Problemi con VPN CISCO Client

Virtual private networks e affini

Moderatore: Federico.Lagni

Rispondi
mauirinho
n00b
Messaggi: 2
Iscritto il: mer 10 set , 2008 10:40 am

Salve a tutti,
voglio premettere che non capisco molto di vpn e simili, comunque adesso espongo il mio problema.
Ho sempre avuto un client VPN Cisco installato sul mio pc per lavori che effettuo con alcuni clienti. Un giorno uno di questi clienti mi ha chiesto di installare un nuovo client VPN, per l'esattezza Checkpoint VPN-1 Securemote.
Bene, o meglio male... da quel giorno il mio client VPN Cisco non ha più funzionato.
Ecco cosa succede, effettua la connessione regolarmente ma quando cerco di andare su un server della rete del cliente non vado da nessuna parte, è come se rimanessi chiuso nel mio pc e non vado più da nessuna parte.
Non so più come fare, per me è un grande problema perchè non posso gestire gli applicativi che ho realizzato per i miei clienti da remoto.
Spero che qualcuno di voi possa aiutarmi e se è necessario che faccia qualcosa o vi invii i file di log fatemelo spare.
Per sicurezza vi allego un log.
Grazie ancora

mauro
mauirinho
n00b
Messaggi: 2
Iscritto il: mer 10 set , 2008 10:40 am

Inserisco qui il log, non riesco a fare l'attachment:
------------------------------------------------------------------
Cisco Systems VPN Client Version 5.0.03.0560
Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Programmi\Cisco Systems\VPN Client\

1 14:23:26.937 09/09/08 Sev=Info/4 CM/0x63100002
Begin connection process

2 14:23:26.953 09/09/08 Sev=Info/4 CM/0x63100004
Establish secure connection

3 14:23:26.953 09/09/08 Sev=Info/4 CM/0x63100024
Attempt connection with server "213.205.5.253"

4 14:23:26.953 09/09/08 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 213.205.5.253.

5 14:23:26.968 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 213.205.5.253

6 14:23:27.171 09/09/08 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started

7 14:23:27.171 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

8 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

9 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 213.205.5.253

10 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer

11 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH

12 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports DPD

13 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T

14 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads

15 14:23:27.406 09/09/08 Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 7h.

16 14:23:27.296 09/09/08 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful

17 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 213.205.5.253

18 14:23:27.296 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

19 14:23:27.296 09/09/08 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x17ED, Remote Port = 0x1194

20 14:23:27.296 09/09/08 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device

21 14:23:27.296 09/09/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

22 14:23:27.406 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

23 14:23:27.406 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253

24 14:23:27.406 09/09/08 Sev=Info/4 CM/0x63100015
Launch xAuth application

25 14:23:27.406 09/09/08 Sev=Info/4 CM/0x63100017
xAuth application returned

26 14:23:27.406 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253

27 14:23:27.875 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

28 14:23:27.875 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253

29 14:23:27.875 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253

30 14:23:27.875 09/09/08 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

31 14:23:27.890 09/09/08 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator

32 14:23:27.890 09/09/08 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).

33 14:23:27.906 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 213.205.5.253

34 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

35 14:23:28.250 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 213.205.5.253

36 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.139.3.107

37 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.248

38 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.39.20.161

39 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 10.39.20.162

40 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000001

41 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000008

42 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #1
subnet = 10.139.8.22
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

43 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #2
subnet = 10.139.8.23
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

44 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #3
subnet = 10.139.8.24
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

45 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #4
subnet = 10.139.8.25
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

46 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #5
subnet = 10.139.8.26
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

47 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #6
subnet = 10.139.8.27
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

48 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #7
subnet = 10.139.8.28
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

49 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #8
subnet = 10.139.8.29
mask = 255.255.255.255
protocol = 0
src port = 0
dest port=0

50 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000

51 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.1.7.I built by vmurphy on Nov 30 2005 01:39:53

52 14:23:28.250 09/09/08 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194

53 14:23:28.250 09/09/08 Sev=Info/4 CM/0x63100019
Mode Config data received

54 14:23:28.265 09/09/08 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 10.139.3.107, GW IP = 213.205.5.253, Remote IP = 0.0.0.0

55 14:23:28.265 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 213.205.5.253

56 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

57 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 213.205.5.253

58 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds

59 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 2 seconds, setting expiry to 86398 seconds from now

60 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

61 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 213.205.5.253

62 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds

63 14:23:28.359 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to 213.205.5.253

64 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000059
Loading IPsec SA (MsgID=73DCD762 OUTBOUND SPI = 0x4ED8ED5C INBOUND SPI = 0x06EB757A)

65 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x4ED8ED5C

66 14:23:28.359 09/09/08 Sev=Info/5 IKE/0x63000026
Loaded INBOUND ESP SPI: 0x06EB757A

67 14:23:28.437 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1


68 14:23:29.484 09/09/08 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=10.139.3.107/255.255.255.248
DNS=10.39.20.161,10.39.20.162
WINS=0.0.0.0,0.0.0.0
Domain=
Split DNS Names=

69 14:23:29.484 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1


70 14:23:29.500 09/09/08 Sev=Info/4 CM/0x63100038
Successfully saved route changes to file.

