El problema me surge al intentar acceder al servidor de VPN que proporciona telefónica con un ordenador con SO WIndows 2000 server SP4. Una vez establecida la conexión da varios fallos y antes de los 2 minutos se desconecta. Además justo al cortarse pierdo la conexión a internet en ese ordenador y tengo que deshabilitar y rehabilitar la conexión de red.
Posteo aquí el archivo LOG del VPN Client v 4.6.03.0021.
PD: La misma conexion la realizo con un pc con Windows XP SP2 y conecta y mantiene la conexión sin problemas.
Cisco Systems VPN Client Version 4.6.03.0021
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.0.2195 Service Pack 4
Config file directory: C:\Archivos de programa\Cisco Systems\VPN Client
1 17:59:15.875 10/04/06 Sev=Info/4 CM/0x63100002
Begin connection process
2 17:59:15.906 10/04/06 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
3 17:59:15.906 10/04/06 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
4 17:59:15.906 10/04/06 Sev=Info/4 CM/0x63100024
Attempt connection with server "XXXXXXXXXXXXXX.XXXXX.XXXX-XXX.XXX"
5 17:59:17.046 10/04/06 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with XX.XX.XX.XX.
6 17:59:17.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to XX.XX.XX.XX
7 17:59:17.078 10/04/06 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
8 17:59:17.078 10/04/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
9 17:59:17.078 10/04/06 Sev=Info/6 IPSEC/0x6370002C
Sent 75 packets, 0 were fragmented.
10 17:59:17.328 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
11 17:59:17.343 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
12 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
13 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001
Peer supports DPD
14 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
15 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
16 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
17 17:59:17.359 10/04/06 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
18 17:59:17.359 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to XX.XX.XX.XX
19 17:59:17.359 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
20 17:59:17.375 10/04/06 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
21 17:59:17.375 10/04/06 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
22 17:59:17.375 10/04/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
23 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
24 17:59:17.437 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
25 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86399 seconds
26 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 0 seconds, setting expiry to 86399 seconds from now
27 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
28 17:59:17.437 10/04/06 Sev=Warning/2 IKE/0xA3000062
Attempted incoming connection from XX.XX.XX.XX. Inbound connections are not allowed.
29 17:59:17.453 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
30 17:59:17.453 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
31 17:59:17.453 10/04/06 Sev=Info/4 CM/0x63100015
Launch xAuth application
32 17:59:22.437 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
33 17:59:22.437 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
34 17:59:22.828 10/04/06 Sev=Info/4 CM/0x63100017
xAuth application returned
35 17:59:22.828 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX
36 17:59:23.031 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
37 17:59:23.031 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
38 17:59:23.031 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX
39 17:59:23.031 10/04/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
40 17:59:23.078 10/04/06 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
41 17:59:23.078 10/04/06 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).
42 17:59:23.078 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX
43 17:59:23.140 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
44 17:59:23.156 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
45 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.227.0.3
46 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 80.58.0.33
47 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 80.58.32.97
48 17:59:23.156 10/04/06 Sev=Info/5 IKE/0xA3000017
MODE_CFG_REPLY: The received (INTERNAL_ADDRESS_EXPIRY) attribute and value (1345986657) is not supported
49 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000
50 17:59:23.156 10/04/06 Sev=Info/5 IKE/0xA3000015
MODE_CFG_REPLY: Received MODECFG_UNITY_SPLITDNS_NAME attribute with no data
51 17:59:23.171 10/04/06 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco IOS Software, 7200 Software (C7200-JK9S-M), Version 12.3(11)T7, RELEASE SOFTWARE (fc3)
Technical Support: cisco.com/c/en/us/support/index.html
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Sat 30-Jul-05 02:14 by dchih
52 17:59:23.171 10/04/06 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
53 17:59:23.171 10/04/06 Sev=Info/4 CM/0x63100019
Mode Config data received
54 17:59:23.187 10/04/06 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 10.227.0.3, GW IP = XX.XX.XX.XX, Remote IP = 0.0.0.0
55 17:59:23.187 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to XX.XX.XX.XX
56 17:59:23.359 10/04/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = XX.XX.XX.XX
57 17:59:23.359 10/04/06 Sev=Info/4 IKE/0x63000014
RECEIVING
58 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 10400 seconds
59 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000046
RESPONDER-LIFETIME notify has value of 4608000 kb
60 17:59:23.375 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to XX.XX.XX.XX
61 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=3F57A59C OUTBOUND SPI = 0xDBD61777 INBOUND SPI = 0xED7957F5)
62 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0xDBD61777
63 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0xED7957F5
64 17:59:23.671 10/04/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1
65 17:59:36.750 10/04/06 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=10.227.0.3/255.0.0.0
DNS=80.58.0.33,80.58.32.97
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=
66 17:59:36.765 10/04/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1
67 17:59:36.781 10/04/06 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413
68 17:59:36.781 10/04/06 Sev=Warning/2 CM/0xA3100025
Unable to delete route. Network: c0a80000, Netmask: ffffff00, Interface: c0a8000a, Gateway: c0a8000a.
69 17:59:36.781 10/04/06 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413
70 17:59:36.781 10/04/06 Sev=Warning/2 CM/0xA3100025
Unable to delete route. Network: c0a80100, Netmask: ffffff00, Interface: c0a8010a, Gateway: c0a8010a.
71 17:59:36.781 10/04/06 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.
72 17:59:36.796 10/04/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.227.0.3 10.227.0.3 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
XX.XX.XX.XX 255.255.255.255 192.168.1.1 192.168.1.10 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1
73 17:59:36.796 10/04/06 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter
74 17:59:37.093 10/04/06 Sev=Info/4 CM/0x6310001A
One secure connection established
75 17:59:37.203 10/04/06 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.10. Current hostname: server, Current address(es): 10.227.0.3, 192.168.1.10, 192.168.0.10.
76 17:59:37.250 10/04/06 Sev=Info/4 CM/0x6310003B
Address watch added for 10.227.0.3. Current hostname: server, Current address(es): 10.227.0.3, 192.168.1.10, 192.168.0.10.
77 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
78 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
79 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x7717d6db into key list
80 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700010
Created a new key structure
81 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0xf55779ed into key list
82 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 10.227.0.3
83 17:59:37.250 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
84 17:59:38.062 10/04/06 Sev=Info/4 IPSEC/0x63700019
Activate outbound key with SPI=0x7717d6db for inbound key with SPI=0xf55779ed
85 18:00:18.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
86 18:00:18.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629922
87 18:00:23.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
88 18:00:23.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629923
89 18:00:27.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
90 18:00:28.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
91 18:00:28.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629924
92 18:00:33.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
93 18:00:33.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629925
94 18:00:37.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
95 18:00:38.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
96 18:00:38.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629926
97 18:00:43.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
98 18:00:43.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629927
99 18:00:47.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
100 18:00:48.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
101 18:00:48.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629928
102 18:00:53.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
103 18:00:53.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629929
104 18:00:57.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
105 18:00:58.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
106 18:00:58.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629930
107 18:01:03.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
108 18:01:03.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629931
109 18:01:08.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
110 18:01:08.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629932
111 18:01:13.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
112 18:01:13.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629933
113 18:01:17.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
114 18:01:18.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
115 18:01:18.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629934
116 18:01:23.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
117 18:01:23.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629935
118 18:01:27.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
119 18:01:28.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
120 18:01:28.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629936
121 18:01:33.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
122 18:01:33.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629937
123 18:01:37.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
124 18:01:38.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
125 18:01:38.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629938
126 18:01:43.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX
127 18:01:43.062 10/04/06 Sev=Info/6 IKE/0x6300003D
Sending DPD request to XX.XX.XX.XX, our seq# = 3898629939
128 18:01:47.562 10/04/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
129 18:01:48.062 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to XX.XX.XX.XX
130 18:01:48.062 10/04/06 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = DBD61777 INBOUND SPI = ED7957F5)
131 18:01:48.062 10/04/06 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=3F57A59C
132 18:01:48.078 10/04/06 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=5AFD26ABFE92BD32 R_Cookie=26FDFF5667CD3EE1) reason = DEL_REASON_PEER_NOT_RESPONDING
133 18:01:48.078 10/04/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to XX.XX.XX.XX
134 18:01:48.578 10/04/06 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0xf55779ed
135 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0xf55779ed
136 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x7717d6db
137 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x7717d6db
138 18:01:48.609 10/04/06 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=5AFD26ABFE92BD32 R_Cookie=26FDFF5667CD3EE1) reason = DEL_REASON_PEER_NOT_RESPONDING
139 18:01:48.609 10/04/06 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_PEER_NOT_RESPONDING. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
140 18:01:48.609 10/04/06 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
141 18:01:48.609 10/04/06 Sev=Info/6 CM/0x63100031
Tunnel to headend device XXXXXXXXXXXXXX.XXXXX.XXXX-XXX.XXX disconnected: duration: 0 days 0:2:11
142 18:01:48.671 10/04/06 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
143 18:01:48.671 10/04/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.227.0.3 10.227.0.3 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1
144 18:01:48.687 10/04/06 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413
145 18:01:48.687 10/04/06 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter
146 18:01:49.406 10/04/06 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1
147 18:01:49.406 10/04/06 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled
148 18:01:49.437 10/04/06 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
149 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
150 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
151 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
152 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
Gracias.