Banda Ancha EU

Comunidad de usuarios
de fibra, móvil y ADSL

ADSL/VDSL

VPN: Conexion VPN Client (cisco sysyem) bajo Win2k server

guaki

El problema me surge al intentar acceder al servidor de VPN que proporciona telefónica con un ordenador con SO WIndows 2000 server SP4. Una vez establecida la conexión da varios fallos y antes de los 2 minutos se desconecta. Además justo al cortarse pierdo la conexión a internet en ese ordenador y tengo que deshabilitar y rehabilitar la conexión de red.
Posteo aquí el archivo LOG del VPN Client v 4.6.03.0021.

PD: La misma conexion la realizo con un pc con Windows XP SP2 y conecta y mantiene la conexión sin problemas.

Cisco Systems VPN Client Version 4.6.03.0021
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.0.2195 Service Pack 4
Config file directory: C:\Archivos de programa\Cisco Systems\VPN Client

1 17:59:15.875 10/04/06 Sev=Info/4 CM/0x63100002

Begin connection process

2 17:59:15.906 10/04/06 Sev=Info/4 CVPND/0xE3400001

Microsoft IPSec Policy Agent service stopped successfully

3 17:59:15.906 10/04/06 Sev=Info/4 CM/0x63100004

Establish secure connection using Ethernet

4 17:59:15.906 10/04/06 Sev=Info/4 CM/0x63100024

Attempt connection with server "XXXXXXXXXXXXXX.XXXXX.XXXX-XXX.XXX"

5 17:59:17.046 10/04/06 Sev=Info/6 IKE/0x6300003B

Attempting to establish a connection with XX.XX.XX.XX.

6 17:59:17.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to XX.XX.XX.XX

7 17:59:17.078 10/04/06 Sev=Info/4 IPSEC/0x63700008

IPSec driver successfully started

8 17:59:17.078 10/04/06 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

9 17:59:17.078 10/04/06 Sev=Info/6 IPSEC/0x6370002C

Sent 75 packets, 0 were fragmented.

10 17:59:17.328 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

11 17:59:17.343 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

12 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

Peer is a Cisco-Unity compliant peer

13 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

Peer supports DPD

14 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

Peer supports DWR Code and DWR Text

15 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

Peer supports XAUTH

16 17:59:17.343 10/04/06 Sev=Info/5 IKE/0x63000001

Peer supports NAT-T

17 17:59:17.359 10/04/06 Sev=Info/6 IKE/0x63000001

IOS Vendor ID Contruction successful

18 17:59:17.359 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to XX.XX.XX.XX

19 17:59:17.359 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

20 17:59:17.375 10/04/06 Sev=Info/4 IKE/0x63000083

IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

21 17:59:17.375 10/04/06 Sev=Info/5 IKE/0x63000072

Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device

22 17:59:17.375 10/04/06 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

23 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

24 17:59:17.437 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

25 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x63000045

RESPONDER-LIFETIME notify has value of 86399 seconds

26 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x63000047

This SA has already been alive for 0 seconds, setting expiry to 86399 seconds from now

27 17:59:17.437 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

28 17:59:17.437 10/04/06 Sev=Warning/2 IKE/0xA3000062

Attempted incoming connection from XX.XX.XX.XX. Inbound connections are not allowed.

29 17:59:17.453 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

30 17:59:17.453 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

31 17:59:17.453 10/04/06 Sev=Info/4 CM/0x63100015

Launch xAuth application

32 17:59:22.437 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

33 17:59:22.437 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

34 17:59:22.828 10/04/06 Sev=Info/4 CM/0x63100017

xAuth application returned

35 17:59:22.828 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX

36 17:59:23.031 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

37 17:59:23.031 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

38 17:59:23.031 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX

39 17:59:23.031 10/04/06 Sev=Info/4 CM/0x6310000E

Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

40 17:59:23.078 10/04/06 Sev=Info/5 IKE/0x6300005E

Client sending a firewall request to concentrator

41 17:59:23.078 10/04/06 Sev=Info/5 IKE/0x6300005D

Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).

42 17:59:23.078 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to XX.XX.XX.XX

43 17:59:23.140 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

44 17:59:23.156 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

45 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010

MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.227.0.3

46 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010

MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 80.58.0.33

47 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x63000010

MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 80.58.32.97

48 17:59:23.156 10/04/06 Sev=Info/5 IKE/0xA3000017

MODE_CFG_REPLY: The received (INTERNAL_ADDRESS_EXPIRY) attribute and value (1345986657) is not supported

49 17:59:23.156 10/04/06 Sev=Info/5 IKE/0x6300000D

MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000

50 17:59:23.156 10/04/06 Sev=Info/5 IKE/0xA3000015

MODE_CFG_REPLY: Received MODECFG_UNITY_SPLITDNS_NAME attribute with no data

51 17:59:23.171 10/04/06 Sev=Info/5 IKE/0x6300000E

MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco IOS Software, 7200 Software (C7200-JK9S-M), Version 12.3(11)T7, RELEASE SOFTWARE (fc3)
Technical Support: cisco.com/c/en/us/support/index.html
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Sat 30-Jul-05 02:14 by dchih

52 17:59:23.171 10/04/06 Sev=Info/5 IKE/0x6300000D

MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194

53 17:59:23.171 10/04/06 Sev=Info/4 CM/0x63100019

Mode Config data received

54 17:59:23.187 10/04/06 Sev=Info/4 IKE/0x63000056

Received a key request from Driver: Local IP = 10.227.0.3, GW IP = XX.XX.XX.XX, Remote IP = 0.0.0.0

55 17:59:23.187 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to XX.XX.XX.XX

56 17:59:23.359 10/04/06 Sev=Info/5 IKE/0x6300002F

Received ISAKMP packet: peer = XX.XX.XX.XX

57 17:59:23.359 10/04/06 Sev=Info/4 IKE/0x63000014

RECEIVING

58 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000045

RESPONDER-LIFETIME notify has value of 10400 seconds

59 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000046

RESPONDER-LIFETIME notify has value of 4608000 kb

60 17:59:23.375 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK QM *(HASH) to XX.XX.XX.XX

61 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000059

Loading IPsec SA (MsgID=3F57A59C OUTBOUND SPI = 0xDBD61777 INBOUND SPI = 0xED7957F5)

62 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000025

Loaded OUTBOUND ESP SPI: 0xDBD61777

63 17:59:23.375 10/04/06 Sev=Info/5 IKE/0x63000026

Loaded INBOUND ESP SPI: 0xED7957F5

64 17:59:23.671 10/04/06 Sev=Info/5 CVPND/0x63400013

Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

65 17:59:36.750 10/04/06 Sev=Info/4 CM/0x63100034

The Virtual Adapter was enabled:
IP=10.227.0.3/255.0.0.0
DNS=80.58.0.33,80.58.32.97
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=

66 17:59:36.765 10/04/06 Sev=Info/5 CVPND/0x63400013

Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

67 17:59:36.781 10/04/06 Sev=Warning/2 CVPND/0xA3400015

Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413

68 17:59:36.781 10/04/06 Sev=Warning/2 CM/0xA3100025

Unable to delete route. Network: c0a80000, Netmask: ffffff00, Interface: c0a8000a, Gateway: c0a8000a.

69 17:59:36.781 10/04/06 Sev=Warning/2 CVPND/0xA3400015

Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413

70 17:59:36.781 10/04/06 Sev=Warning/2 CM/0xA3100025

Unable to delete route. Network: c0a80100, Netmask: ffffff00, Interface: c0a8010a, Gateway: c0a8010a.

71 17:59:36.781 10/04/06 Sev=Info/4 CM/0x63100038

Successfully saved route changes to file.

72 17:59:36.796 10/04/06 Sev=Info/5 CVPND/0x63400013

Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.227.0.3 10.227.0.3 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
XX.XX.XX.XX 255.255.255.255 192.168.1.1 192.168.1.10 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

73 17:59:36.796 10/04/06 Sev=Info/6 CM/0x63100036

The routing table was updated for the Virtual Adapter

74 17:59:37.093 10/04/06 Sev=Info/4 CM/0x6310001A

One secure connection established

75 17:59:37.203 10/04/06 Sev=Info/4 CM/0x6310003B

Address watch added for 192.168.1.10. Current hostname: server, Current address(es): 10.227.0.3, 192.168.1.10, 192.168.0.10.

76 17:59:37.250 10/04/06 Sev=Info/4 CM/0x6310003B

Address watch added for 10.227.0.3. Current hostname: server, Current address(es): 10.227.0.3, 192.168.1.10, 192.168.0.10.

77 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

78 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700010

Created a new key structure

79 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370000F

Added key with SPI=0x7717d6db into key list

80 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x63700010

Created a new key structure

81 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370000F

Added key with SPI=0xf55779ed into key list

82 17:59:37.250 10/04/06 Sev=Info/4 IPSEC/0x6370002F

Assigned VA private interface addr 10.227.0.3

83 17:59:37.250 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

84 17:59:38.062 10/04/06 Sev=Info/4 IPSEC/0x63700019

Activate outbound key with SPI=0x7717d6db for inbound key with SPI=0xf55779ed

85 18:00:18.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

86 18:00:18.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629922

87 18:00:23.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

88 18:00:23.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629923

89 18:00:27.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

90 18:00:28.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

91 18:00:28.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629924

92 18:00:33.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

93 18:00:33.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629925

94 18:00:37.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

95 18:00:38.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

96 18:00:38.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629926

97 18:00:43.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

98 18:00:43.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629927

99 18:00:47.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

100 18:00:48.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

101 18:00:48.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629928

102 18:00:53.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

103 18:00:53.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629929

104 18:00:57.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

105 18:00:58.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

106 18:00:58.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629930

107 18:01:03.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

108 18:01:03.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629931

109 18:01:08.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

110 18:01:08.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629932

111 18:01:13.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

112 18:01:13.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629933

113 18:01:17.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

114 18:01:18.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

115 18:01:18.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629934

116 18:01:23.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

117 18:01:23.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629935

118 18:01:27.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

119 18:01:28.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

120 18:01:28.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629936

121 18:01:33.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

122 18:01:33.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629937

123 18:01:37.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

124 18:01:38.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

125 18:01:38.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629938

126 18:01:43.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to XX.XX.XX.XX

127 18:01:43.062 10/04/06 Sev=Info/6 IKE/0x6300003D

Sending DPD request to XX.XX.XX.XX, our seq# = 3898629939

128 18:01:47.562 10/04/06 Sev=Info/6 IKE/0x63000055

Sent a keepalive on the IPSec SA

129 18:01:48.062 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to XX.XX.XX.XX

130 18:01:48.062 10/04/06 Sev=Info/5 IKE/0x63000018

Deleting IPsec SA: (OUTBOUND SPI = DBD61777 INBOUND SPI = ED7957F5)

131 18:01:48.062 10/04/06 Sev=Info/4 IKE/0x63000049

Discarding IPsec SA negotiation, MsgID=3F57A59C

132 18:01:48.078 10/04/06 Sev=Info/4 IKE/0x63000017

Marking IKE SA for deletion (I_Cookie=5AFD26ABFE92BD32 R_Cookie=26FDFF5667CD3EE1) reason = DEL_REASON_PEER_NOT_RESPONDING

133 18:01:48.078 10/04/06 Sev=Info/4 IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to XX.XX.XX.XX

134 18:01:48.578 10/04/06 Sev=Info/4 IPSEC/0x63700013

Delete internal key with SPI=0xf55779ed

135 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x6370000C

Key deleted by SPI 0xf55779ed

136 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x63700013

Delete internal key with SPI=0x7717d6db

137 18:01:48.593 10/04/06 Sev=Info/4 IPSEC/0x6370000C

Key deleted by SPI 0x7717d6db

138 18:01:48.609 10/04/06 Sev=Info/4 IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=5AFD26ABFE92BD32 R_Cookie=26FDFF5667CD3EE1) reason = DEL_REASON_PEER_NOT_RESPONDING

139 18:01:48.609 10/04/06 Sev=Info/4 CM/0x63100013

Phase 1 SA deleted cause by DEL_REASON_PEER_NOT_RESPONDING. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

140 18:01:48.609 10/04/06 Sev=Info/5 CM/0x63100025

Initializing CVPNDrv

141 18:01:48.609 10/04/06 Sev=Info/6 CM/0x63100031

Tunnel to headend device XXXXXXXXXXXXXX.XXXXX.XXXX-XXX.XXX disconnected: duration: 0 days 0:2:11

142 18:01:48.671 10/04/06 Sev=Info/4 IKE/0x63000001

IKE received signal to terminate VPN connection

143 18:01:48.671 10/04/06 Sev=Info/5 CVPND/0x63400013

Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.227.0.3 10.227.0.3 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

144 18:01:48.687 10/04/06 Sev=Warning/2 CVPND/0xA3400015

Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 1413

145 18:01:48.687 10/04/06 Sev=Info/6 CM/0x63100037

The routing table was returned to original state prior to Virtual Adapter

146 18:01:49.406 10/04/06 Sev=Info/5 CVPND/0x63400013

Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.10 1
0.0.0.0 0.0.0.0 10.227.0.0 10.227.0.3 1
10.0.0.0 255.0.0.0 10.227.0.3 10.227.0.3 1
10.227.0.0 255.255.0.0 127.0.0.1 10.227.0.3 1
10.227.0.3 255.255.255.255 127.0.0.1 127.0.0.1 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.10 192.168.0.10 1
192.168.0.10 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.10 192.168.1.10 1
192.168.1.10 255.255.255.255 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.227.0.3 10.227.0.3 1
224.0.0.0 240.0.0.0 192.168.0.10 192.168.0.10 1
224.0.0.0 240.0.0.0 192.168.1.10 192.168.1.10 1
255.255.255.255 255.255.255.255 10.227.0.3 10.227.0.3 1
255.255.255.255 255.255.255.255 192.168.0.10 192.168.0.10 1
255.255.255.255 255.255.255.255 192.168.1.10 192.168.1.10 1

147 18:01:49.406 10/04/06 Sev=Info/4 CM/0x63100035

The Virtual Adapter was disabled

148 18:01:49.437 10/04/06 Sev=Info/4 IKE/0x63000086

Microsoft IPSec Policy Agent service started successfully

149 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

150 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

151 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x63700014

Deleted all keys

152 18:01:49.453 10/04/06 Sev=Info/4 IPSEC/0x6370000A

IPSec driver successfully stopped

Gracias.

👁 408
Este tema está cerrado a nuevas respuestas. Abre un nuevo tema para retomar la conversación.