71 14:23:29.500 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.139.8.22 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.23 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.24 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.25 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.26 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.27 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.28 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.29 255.255.255.255 10.139.3.107 10.139.3.107 1
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.2 255.255.255.255 192.168.1.103 192.168.1.103 1
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
213.205.5.253 255.255.255.255 192.168.1.2 192.168.1.103 1
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1


72 14:23:29.500 09/09/08 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter

73 14:23:29.531 09/09/08 Sev=Info/4 CM/0x6310001A
One secure connection established

74 14:23:29.593 09/09/08 Sev=Info/4 CM/0x6310003B
Address watch added for 192.168.1.103. Current hostname: MAUIVAIO, Current address(es): 10.139.3.107, 192.168.1.103.

75 14:23:29.593 09/09/08 Sev=Info/4 CM/0x6310003B
Address watch added for 10.139.3.107. Current hostname: MAUIVAIO, Current address(es): 10.139.3.107, 192.168.1.103.

76 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

77 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700010
Created a new key structure

78 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x5cedd84e into key list

79 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700010
Created a new key structure

80 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370000F
Added key with SPI=0x7a75eb06 into key list

81 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x6370002F
Assigned VA private interface addr 10.139.3.107

82 14:23:29.593 09/09/08 Sev=Info/4 IPSEC/0x63700037
Configure public interface: 192.168.1.103. SG: 213.205.5.253

83 14:23:29.593 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 1.

84 14:23:37.671 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

85 14:23:47.671 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

86 14:23:57.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

87 14:24:07.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

88 14:24:17.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

89 14:24:27.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

90 14:24:37.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

91 14:24:47.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

92 14:24:57.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

93 14:25:07.875 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

94 14:25:18.156 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

95 14:25:28.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

96 14:25:38.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

97 14:25:48.187 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

98 14:25:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

99 14:26:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

100 14:26:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

101 14:26:28.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

102 14:26:38.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

103 14:26:48.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

104 14:26:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

105 14:27:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

106 14:27:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

107 14:27:28.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

108 14:27:38.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

109 14:27:48.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

110 14:27:58.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

111 14:28:08.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

112 14:28:18.203 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

113 14:28:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

114 14:28:36.765 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

115 14:28:36.765 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253

116 14:28:36.765 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276850, last seq# = 0

117 14:28:36.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253

118 14:28:36.765 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276850

119 14:28:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

120 14:28:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

121 14:28:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

122 14:29:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

123 14:29:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

124 14:29:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

125 14:29:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

126 14:29:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

127 14:29:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

128 14:30:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

129 14:30:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

130 14:30:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

131 14:30:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

132 14:30:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

133 14:30:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

134 14:31:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

135 14:31:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

136 14:31:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

137 14:31:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

138 14:31:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

139 14:31:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

140 14:32:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

141 14:32:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

142 14:32:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

143 14:32:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

144 14:32:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

145 14:32:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

146 14:33:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

147 14:33:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

148 14:33:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

149 14:33:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

150 14:33:46.750 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

151 14:33:46.750 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253

152 14:33:46.750 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276851, last seq# = 38276850

153 14:33:46.750 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253

154 14:33:46.750 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276851

155 14:33:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

156 14:33:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

157 14:34:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

158 14:34:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

159 14:34:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

160 14:34:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

161 14:34:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

162 14:34:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

163 14:35:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

164 14:35:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

165 14:35:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

166 14:35:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

167 14:35:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

168 14:35:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

169 14:36:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

170 14:36:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

171 14:36:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

172 14:36:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

173 14:36:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

174 14:36:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

175 14:37:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

176 14:37:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

177 14:37:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

178 14:37:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

179 14:37:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

180 14:37:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

181 14:38:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

182 14:38:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

183 14:38:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

184 14:38:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

185 14:38:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

186 14:38:56.734 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

187 14:38:56.734 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253

188 14:38:56.734 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276852, last seq# = 38276851

189 14:38:56.734 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253

190 14:38:56.734 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276852

191 14:38:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

192 14:39:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

193 14:39:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

194 14:39:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

195 14:39:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

196 14:39:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

197 14:39:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

198 14:40:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

199 14:40:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

200 14:40:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

201 14:40:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

202 14:40:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

203 14:40:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

204 14:41:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

205 14:41:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

206 14:41:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

207 14:41:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

208 14:41:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

209 14:41:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

210 14:42:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

211 14:42:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

212 14:42:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

213 14:42:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

214 14:42:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

215 14:42:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

216 14:43:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

217 14:43:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

218 14:43:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

219 14:43:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

220 14:43:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

221 14:43:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

222 14:44:06.718 09/09/08 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 213.205.5.253

223 14:44:06.718 09/09/08 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 213.205.5.253

224 14:44:06.718 09/09/08 Sev=Info/5 IKE/0x63000041
Received DPD request from 213.205.5.253, new seq# = 38276853, last seq# = 38276852

225 14:44:06.718 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 213.205.5.253

226 14:44:06.718 09/09/08 Sev=Info/6 IKE/0x6300003F
Sending DPD ACK to 213.205.5.253, peer seq# = 38276853

227 14:44:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

228 14:44:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

229 14:44:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

230 14:44:38.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

231 14:44:48.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

232 14:44:58.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

233 14:45:08.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

234 14:45:18.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

235 14:45:28.218 09/09/08 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA

236 14:45:31.765 09/09/08 Sev=Info/6 GUI/0x63B0000D
Disconnecting VPN connection.

237 14:45:31.765 09/09/08 Sev=Info/4 CM/0x6310000A
Secure connections terminated

238 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection

239 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 213.205.5.253

240 14:45:31.765 09/09/08 Sev=Info/5 IKE/0x63000018
Deleting IPsec SA: (OUTBOUND SPI = 4ED8ED5C INBOUND SPI = 6EB757A)

241 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=73DCD762

242 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=C2862D2D2AFCE94E R_Cookie=215C36C0A79F967A) reason = DEL_REASON_RESET_SADB

243 14:45:31.765 09/09/08 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 213.205.5.253

244 14:45:31.781 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
10.139.3.104 255.255.255.248 10.139.3.107 10.139.3.107 20
10.139.3.107 255.255.255.255 127.0.0.1 127.0.0.1 20
10.139.8.22 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.23 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.24 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.25 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.26 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.27 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.28 255.255.255.255 10.139.3.107 10.139.3.107 1
10.139.8.29 255.255.255.255 10.139.3.107 10.139.3.107 1
10.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.2 255.255.255.255 192.168.1.103 192.168.1.103 1
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
213.205.5.253 255.255.255.255 192.168.1.2 192.168.1.103 1
224.0.0.0 240.0.0.0 10.139.3.107 10.139.3.107 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 10.139.3.107 10.139.3.107 1
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1


245 14:45:31.781 09/09/08 Sev=Info/6 CM/0x63100037
The routing table was returned to original state prior to Virtual Adapter

246 14:45:32.765 09/09/08 Sev=Info/5 CVPND/0x63400013
Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.2 192.168.1.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.103 192.168.1.103 30
192.168.1.0 255.255.255.0 192.168.1.103 192.168.1.103 20
192.168.1.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.103 192.168.1.103 20
224.0.0.0 240.0.0.0 192.168.1.103 192.168.1.103 20
255.255.255.255 255.255.255.255 192.168.1.103 192.168.1.103 1
255.255.255.255 255.255.255.255 192.168.1.103 0.0.0.0 1


247 14:45:32.765 09/09/08 Sev=Info/4 CM/0x63100035
The Virtual Adapter was disabled

248 14:45:32.765 09/09/08 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=C2862D2D2AFCE94E R_Cookie=215C36C0A79F967A) reason = DEL_REASON_RESET_SADB

249 14:45:32.765 09/09/08 Sev=Info/4 CM/0x63100013
Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

250 14:45:32.765 09/09/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv

251 14:45:32.765 09/09/08 Sev=Info/6 CM/0x63100031
Tunnel to headend device 213.205.5.253 disconnected: duration: 0 days 0:22:3

252 14:45:32.812 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.

253 14:45:32.812 09/09/08 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv

254 14:45:32.828 09/09/08 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.

255 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x7a75eb06

256 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x7a75eb06

257 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700013
Delete internal key with SPI=0x5cedd84e

258 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000C
Key deleted by SPI 0x5cedd84e

259 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

260 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys

261 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped

262 14:45:32.828 09/09/08 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
------------------------------------------------------------------
Rispondi