Problemi con connessione cisco
Inviato: sab 22 mar , 2008 7:05 am
da elisacarli
Ciao a tutti
Ho una problema con una connessione VPN Cisco.
Le mie impostazioni sono:
S.O. win xp pro service pack 2
I.E. 6.0
Firewall disattivato
Cisco VPN Client 4.6
Impostazioni Cisco (che mi sono state fornite tramite un file di configurazione)
Transport- Enable Transparent Tunneling
IPSecover TCP TCP port 10000
Allow Lan Access
La connessione avviene tramite pagina web, che inizialmente richiede l'installazione di un ocx (VPN.ocx)
Dopo il login sulla pagina, non riesce a connettersi ,va in timeout e mi chiede di effettuare nuovamente il login
Ho appena cambaito computer e nel vecchio PC(stessa configurazione) tutto funzionava regolarmente.
Gradirei qualche consiglio su cosa fare per capire da cosa dipende tutto questo.
Grazie a tutti.
Inviato: mar 25 mar , 2008 10:19 am
da Wizard
Sinceramente nn ho capito se tenti di connetterti in vpn con il cisco vpn client (ipsec) oppure da una pagina https (ssl)
Inviato: mar 25 mar , 2008 1:10 pm
da elisacarli
Ciao
Mi tento di connettermi via Https con ssl.
Inviato: mar 25 mar , 2008 3:45 pm
da elisacarli
Ciao
Ecco il file log di un mio tentativo di connessione con VPN Client non andato a buon fine (timeout sul browser)
Sarei molto grata se qualcuno potesse darmi indicazioni
Cisco Systems VPN Client Version 4.6.02.0011
Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
26 15:35:50.343 03/25/08 Sev=Info/4 CLI/0x63900002
Started vpnclient:
Cisco Systems VPN Client Version 4.6.02.0011
Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
27 15:35:50.359 03/25/08 Sev=Info/4 CM/0x63100002
Begin connection process
28 15:35:50.375 03/25/08 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
29 15:35:50.375 03/25/08 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
30 15:35:50.375 03/25/08 Sev=Info/4 CM/0x63100024
Attempt connection with server "195.8.15.55"
31 15:35:50.375 03/25/08 Sev=Info/6 CM/0x6310002F
Allocated local TCP port 1056 for TCP connection.
32 15:35:50.671 03/25/08 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
33 15:35:50.687 03/25/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
34 15:35:50.687 03/25/08 Sev=Info/6 IPSEC/0x6370002B
Sent 10 packets, 0 were fragmented.
35 15:35:50.687 03/25/08 Sev=Info/6 IPSEC/0x6370001F
TCP SYN sent to 195.8.15.55, src port 1056, dst port 10000
36 15:35:50.687 03/25/08 Sev=Info/6 IPSEC/0x6370001C
TCP SYN-ACK received from 195.8.15.55, src port 10000, dst port 1056
37 15:35:50.687 03/25/08 Sev=Info/6 IPSEC/0x63700020
TCP ACK sent to 195.8.15.55, src port 1056, dst port 10000
38 15:35:50.687 03/25/08 Sev=Info/4 CM/0x63100029
TCP connection established on port 10000 with server "195.8.15.55"
39 15:35:51.171 03/25/08 Sev=Info/4 CM/0x63100024
Attempt connection with server "195.8.15.55"
40 15:35:51.171 03/25/08 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 195.8.15.55.
41 15:35:51.171 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 195.8.15.55
42 15:35:51.671 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
43 15:35:51.828 03/25/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 195.8.15.55
44 15:35:51.828 03/25/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?)) from 195.8.15.55
45 15:35:51.828 03/25/08 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
46 15:35:51.828 03/25/08 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
47 15:35:51.828 03/25/08 Sev=Info/5 IKE/0x63000001
Peer supports DPD
48 15:35:51.828 03/25/08 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
49 15:35:51.828 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 195.8.15.55
50 15:35:51.828 03/25/08 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4
51 15:35:51.828 03/25/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
52 15:35:52.171 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
53 15:35:52.421 03/25/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 195.8.15.55
54 15:35:52.421 03/25/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 195.8.15.55
55 15:35:52.421 03/25/08 Sev=Info/4 CM/0x63100015
Launch xAuth application
56 15:35:52.437 03/25/08 Sev=Info/4 CM/0x63100017
xAuth application returned
57 15:35:52.437 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 195.8.15.55
58 15:35:52.671 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
59 15:35:53.031 03/25/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 195.8.15.55
60 15:35:53.031 03/25/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 195.8.15.55
61 15:35:53.031 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 195.8.15.55
62 15:35:53.031 03/25/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
63 15:35:53.093 03/25/08 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
64 15:35:53.093 03/25/08 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).
65 15:35:53.093 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 195.8.15.55
66 15:35:53.203 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
67 15:35:53.203 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
68 15:35:58.171 03/25/08 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
69 15:35:58.171 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 195.8.15.55
70 15:35:58.171 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
71 15:36:03.171 03/25/08 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
72 15:36:03.171 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 195.8.15.55
73 15:36:03.171 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
74 15:36:08.171 03/25/08 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
75 15:36:08.171 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 195.8.15.55
76 15:36:08.171 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
77 15:36:13.171 03/25/08 Sev=Info/4 IKE/0x6300002D
Phase-2 retransmission count exceeded: MsgID=25AC7E7D
78 15:36:13.171 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 195.8.15.55
79 15:36:13.171 03/25/08 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 195.8.15.55, our seq# = 2358087483
80 15:36:13.171 03/25/08 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=D99AAF564ACEB88E R_Cookie=3860D85EE0C7D0CC) reason = DEL_REASON_IKE_NEG_FAILED
81 15:36:13.171 03/25/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 195.8.15.55
82 15:36:13.171 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
83 15:36:13.171 03/25/08 Sev=Warning/2 IPSEC/0x6370001E
Unexpected TCP control packet received from 195.8.15.55, src port 10000, dst port 1056, flags 10h
84 15:36:16.171 03/25/08 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=D99AAF564ACEB88E R_Cookie=3860D85EE0C7D0CC) reason = DEL_REASON_IKE_NEG_FAILED
85 15:36:16.171 03/25/08 Sev=Info/4 CM/0x6310000F
Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
86 15:36:16.171 03/25/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
87 15:36:16.171 03/25/08 Sev=Info/4 CM/0x6310002D
Resetting TCP connection on port 10000
88 15:36:16.171 03/25/08 Sev=Info/6 CM/0x63100030
Removed local TCP port 1056 for TCP connection.
89 15:36:16.171 03/25/08 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
90 15:36:16.187 03/25/08 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
91 15:36:16.718 03/25/08 Sev=Info/6 IPSEC/0x63700022
TCP RST sent to 195.8.15.55, src port 1056, dst port 10000
92 15:36:16.718 03/25/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
93 15:36:16.718 03/25/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
94 15:36:16.718 03/25/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
95 15:36:16.718 03/25/08 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
Inviato: mar 25 mar , 2008 4:09 pm
da Wizard
Il problma รจ "DEL_REASON_IKE_NEG_FAILED".
Bisognerebbe vedere la config del router \ firewall a cui tenti di collegarti...