Cisco Systems VPN Client Version 4.8.01.0300 Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 13 13:57:51.015 04/29/09 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash. 14 13:57:51.015 04/29/09 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash. 15 13:57:51.025 04/29/09 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash. 16 13:57:51.036 04/29/09 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash. 17 13:57:51.046 04/29/09 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash. 18 13:57:51.046 04/29/09 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash. 19 13:57:51.086 04/29/09 Sev=Info/4 CERT/0x63600015 Cert (....) verification succeeded. 20 13:57:51.106 04/29/09 Sev=Info/4 CM/0x63100002 Begin connection process 21 13:57:51.146 04/29/09 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully 22 13:57:51.146 04/29/09 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 23 13:57:51.146 04/29/09 Sev=Info/4 CM/0x63100024 Attempt connection with server "xxxx.yyyy.zzzz.tttt"" 24 13:57:51.206 04/29/09 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with xxxx.yyyy.zzzz.tttt". 25 13:57:51.206 04/29/09 Sev=Info/6 CERT/0x63600025 Attempting to find a Certificate using Serial Hash. 26 13:57:51.216 04/29/09 Sev=Info/6 CERT/0x63600026 Found a Certificate using Serial Hash. 27 13:57:51.226 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK MM (SA, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to xxxx.yyyy.zzzz.tttt" 28 13:57:51.236 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 29 13:57:51.236 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (SA, VID(Nat-T), VID(Frag)) from xxxx.yyyy.zzzz.tttt" 30 13:57:51.266 04/29/09 Sev=Info/5 IKE/0x63000001 Peer supports NAT-T 31 13:57:51.266 04/29/09 Sev=Info/5 IKE/0x63000001 Peer supports IKE fragmentation payloads 32 13:57:51.266 04/29/09 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 33 13:57:51.266 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK MM (KE, NON, NAT-D, NAT-D, VID(?), VID(Unity)) to xxxx.yyyy.zzzz.tttt" 34 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 35 13:57:51.346 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt" 36 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 37 13:57:51.346 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt" 38 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000073 All fragments received. 39 13:57:51.346 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (KE, NON, CERT_REQ, CERT_REQ, CERT_REQ, VID(Unity), VID(Xauth), VID(?), VID(?), NAT-D, NAT-D) from xxxx.yyyy.zzzz.tttt" 40 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 41 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 42 13:57:51.346 04/29/09 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 43 13:57:51.486 04/29/09 Sev=Info/4 CERT/0x6360001B No smart card readers with cards inserted found. 44 13:57:51.546 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK MM *(ID, CERT, CERT_REQ, SIG, NOTIFY:STATUS_INITIAL_CONTACT) to xxxx.yyyy.zzzz.tttt" 45 13:57:51.546 04/29/09 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 46 13:57:51.546 04/29/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 47 13:57:56.934 04/29/09 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 48 13:57:56.934 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK MM *(Retransmission) to xxxx.yyyy.zzzz.tttt" 49 13:57:57.294 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 50 13:57:57.294 04/29/09 Sev=Warning/2 IKE/0xE300009B Fragmented msg rcvd with no associated SA (PacketReceiver:133) 51 13:57:57.294 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 52 13:57:57.294 04/29/09 Sev=Warning/2 IKE/0xE300009B Fragmented msg rcvd with no associated SA (PacketReceiver:133) 53 13:57:59.347 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 54 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt" 55 13:57:59.347 04/29/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = xxxx.yyyy.zzzz.tttt" 56 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (FRAG) from xxxx.yyyy.zzzz.tttt" 57 13:57:59.347 04/29/09 Sev=Info/5 IKE/0x63000073 All fragments received. 58 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK MM (Retransmission) from xxxx.yyyy.zzzz.tttt" 59 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 60 13:57:59.347 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK MM *(Retransmission) to xxxx.yyyy.zzzz.tttt" 61 13:58:04.455 04/29/09 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 62 13:58:04.455 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK MM *(Retransmission) to xxxx.yyyy.zzzz.tttt" 63 13:58:09.952 04/29/09 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=1BC2D2EF7BCB2A4C R_Cookie=D015ED5AFB19F63A) reason = DEL_REASON_PEER_NOT_RESPONDING 64 13:58:09.952 04/29/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to xxxx.yyyy.zzzz.tttt" 65 13:58:10.573 04/29/09 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=1BC2D2EF7BCB2A4C R_Cookie=D015ED5AFB19F63A) reason = DEL_REASON_PEER_NOT_RESPONDING 66 13:58:10.573 04/29/09 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "xxxx.yyyy.zzzz.tttt"" because of "DEL_REASON_PEER_NOT_RESPONDING" 67 13:58:10.573 04/29/09 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 68 13:58:10.693 04/29/09 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0. 69 13:58:10.693 04/29/09 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 70 13:58:10.734 04/29/09 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully 71 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 72 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 73 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 13:58:11.455 04/29/09 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped