Banda Ancha EU

Comunidad de usuarios
de fibra, móvil y ADSL

hosting en interdominios
139 lecturas y 0 respuestas
  • Cerrado

    [Editado 4/10/06 18:15]

    VPN: Conexion VPN Client (cisco sysyem) bajo Win2k server

    El problema me surge al intentar acceder al servidor de VPN que proporciona telefónica con un ordenador con SO WIndows 2000 server SP4. Una vez establecida la conexión da varios fallos y antes de los 2 minutos se desconecta. Además justo al cortarse pierdo la conexión a internet en ese ordenador y tengo que deshabilitar y rehabilitar la conexión de red.
    Posteo aquí el archivo LOG del VPN Client v 4.6.03.0021.

    PD: La misma conexion la realizo con un pc con Windows XP SP2 y conecta y mantiene la conexión sin problemas.

    Cisco Systems VPN Client Version 4.6.03.0021
    Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 5.0.2195 Service Pack 4
    Config file directory: C:\Archivos de programa\Cisco Systems\VPN Client

    1 17:59:15.875 10/04/06 Sev=Info/4 CM/0x63100002

    Begin connection process

    2 17:59:15.906 10/04/06 Sev=Info/4 CVPND/0xE3400001

    Microsoft IPSec Policy Agent service stopped successfully

    3 17:59:15.906 10/04/06 Sev=Info/4 CM/0x63100004

    Establish secure connection using Ethernet

    4 17:59:15.906 10/04/06 Sev=Info/4 CM/0x63100024

    Attempt connection with server "XXXXXXXXXXXXXX.XXXXX.XXXX-XXX.XXX"

    5 17:59:17.046 10/04/06 Sev=Info/6 IKE/0x6300003B

    Attempting to establish a connection with XX.XX.XX.XX.

    6 17:59:17.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to XX.XX.XX.XX

    7 17:59:17.078 10/04/06 Sev=Info/4 IPSEC/0x63700008

    IPSec driver successfully started

    8 17:59:17.078 10/04/06 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

    9 17:59:17.078 10/04/06 Sev=Info/6 IPSEC/0x6370002C

    Sent 75 packets, 0 were fragmented.

    10 17:59:17.328 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    11 17:59:17.343 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    12 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

    Peer is a Cisco-Unity compliant peer

    13 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

    Peer supports DPD

    14 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

    Peer supports DWR Code and DWR Text

    15 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

    Peer supports XAUTH

    16 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

    Peer supports NAT-T

    17 17:59:17.359 10/04/06 Sev=Info/6 IKE/0x63000001

    IOS Vendor ID Contruction successful

    18 17:59:17.359 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to XX.XX.XX.XX

    19 17:59:17.359 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    20 17:59:17.375 10/04/06 Sev=Info/4 IKE/0x63000083

    IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

    21 17:59:17.375 10/04/06 Sev=Info/5 IKE/0x63000072

    Automatic NAT Detection Status:
    Remote end is NOT behind a NAT device
    This end IS behind a NAT device

    22 17:59:17.375 10/04/06 Sev=Info/4 CM/0x6310000E

    Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

    23 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    24 17:59:17.437 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    25 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x63000045

    RESPONDER-LIFETIME notify has value of 86399 seconds

    26 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x63000047

    This SA has already been alive for 0 seconds, setting expiry to 86399 seconds from now

    27 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    28 17:59:17.437 10/04/06 Sev=Warning/2 IKE/0xA3000062

    Attempted incoming connection from XX.XX.XX.XX. Inbound connections are not allowed.

    29 17:59:17.453 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    30 17:59:17.453 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    31 17:59:17.453 10/04/06 Sev=Info/4 CM/0x63100015

    Launch xAuth application

    32 17:59:22.437 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    33 17:59:22.437 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    34 17:59:22.828 10/04/06 Sev=Info/4 CM/0x63100017

    xAuth application returned

    35 17:59:22.828 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX

    36 17:59:23.031 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    37 17:59:23.031 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    38 17:59:23.031 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX

    39 17:59:23.031 10/04/06 Sev=Info/4 CM/0x6310000E

    Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

    40 17:59:23.078 10/04/06 Sev=Info/5 IKE/0x6300005E

    Client sending a firewall request to concentrator

    41 17:59:23.078 10/04/06 Sev=Info/5 IKE/0x6300005D

    Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).

    42 17:59:23.078 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX

    43 17:59:23.140 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    44 17:59:23.156 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    45 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010

    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.227.0.3

    46 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010

    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 80.58.0.33

    47 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010

    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 80.58.32.97

    48 17:59:23.156 10/04/06 Sev=Info/5 IKE/0xA3000017

    MODE_CFG_REPLY: The received (INTERNAL_ADDRESS_EXPIRY) attribute and value (1345986657) is not supported

    49 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x6300000D

    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000

    50 17:59:23.156 10/04/06 Sev=Info/5 IKE/0xA3000015

    MODE_CFG_REPLY: Received MODECFG_UNITY_SPLITDNS_NAME attribute with no data

    51 17:59:23.171 10/04/06 Sev=Info/5 IKE/0x6300000E

    MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco IOS Software, 7200 Software (C7200-JK9S-M), Version 12.3(11)T7, RELEASE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2005 by Cisco Systems, Inc.
    Compiled Sat 30-Jul-05 02:14 by dchih

    52 17:59:23.171 10/04/06 Sev=Info/5 IKE/0x6300000D

    MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194

    53 17:59:23.171 10/04/06 Sev=Info/4 CM/0x63100019

    Mode Config data received

    54 17:59:23.187 10/04/06 Sev=Info/4 IKE/0x63000056

    Received a key request from Driver: Local IP = 10.227.0.3, GW IP = XX.XX.XX.XX, Remote IP = 0.0.0.0

    55 17:59:23.187 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to XX.XX.XX.XX

    56 17:59:23.359 10/04/06 Sev=Info/5 IKE/0x6300002F

    Received ISAKMP packet: peer = XX.XX.XX.XX

    57 17:59:23.359 10/04/06 Sev=Info/4 IKE/0x63000014

    RECEIVING

    58 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000045

    RESPONDER-LIFETIME notify has value of 10400 seconds

    59 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000046

    RESPONDER-LIFETIME notify has value of 4608000 kb

    60 17:59:23.375 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK QM *(HASH) to XX.XX.XX.XX

    61 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000059

    Loading IPsec SA (MsgID=3F57A59C OUTBOUND SPI = 0xDBD61777 INBOUND SPI = 0xED7957F5)

    62 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000025

    Loaded OUTBOUND ESP SPI: 0xDBD61777

    63 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000026

    Loaded INBOUND ESP SPI: 0xED7957F5

    64 17:59:23.671 10/04/06 Sev=Info/5 CVPND/0x63400013

    Destination Netmask Gateway Interface Metric
    0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
    192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
    192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
    224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
    255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
    255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

    65 17:59:36.750 10/04/06 Sev=Info/4 CM/0x63100034

    The Virtual Adapter was enabled:
    IP=10.227.0.3/255.0.0.0
    DNS=80.58.0.33,80.58.32.97
    WINS=0.0.0.0,0.0.0.0
    Domain=
    Split DNS Names=

    66 17:59:36.765 10/04/06 Sev=Info/5 CVPND/0x63400013

    Destination Netmask Gateway Interface Metric
    0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
    0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
    10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
    10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
    10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
    192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
    192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
    224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
    224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
    255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
    255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
    255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

    67 17:59:36.781 10/04/06 Sev=Warning/2 CVPND/0xA3400015

    Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413

    68 17:59:36.781 10/04/06 Sev=Warning/2 CM/0xA3100025

    Unable to delete route. Network: c0a80000, Netmask: ffffff00, Interface: c0a8000a, Gateway: c0a8000a.

    69 17:59:36.781 10/04/06 Sev=Warning/2 CVPND/0xA3400015

    Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413

    70 17:59:36.781 10/04/06 Sev=Warning/2 CM/0xA3100025

    Unable to delete route. Network: c0a80100, Netmask: ffffff00, Interface: c0a8010a, Gateway: c0a8010a.

    71 17:59:36.781 10/04/06 Sev=Info/4 CM/0x63100038

    Successfully saved route changes to file.

    72 17:59:36.796 10/04/06 Sev=Info/5 CVPND/0x63400013

    Destination Netmask Gateway Interface Metric
    0.0.0.0 0.0.0.0 10.227.0.3 10.227.0.3 1
    0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
    10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
    10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
    10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
    XX.XX.XX.XX 255.255.255.255 192.168.1.1 192.168.1.10 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
    192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
    192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
    224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
    224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
    255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
    255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
    255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

    73 17:59:36.796 10/04/06 Sev=Info/6 CM/0x63100036

    The routing table was updated for the Virtual Adapter

    74 17:59:37.093 10/04/06 Sev=Info/4 CM/0x6310001A

    One secure connection established

    75 17:59:37.203 10/04/06 Sev=Info/4 CM/0x6310003B

    Address watch added for 192.168.1.10. Current hostname: server, Current address(es): 10.227.0.3, 192.168.1.10, 192.168.0.10.

    76 17:59:37.250 10/04/06 Sev=Info/4 CM/0x6310003B

    Address watch added for 10.227.0.3. Current hostname: server, Current address(es): 10.227.0.3, 192.168.1.10, 192.168.0.10.

    77 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

    78 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700010

    Created a new key structure

    79 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370000F

    Added key with SPI=0x7717d6db into key list

    80 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700010

    Created a new key structure

    81 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370000F

    Added key with SPI=0xf55779ed into key list

    82 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370002F

    Assigned VA private interface addr 10.227.0.3

    83 17:59:37.250 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    84 17:59:38.062 10/04/06 Sev=Info/4 IPSEC/0x63700019

    Activate outbound key with SPI=0x7717d6db for inbound key with SPI=0xf55779ed

    85 18:00:18.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    86 18:00:18.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629922

    87 18:00:23.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    88 18:00:23.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629923

    89 18:00:27.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    90 18:00:28.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    91 18:00:28.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629924

    92 18:00:33.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    93 18:00:33.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629925

    94 18:00:37.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    95 18:00:38.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    96 18:00:38.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629926

    97 18:00:43.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    98 18:00:43.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629927

    99 18:00:47.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    100 18:00:48.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    101 18:00:48.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629928

    102 18:00:53.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    103 18:00:53.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629929

    104 18:00:57.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    105 18:00:58.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    106 18:00:58.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629930

    107 18:01:03.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    108 18:01:03.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629931

    109 18:01:08.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    110 18:01:08.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629932

    111 18:01:13.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    112 18:01:13.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629933

    113 18:01:17.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    114 18:01:18.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    115 18:01:18.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629934

    116 18:01:23.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    117 18:01:23.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629935

    118 18:01:27.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    119 18:01:28.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    120 18:01:28.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629936

    121 18:01:33.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    122 18:01:33.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629937

    123 18:01:37.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    124 18:01:38.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    125 18:01:38.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629938

    126 18:01:43.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

    127 18:01:43.062 10/04/06 Sev=Info/6 IKE/0x6300003D

    Sending DPD request to XX.XX.XX.XX, our seq# = 3898629939

    128 18:01:47.562 10/04/06 Sev=Info/6 IKE/0x63000055

    Sent a keepalive on the IPSec SA

    129 18:01:48.062 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to XX.XX.XX.XX

    130 18:01:48.062 10/04/06 Sev=Info/5 IKE/0x63000018

    Deleting IPsec SA: (OUTBOUND SPI = DBD61777 INBOUND SPI = ED7957F5)

    131 18:01:48.062 10/04/06 Sev=Info/4 IKE/0x63000049

    Discarding IPsec SA negotiation, MsgID=3F57A59C

    132 18:01:48.078 10/04/06 Sev=Info/4 IKE/0x63000017

    Marking IKE SA for deletion (I_Cookie=5AFD26ABFE92BD32 R_Cookie=26FDFF5667CD3EE1) reason = DEL_REASON_PEER_NOT_RESPONDING

    133 18:01:48.078 10/04/06 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to XX.XX.XX.XX

    134 18:01:48.578 10/04/06 Sev=Info/4 IPSEC/0x63700013

    Delete internal key with SPI=0xf55779ed

    135 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x6370000C

    Key deleted by SPI 0xf55779ed

    136 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x63700013

    Delete internal key with SPI=0x7717d6db

    137 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x6370000C

    Key deleted by SPI 0x7717d6db

    138 18:01:48.609 10/04/06 Sev=Info/4 IKE/0x6300004B

    Discarding IKE SA negotiation (I_Cookie=5AFD26ABFE92BD32 R_Cookie=26FDFF5667CD3EE1) reason = DEL_REASON_PEER_NOT_RESPONDING

    139 18:01:48.609 10/04/06 Sev=Info/4 CM/0x63100013

    Phase 1 SA deleted cause by DEL_REASON_PEER_NOT_RESPONDING. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

    140 18:01:48.609 10/04/06 Sev=Info/5 CM/0x63100025

    Initializing CVPNDrv

    141 18:01:48.609 10/04/06 Sev=Info/6 CM/0x63100031

    Tunnel to headend device XXXXXXXXXXXXXX.XXXXX.XXXX-XXX.XXX disconnected: duration: 0 days 0:2:11

    142 18:01:48.671 10/04/06 Sev=Info/4 IKE/0x63000001

    IKE received signal to terminate VPN connection

    143 18:01:48.671 10/04/06 Sev=Info/5 CVPND/0x63400013

    Destination Netmask Gateway Interface Metric
    0.0.0.0 0.0.0.0 10.227.0.3 10.227.0.3 1
    0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
    10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
    10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
    10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
    192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
    192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
    224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
    224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
    255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
    255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
    255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

    144 18:01:48.687 10/04/06 Sev=Warning/2 CVPND/0xA3400015

    Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413

    145 18:01:48.687 10/04/06 Sev=Info/6 CM/0x63100037

    The routing table was returned to original state prior to Virtual Adapter

    146 18:01:49.406 10/04/06 Sev=Info/5 CVPND/0x63400013

    Destination Netmask Gateway Interface Metric
    0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
    0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
    10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
    10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
    10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
    192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
    192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
    224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
    224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
    224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
    255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
    255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
    255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

    147 18:01:49.406 10/04/06 Sev=Info/4 CM/0x63100035

    The Virtual Adapter was disabled

    148 18:01:49.437 10/04/06 Sev=Info/4 IKE/0x63000086

    Microsoft IPSec Policy Agent service started successfully

    149 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

    150 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

    151 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

    152 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x6370000A

    IPSec driver successfully stopped

    Gracias.

    Este tema es antiguo y puede contener información obsoleta. Abre un nuevo tema para publicar tu mensaje.
    1