First, let me say I'm in not very well versed in network issues.
I'm trying to connect to a client's network through the Cisco VPN Client which they sent along with the configuration file. My network is behind a Linksys router. I have 2 XP machines (desktop and laptop). The laptop connects without any problems, but the desktop will not. I've attached the Cisco log files for both connections below. Their network administrator tells me that the reason I'm not connecting is because of authentication, but that doesn't make sense since the laptop can connect without any issues. My guess is that there is a setting issue of some kind on the desktop which I can't figure out.
I do not use XP firewall, have Norton AV and have disabled the Worm Protection (though on the laptop it is not disabled and works fine).
Any ideas/help would be greatly appreciated. If you need me to post additional info, please be considerate of my limited knowledge when asking.
B************************ DESKTOP LOG ************************ Cisco Systems VPN Client Version 4.8.01.0300 Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\\Program Files\\Cisco Systems\\VPN Client\\
1 17:17:58.015 09/27/06 Sev=Warning/3 GUI/0xA3B0000B Reloaded the Certificates in all Certificate Stores successfully.2 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100002 Begin connection process
3 17:18:06.281 09/27/06 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully4 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet
5 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "vpn.edensandavant.com"6 17:18:07.281 09/27/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 72.159.147.130.
7 17:18:07.281 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 72.159.147.1308 17:18:07.281 09/27/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started
9 17:18:07.281 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys10 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130
11 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 72.159.147.13019 17:18:07.359 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
20 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x119421 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device
22 17:18:07.359 09/27/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system23 17:18:17.359 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
24 17:18:27.359 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA25 17:18:37.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
26 17:18:47.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA27 17:18:57.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
28 17:19:07.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA29 17:19:17.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
30 17:19:27.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA31 17:19:37.703 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
32 17:19:47.734 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA33 17:19:57.734 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
34 17:20:07.734 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA35 17:20:17.843 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
36 17:20:27.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA37 17:20:37.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
38 17:20:47.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA39 17:20:57.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
40 17:21:07.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA41 17:21:17.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
42 17:21:27.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA43 17:21:37.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
44 17:21:47.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA45 17:21:57.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
46 17:22:07.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA47 17:22:17.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
48 17:22:27.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA49 17:22:37.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
50 17:22:47.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA51 17:22:57.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA
52 17:23:07.359 09/27/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=56E32B7363621FF7 R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH53 17:23:07.359 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130
54 17:23:07.859 09/27/06 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=56E32B7363621FF7 R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH55 17:23:07.859 09/27/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "vpn.edensandavant.com" because of "DEL_REASON_CANNOT_AUTH"
56 17:23:07.859 09/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv57 17:23:07.875 09/27/06 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.
58 17:23:07.875 09/27/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection59 17:23:07.890 09/27/06 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully
60 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys61 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
62 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys63 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped
************************ LAPTOP LOG ************************ Cisco Systems VPN Client Version 4.8.01.0300 Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\\Program Files\\Cisco Systems\\VPN Client\\1 17:09:17.656 09/27/06 Sev=Warning/3 GUI/0xA3B0000B Reloaded the Certificates in all Certificate Stores successfully.
2 17:09:18.734 09/27/06 Sev=Info/4 CM/0x63100002 Begin connection process3 17:09:18.750 09/27/06 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully
4 17:09:18.750 09/27/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet5 17:09:18.750 09/27/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "vpn.edensandavant.com"
6 17:09:18.781 09/27/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 72.159.147.130.7 17:09:18.812 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 72.159.147.130
8 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.1309 17:09:18.875 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 72.159.147.130
17 17:09:18.906 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA18 17:09:18.906 09/27/06 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
19 17:09:18.906 09/27/06 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device20 17:09:18.906 09/27/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
21 17:09:18.906 09/27/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started22 17:09:18.906 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
23 17:09:18.906 09/27/06 Sev=Info/6 IPSEC/0x6370002C Sent 1116 packets, 0 were fragmented.24 17:09:18.953 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130
25 17:09:18.953 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.13029 17:09:19.046 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130
30 17:09:19.046 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.13032 17:09:19.046 09/27/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
33 17:09:19.062 09/27/06 Sev=Info/5 IKE/0x6300005E Client sending a firewall request to concentrator34 17:09:19.062 09/27/06 Sev=Info/5 IKE/0x6300005D Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
35 17:09:19.062 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.13036 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130
37 17:09:19.125 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 72.159.147.13054 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130
55 17:09:19.218 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING >> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 72.159.147.13085 17:10:04.468 09/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 72.159.147.130, our seq# = 205082945
86 17:10:04.515 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.13087 17:10:04.515 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to
72.159.147.13090 17:10:19.968 09/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 72.159.147.130, our seq# = 205082946
91 17:10:20.015 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.13092 17:10:20.015 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130
127 17:17:09.625 09/27/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 7B12D7C2 INBOUND SPI = 39E7F88B)128 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000049 Discarding IPsec SA negotiation, MsgID=2A699BE2
129 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=64AAF2FD5DA2CB65 R_Cookie=BB643A0F26D3EED6) reason = DEL_REASON_RESET_SADB130 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130
131 17:17:09.625 09/27/06 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102 20 72.159.147.130 255.255.255.255 192.168.20.1 192.168.20.102 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102 1 192.168.9.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.10.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102 20 192.168.20.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.20.1 255.255.255.255 192.168.20.102 192.168.20.102 1 192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102 20 192.168.30.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.50.0 255.255.255.0 192.168.50.250 192.168.50.250 20 192.168.50.250 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.50.255 255.255.255.255 192.168.50.250 192.168.50.250 20 224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102 20 224.0.0.0 240.0.0.0 192.168.50.250 192.168.50.250 20 255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102 1 255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0 1 255.255.255.255 255.255.255.255 192.168.50.250 192.168.50.250 1132 17:17:09.640 09/27/06 Sev=Info/6 CM/0x63100037 The routing table was returned to original state prior to Virtual Adapter
133 17:17:11.187 09/27/06 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102 20 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102 1 192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102 20 192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102 20 224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102 20 255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0 1 255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102 1134 17:17:11.187 09/27/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled
135 17:17:11.187 09/27/06 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=64AAF2FD5DA2CB65 R_Cookie=BB643A0F26D3EED6) reason = DEL_REASON_RESET_SADB136 17:17:11.187 09/27/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
137 17:17:11.187 09/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv138 17:17:11.187 09/27/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device vpn.edensandavant.com disconnected: duration:
0 days 0:7:51139 17:17:11.203 09/27/06 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.
140 17:17:11.203 09/27/06 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully141 17:17:11.203 09/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv
142 17:17:11.218 09/27/06 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.143 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8bf8e739
144 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8bf8e739145 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc2d7127b
146 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc2d7127b147 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
148 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys149 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped
150 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys