VirtualBox

Ticket #2908: ciscoclient.log

File ciscoclient.log, 7.1 KB (added by djarosz, 15 years ago)
Line 
1Cisco Systems VPN Client Version 4.8.01.0300
2Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
3Client Type(s): Windows, WinNT
4Running on: 5.1.2600 Service Pack 2
5
613 13:57:51.015 04/29/09 Sev=Info/6 CERT/0x63600025
7Attempting to find a Certificate using Serial Hash.
8
914 13:57:51.015 04/29/09 Sev=Info/6 CERT/0x63600026
10Found a Certificate using Serial Hash.
11
1215 13:57:51.025 04/29/09 Sev=Info/6 CERT/0x63600025
13Attempting to find a Certificate using Serial Hash.
14
1516 13:57:51.036 04/29/09 Sev=Info/6 CERT/0x63600026
16Found a Certificate using Serial Hash.
17
1817 13:57:51.046 04/29/09 Sev=Info/6 CERT/0x63600025
19Attempting to find a Certificate using Serial Hash.
20
2118 13:57:51.046 04/29/09 Sev=Info/6 CERT/0x63600026
22Found a Certificate using Serial Hash.
23
2419 13:57:51.086 04/29/09 Sev=Info/4 CERT/0x63600015
25Cert (....) verification succeeded.
26
2720 13:57:51.106 04/29/09 Sev=Info/4 CM/0x63100002
28Begin connection process
29
3021 13:57:51.146 04/29/09 Sev=Info/4 CVPND/0xE3400001
31Microsoft IPSec Policy Agent service stopped successfully
32
3322 13:57:51.146 04/29/09 Sev=Info/4 CM/0x63100004
34Establish secure connection using Ethernet
35
3623 13:57:51.146 04/29/09 Sev=Info/4 CM/0x63100024
37Attempt connection with server "xxxx.yyyy.zzzz.tttt""
38
3924 13:57:51.206 04/29/09 Sev=Info/6 IKE/0x6300003B
40Attempting to establish a connection with xxxx.yyyy.zzzz.tttt".
41
4225 13:57:51.206 04/29/09 Sev=Info/6 CERT/0x63600025
43Attempting to find a Certificate using Serial Hash.
44
4526 13:57:51.216 04/29/09 Sev=Info/6 CERT/0x63600026
46Found a Certificate using Serial Hash.
47
4827 13:57:51.226 04/29/09 Sev=Info/4 IKE/0x63000013
49SENDING >>> ISAKMP OAK MM (SA, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to xxxx.yyyy.zzzz.tttt"
50
5128 13:57:51.236 04/29/09 Sev=Info/5 IKE/0x6300002F
52Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
53
5429 13:57:51.236 04/29/09 Sev=Info/4 IKE/0x63000014
55RECEIVING <<< ISAKMP OAK MM (SA, VID(Nat-T), VID(Frag)) from xxxx.yyyy.zzzz.tttt"
56
5730 13:57:51.266 04/29/09 Sev=Info/5 IKE/0x63000001
58Peer supports NAT-T
59
6031 13:57:51.266 04/29/09 Sev=Info/5 IKE/0x63000001
61Peer supports IKE fragmentation payloads
62
6332 13:57:51.266 04/29/09 Sev=Info/6 IKE/0x63000001
64IOS Vendor ID Contruction successful
65
6633 13:57:51.266 04/29/09 Sev=Info/4 IKE/0x63000013
67SENDING >>> ISAKMP OAK MM (KE, NON, NAT-D, NAT-D, VID(?), VID(Unity)) to xxxx.yyyy.zzzz.tttt"
68
6934 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x6300002F
70Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
71
7235 13:57:51.346 04/29/09 Sev=Info/4 IKE/0x63000014
73RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt"
74
7536 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x6300002F
76Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
77
7837 13:57:51.346 04/29/09 Sev=Info/4 IKE/0x63000014
79RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt"
80
8138 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000073
82All fragments received.
83
8439 13:57:51.346 04/29/09 Sev=Info/4 IKE/0x63000014
85RECEIVING <<< ISAKMP OAK MM (KE, NON, CERT_REQ, CERT_REQ, CERT_REQ, VID(Unity), VID(Xauth), VID(?), VID(?), NAT-D, NAT-D) from xxxx.yyyy.zzzz.tttt"
86
8740 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000001
88Peer is a Cisco-Unity compliant peer
89
9041 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000001
91Peer supports XAUTH
92
9342 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000001
94Peer supports DWR Code and DWR Text
95
9643 13:57:51.486 04/29/09 Sev=Info/4 CERT/0x6360001B
97No smart card readers with cards inserted found.
98
9944 13:57:51.546 04/29/09 Sev=Info/4 IKE/0x63000013
100SENDING >>> ISAKMP OAK MM *(ID, CERT, CERT_REQ, SIG, NOTIFY:STATUS_INITIAL_CONTACT) to xxxx.yyyy.zzzz.tttt"
101
10245 13:57:51.546 04/29/09 Sev=Info/4 IPSEC/0x63700008
103IPSec driver successfully started
104
10546 13:57:51.546 04/29/09 Sev=Info/4 IPSEC/0x63700014
106Deleted all keys
107
10847 13:57:56.934 04/29/09 Sev=Info/4 IKE/0x63000021
109Retransmitting last packet!
110
11148 13:57:56.934 04/29/09 Sev=Info/4 IKE/0x63000013
112SENDING >>> ISAKMP OAK MM *(Retransmission) to xxxx.yyyy.zzzz.tttt"
113
11449 13:57:57.294 04/29/09 Sev=Info/5 IKE/0x6300002F
115Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
116
11750 13:57:57.294 04/29/09 Sev=Warning/2 IKE/0xE300009B
118Fragmented msg rcvd with no associated SA (PacketReceiver:133)
119
12051 13:57:57.294 04/29/09 Sev=Info/5 IKE/0x6300002F
121Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
122
12352 13:57:57.294 04/29/09 Sev=Warning/2 IKE/0xE300009B
124Fragmented msg rcvd with no associated SA (PacketReceiver:133)
125
12653 13:57:59.347 04/29/09 Sev=Info/5 IKE/0x6300002F
127Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
128
12954 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000014
130RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt"
131
13255 13:57:59.347 04/29/09 Sev=Info/5 IKE/0x6300002F
133Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt"
134
13556 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000014
136RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt"
137
13857 13:57:59.347 04/29/09 Sev=Info/5 IKE/0x63000073
139All fragments received.
140
14158 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000014
142RECEIVING <<< ISAKMP OAK MM (Retransmission) from xxxx.yyyy.zzzz.tttt"
143
14459 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000021
145Retransmitting last packet!
146
14760 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000013
148SENDING >>> ISAKMP OAK MM *(Retransmission) to xxxx.yyyy.zzzz.tttt"
149
15061 13:58:04.455 04/29/09 Sev=Info/4 IKE/0x63000021
151Retransmitting last packet!
152
15362 13:58:04.455 04/29/09 Sev=Info/4 IKE/0x63000013
154SENDING >>> ISAKMP OAK MM *(Retransmission) to xxxx.yyyy.zzzz.tttt"
155
15663 13:58:09.952 04/29/09 Sev=Info/4 IKE/0x63000017
157Marking IKE SA for deletion (I_Cookie=1BC2D2EF7BCB2A4C R_Cookie=D015ED5AFB19F63A) reason = DEL_REASON_PEER_NOT_RESPONDING
158
15964 13:58:09.952 04/29/09 Sev=Info/4 IKE/0x63000013
160SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to xxxx.yyyy.zzzz.tttt"
161
16265 13:58:10.573 04/29/09 Sev=Info/4 IKE/0x6300004B
163Discarding IKE SA negotiation (I_Cookie=1BC2D2EF7BCB2A4C R_Cookie=D015ED5AFB19F63A) reason = DEL_REASON_PEER_NOT_RESPONDING
164
16566 13:58:10.573 04/29/09 Sev=Info/4 CM/0x63100014
166Unable to establish Phase 1 SA with server "xxxx.yyyy.zzzz.tttt"" because of "DEL_REASON_PEER_NOT_RESPONDING"
167
16867 13:58:10.573 04/29/09 Sev=Info/5 CM/0x63100025
169Initializing CVPNDrv
170
17168 13:58:10.693 04/29/09 Sev=Info/6 CM/0x63100046
172Set tunnel established flag in registry to 0.
173
17469 13:58:10.693 04/29/09 Sev=Info/4 IKE/0x63000001
175IKE received signal to terminate VPN connection
176
17770 13:58:10.734 04/29/09 Sev=Info/4 IKE/0x63000086
178Microsoft IPSec Policy Agent service started successfully
179
18071 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x63700014
181Deleted all keys
182
18372 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x63700014
184Deleted all keys
185
18673 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x63700014
187Deleted all keys
188
18974 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x6370000A
190IPSec driver successfully stopped
191

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy