 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA