VirtualBox

Ticket #4591: SWVpnClientLog.txt

File SWVpnClientLog.txt, 15.5 KB (added by Todd, 15 years ago)

VPN Client Log

Line 
1Application Name: SonicWALL Global VPN Client
2Application Version: 3.1.0.556
3IPsec Driver Name: RCFOX IPSec Driver
4IPsec Driver Version: 10.0.1.147
5Virtual Adapter Driver Name: SonicWALL VPN Adapter
6Virtual Adapter Driver Version: 9.01
7DNE Adapter Driver Name: Deterministic Network Enhancer
8DNE Adapter Driver Version: 3.05.6.11238
9Reported Generated At: 20:33:27 Mon Jul 20 2009 GMT
10
11System Summary
12 OS Name: Microsoft Windows XP
13 System Name: 5.1.2600 Service Pack 3 Build 2600
14 OS Manufacturer: Microsoft Corporation
15 System Name: ARMADA
16 System Manufacturer: ARMADA
17 System Model: ARMADA
18 System Type: X86-based PC
19 Processor: x86 Family 6 Model 15 Stepping 13 GenuineIntel ~1995 Mhz
20 BIOS Version: 06/23/99
21 Windows Directory: C:\WINDOWS
22 Locale: United States
23 Time Zone: Pacific Daylight Time
24 Total Physical Memory: 1023 MB
25 Available Physical Memory: 511 MB
26 Total Virtual Memory: 2047 MB
27 Available Virtual Memory: 1973 MB
28 Page File Space: 2450 MB
29
30Windows IP Configuration
31
32 Host Name . . . . . . . . . . . . : ARMADA
33 Primary Dns Suffix . . . . . . . :
34 Node Type . . . . . . . . . . . . : Hybrid
35 IP Routing Enabled . . . . . . . : No
36 WINS Proxy Enabled . . . . . . . : No
37 DNS Suffix Search List . . . . . :
38
39Ethernet adapter {2B0A3CB4-B9D3-4D0C-894F-381DD154476E}:
40
41 Connection-specific DNS Suffix . :
42 Description . . . . . . . . . . . : Intel(R) PRO/1000 T Server Adapter
43 Physical Address. . . . . . . . . : 08-00-27-1D-25-2D
44 MTU . . . . . . . . . . . . . . . : 1500
45 Dhcp Enabled. . . . . . . . . . . : Yes
46 Autoconfiguration Enabled . . . . : Yes
47 IP Address. . . . . . . . . . . . : 10.0.2.15
48 Subnet Mask . . . . . . . . . . . : 255.255.255.0
49 Default Gateway . . . . . . . . . : 10.0.2.2
50 DHCP Server . . . . . . . . . . . : 10.0.2.2
51 DNS Servers . . . . . . . . . . . : 205.171.3.65
52 205.171.2.65
53 Lease Obtained. . . . . . . . . . : Monday, July 20, 2009 05:30:10 PM
54 Lease Expires . . . . . . . . . . : Tuesday, July 21, 2009 05:30:10 PM
55
56Ethernet adapter {86247B2A-1B78-4B46-B8E8-76794B1E960C}:
57
58 Connection-specific DNS Suffix . :
59 Description . . . . . . . . . . . : SonicWALL VPN Adapter
60 Physical Address. . . . . . . . . : 00-60-73-E7-6B-93
61 MTU . . . . . . . . . . . . . . . : 1418
62 Dhcp Enabled. . . . . . . . . . . : Yes
63 Autoconfiguration Enabled . . . . : No
64 IP Address. . . . . . . . . . . . : 10.28.63.149
65 Subnet Mask . . . . . . . . . . . : 255.255.255.0
66 Default Gateway . . . . . . . . . :
67 DHCP Server . . . . . . . . . . . : 10.28.63.250
68 Lease Obtained. . . . . . . . . . : Monday, July 20, 2009 08:32:55 PM
69 Lease Expires . . . . . . . . . . : Tuesday, January 19, 2038 03:14:07 AM
70
71
72===========================================================================
73Interface List:
74Interface MAC Address Description
750x00000001 00-00-00-00-00-00 MS TCP Loopback interface
760x00000002 08-00-27-1D-25-2D Intel(R) PRO/1000 T Server Adapter - Packet Scheduler Miniport
770x00000003 00-60-73-E7-6B-93 SonicWALL VPN Adapter - Packet Scheduler Miniport
78===========================================================================
79
80===========================================================================
81Active Routes:
82Network Destination Netmask Gateway Interface Metric
83 0.0.0.0 0.0.0.0 10.0.2.2 10.0.2.15 10
84 10.0.2.0 255.255.255.0 10.0.2.15 10.0.2.15 10
85 10.0.2.15 255.255.255.255 127.0.0.1 127.0.0.1 10
86 10.28.59.0 255.255.255.0 10.28.63.149 10.28.63.149 1
87 10.28.60.0 255.255.255.0 10.28.63.149 10.28.63.149 1
88 10.28.63.0 255.255.255.0 10.28.63.149 10.28.63.149 30
89 10.28.63.149 255.255.255.255 127.0.0.1 127.0.0.1 30
90 10.28.65.0 255.255.255.0 10.28.63.149 10.28.63.149 1
91 10.28.67.0 255.255.255.0 10.28.63.149 10.28.63.149 1
92 10.255.255.255 255.255.255.255 10.0.2.15 10.0.2.15 10
93 10.255.255.255 255.255.255.255 10.28.63.149 10.28.63.149 30
94 65.126.53.67 255.255.255.255 10.0.2.2 10.0.2.15 1
95 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
96 149.179.0.0 255.255.0.0 10.28.63.149 10.28.63.149 1
97 149.183.27.0 255.255.255.0 10.28.63.149 10.28.63.149 1
98 149.183.164.0 255.255.255.0 10.28.63.149 10.28.63.149 1
99 172.20.58.0 255.255.255.0 10.28.63.149 10.28.63.149 1
100 192.168.27.0 255.255.255.0 10.28.63.149 10.28.63.149 1
101 224.0.0.0 240.0.0.0 10.0.2.15 10.0.2.15 10
102 224.0.0.0 240.0.0.0 10.28.63.149 10.28.63.149 30
103 255.255.255.255 255.255.255.255 10.0.2.15 10.0.2.15 1
104 255.255.255.255 255.255.255.255 10.28.63.149 10.28.63.149 1
105Default Gateway: 10.0.2.2
106===========================================================================
107
108===========================================================================
109ARP Table Entries:
110Internet Address Physical Address Interface Type
111 10.0.2.2 52-54-00-12-35-02 10.0.2.15 3
112 10.28.59.82 52-54-00-12-35-02 10.28.63.149 3
113 10.28.59.85 52-54-00-12-35-02 10.28.63.149 3
114===========================================================================
115
116*** Connections ***
117zPCN (192.168.27.50): Disabled
118 Destination Networks
119 --------------------
120 10.28.59.0/255.255.255.0/BOOTPS: Idle
121 10.28.60.0/255.255.255.0/Any: Idle
122 10.28.59.0/255.255.255.0/Any: Idle
123
124
125Renton (65.126.53.67): Configuration Complete
126 Destination Networks
127 --------------------
128 10.28.59.0/255.255.255.0/BOOTPS: Phase 2 Complete
129 192.168.27.0/255.255.255.0/Any: Idle
130 172.20.58.0/255.255.255.0/Any: Idle
131 149.183.164.0/255.255.255.0/Any: Idle
132 149.183.27.0/255.255.255.0/Any: Idle
133 149.179.0.0/255.255.0.0/Any: Idle
134 10.28.67.0/255.255.255.0/Any: Idle
135 10.28.65.0/255.255.255.0/Any: Idle
136 10.28.63.0/255.255.255.0/Any: Idle
137 10.28.60.0/255.255.255.0/Any: Idle
138 10.28.59.0/255.255.255.0/Any: Idle
139
140
141 Negotiated Phase 1 SA Parameters
142 --------------------------------
143 Encryption Algorithm: DES-CBC
144 Hash Algorithm: MD5
145 Authentication Method: XAuth Initiator with Pre-shared key
146 DH Group: Default 768-bit MODP group (Group 1)
147 Connect Time: Monday July 20 2009 01:32:45 PM
148 Duration: 36000 seconds
149 Expiration Time: Tuesday, July 21, 2009 06:32:45 AM
150
151 Negotiated Phase 2 SA Parameters
152 --------------------------------
153 IPSec Protocol: Encapsulating Security Payload
154 ESP Enc Algorithm: DES-CBC
155 ESP Auth Algorithm: MD5
156 Encapsulation Mode: UDP Encapsulation Tunnel
157 Diffie-Hellman Group: N/A (PFS not enabled)
158
159Tacoma (207.109.65.237): Disabled
160 Destination Networks
161 --------------------
162 10.28.59.0/255.255.255.0/BOOTPS: Idle
163 194.10.26.0/255.255.255.0/Any: Idle
164 194.10.25.0/255.255.255.0/Any: Idle
165 192.168.27.0/255.255.255.0/Any: Idle
166 172.20.58.0/255.255.255.0/Any: Idle
167 149.183.27.0/255.255.255.0/Any: Idle
168 149.179.0.0/255.255.0.0/Any: Idle
169 129.230.0.0/255.255.0.0/Any: Idle
170 10.28.65.0/255.255.255.0/Any: Idle
171 10.28.64.0/255.255.255.0/Any: Idle
172 10.28.63.0/255.255.255.0/Any: Idle
173 10.28.62.0/255.255.255.0/Any: Idle
174 10.28.61.0/255.255.255.0/Any: Idle
175 10.28.60.0/255.255.255.0/Any: Idle
176 10.28.59.0/255.255.255.0/Any: Idle
177
178
179
180*** SECURITY POLICY DATABASE ***
181UID From MAC From IP To IP 1 To IP 2 FPort TPort Prot IPolicy ISADBUID OPolicy OSADBUID Peer IP Peer MAC FOMF FIMF TOMF TIMF Event ID
182---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
18300000029 00:60:73:E7:6B:93 000.000.000.000 000.000.000.000 000.000.000.000 BOOTPC BOOTPS UDP Inspect 00000003 Secure 00000004 065.126.053.067 525400123502 00000032 00000034 00000038 00000032 00000308
18400000028 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 BOOTPC BOOTPS UDP Inspect 00000000 Bypass 00000000 000.000.000.000 000000000000 00000030 00000030 00000030 00000030 00000000
18500000026 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 Any ISAFLT UDP Inspect 00000000 Inspect 00000000 000.000.000.000 000000000000 00000000 00000000 00000030 00000030 00000000
18600000025 08:00:27:1D:25:2D 000.000.000.000 000.000.000.000 000.000.000.000 Any ISAKMP UDP Inspect 00000000 Inspect 00000000 065.126.053.067 525400123500 00000000 00000000 00000030 00000030 00000000
18700000027 08:00:27:1D:25:2D 000.000.000.000 000.000.000.000 000.000.000.000 Any Discar UDP Bypass 00000000 Inspect 00000000 000.000.000.000 000000000000 00000000 00000000 00000030 00000030 00000000
18800000041 08:00:27:1D:25:2D 010.000.002.015 065.126.053.067 000.000.000.000 Any Any ESP Discard 00000000 Bypass 00000000 000.000.000.000 000000000000 00000014 00000014 00000014 00000014 00000000
18900000032 00:60:73:E7:6B:93 010.028.063.149 149.183.164.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19000000035 00:60:73:E7:6B:93 010.028.063.149 010.028.067.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19100000036 00:60:73:E7:6B:93 010.028.063.149 010.028.065.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19200000037 00:60:73:E7:6B:93 010.028.063.149 010.028.063.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19300000038 00:60:73:E7:6B:93 010.028.063.149 010.028.060.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19400000039 00:60:73:E7:6B:93 010.028.063.149 010.028.059.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19500000031 00:60:73:E7:6B:93 010.028.063.149 172.020.058.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19600000033 00:60:73:E7:6B:93 010.028.063.149 149.183.027.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19700000030 00:60:73:E7:6B:93 010.028.063.149 192.168.027.000 255.255.255.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19800000034 00:60:73:E7:6B:93 010.028.063.149 149.179.000.000 255.255.000.000 Any Any N/A Bypass 00000003 Secure 00000004 065.126.053.067 525400123502 00000004 00000004 0000000C 00000004 00000308
19900000040 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 Any Any N/A Bypass 00000000 Bypass 00000000 000.000.000.000 000000000000 00000000 00000000 00000000 00000000 00000000
20000000024 08:00:27:1D:25:2D 000.000.000.000 000.000.000.000 000.000.000.000 Any Any N/A Bypass 00000000 Bypass 00000000 000.000.000.000 000000000000 00000000 00000000 00000000 00000000 00000000
201
202
203*** LOG MESSAGES ***
2042009/07/20 13:31:46:194 Information <local host> Reading configuration file C:\Documents and Settings\dispatch\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2052009/07/20 13:31:46:555 Information <local host> Saving configuration file C:\Documents and Settings\dispatch\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2062009/07/20 13:31:46:565 Information <local host> The configuration file 'C:\Documents and Settings\dispatch\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
2072009/07/20 13:31:46:685 Information <local host> SonicWALL Global VPN Client version 3.1.0.556
2082009/07/20 13:32:44:668 Information <local host> The connection "Renton" has been enabled.
2092009/07/20 13:32:45:179 Information 65.126.53.67 Starting ISAKMP phase 1 negotiation.
2102009/07/20 13:32:45:279 Information <local host> An incoming ISAKMP packet from 10.0.2.2 was ignored.
2112009/07/20 13:32:53:281 Information 65.126.53.67 Starting aggressive mode phase 1 exchange.
2122009/07/20 13:32:53:281 Information 65.126.53.67 NAT Detected: Local host is behind a NAT device.
2132009/07/20 13:32:53:291 Information 65.126.53.67 The SA lifetime for phase 1 is 36000 seconds.
2142009/07/20 13:32:53:291 Information 65.126.53.67 Phase 1 has completed.
2152009/07/20 13:32:53:311 Information 65.126.53.67 Received XAuth request.
2162009/07/20 13:32:53:311 Information 65.126.53.67 Sending XAuth reply.
2172009/07/20 13:32:53:321 Information 65.126.53.67 Received XAuth status.
2182009/07/20 13:32:53:321 Information 65.126.53.67 Sending XAuth acknowledgement.
2192009/07/20 13:32:53:321 Information 65.126.53.67 User authentication has succeeded.
2202009/07/20 13:32:53:341 Information 65.126.53.67 Received request for policy version.
2212009/07/20 13:32:53:341 Information 65.126.53.67 Sending policy version reply.
2222009/07/20 13:32:53:351 Information 65.126.53.67 Received policy change is not required.
2232009/07/20 13:32:53:361 Information 65.126.53.67 Sending policy acknowledgement.
2242009/07/20 13:32:53:361 Information 65.126.53.67 The configuration for the connection is up to date.
2252009/07/20 13:32:53:461 Information 65.126.53.67 Starting ISAKMP phase 2 negotiation with 10.28.59.0/255.255.255.0:BOOTPC:BOOTPS:UDP.
2262009/07/20 13:32:53:461 Information 65.126.53.67 Starting quick mode phase 2 exchange.
2272009/07/20 13:32:53:491 Information 65.126.53.67 The SA lifetime for phase 2 is 36000 seconds.
2282009/07/20 13:32:53:491 Information 65.126.53.67 Phase 2 with 10.28.59.0/255.255.255.0:BOOTPC:BOOTPS:UDP has completed.
2292009/07/20 13:32:53:491 Information <local host> Renewing IP address for the virtual interface (00-60-73-E7-6B-93).
2302009/07/20 13:33:00:280 Information <local host> The IP address for the virtual interface has changed to 10.28.63.149.
2312009/07/20 13:33:00:370 Information <local host> The system ARP cache has been flushed.
2322009/07/20 13:33:00:420 Information 65.126.53.67 NetWkstaUserGetInfo failed: The Workstation service has not been started.
2332009/07/20 13:33:00:430 Warning 65.126.53.67 Failed to locate primary domain controller.
2342009/07/20 13:33:11:256 Warning <local host> Failed to receive an incoming ISAKMP packet. The length is incorrect.
2352009/07/20 13:33:13:509 Warning <local host> Failed to receive an incoming ISAKMP packet. The length is incorrect.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy