Problems connecting with Cisco VPN client

First, let me say I'm in not very well versed in network issues.

I'm trying to connect to a client's network through the Cisco VPN Client which they sent along with the configuration file. My network is behind a Linksys router. I have 2 XP machines (desktop and laptop). The laptop connects without any problems, but the desktop will not. I've attached the Cisco log files for both connections below. Their network administrator tells me that the reason I'm not connecting is because of authentication, but that doesn't make sense since the laptop can connect without any issues. My guess is that there is a setting issue of some kind on the desktop which I can't figure out.

I do not use XP firewall, have Norton AV and have disabled the Worm Protection (though on the laptop it is not disabled and works fine).

Any ideas/help would be greatly appreciated. If you need me to post additional info, please be considerate of my limited knowledge when asking.

B

************************ DESKTOP LOG ************************ Cisco Systems VPN Client Version 4.8.01.0300 Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\\Program Files\\Cisco Systems\\VPN Client\\

1 17:17:58.015 09/27/06 Sev=Warning/3 GUI/0xA3B0000B Reloaded the Certificates in all Certificate Stores successfully.

2 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100002 Begin connection process

3 17:18:06.281 09/27/06 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully

4 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet

5 17:18:06.281 09/27/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "vpn.edensandavant.com"

6 17:18:07.281 09/27/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 72.159.147.130.

7 17:18:07.281 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 72.159.147.130

8 17:18:07.281 09/27/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started

9 17:18:07.281 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

10 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

11 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 72.159.147.130

19 17:18:07.359 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

20 17:18:07.359 09/27/06 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

21 17:18:07.359 09/27/06 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device

22 17:18:07.359 09/27/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

23 17:18:17.359 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

24 17:18:27.359 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

25 17:18:37.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

26 17:18:47.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

27 17:18:57.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

28 17:19:07.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

29 17:19:17.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

30 17:19:27.484 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

31 17:19:37.703 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

32 17:19:47.734 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

33 17:19:57.734 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

34 17:20:07.734 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

35 17:20:17.843 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

36 17:20:27.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

37 17:20:37.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

38 17:20:47.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

39 17:20:57.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

40 17:21:07.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

41 17:21:17.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

42 17:21:27.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

43 17:21:37.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

44 17:21:47.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

45 17:21:57.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

46 17:22:07.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

47 17:22:17.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

48 17:22:27.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

49 17:22:37.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

50 17:22:47.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

51 17:22:57.859 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

52 17:23:07.359 09/27/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=56E32B7363621FF7 R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH

53 17:23:07.359 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130

54 17:23:07.859 09/27/06 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=56E32B7363621FF7 R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH

55 17:23:07.859 09/27/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "vpn.edensandavant.com" because of "DEL_REASON_CANNOT_AUTH"

56 17:23:07.859 09/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv

57 17:23:07.875 09/27/06 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.

58 17:23:07.875 09/27/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection

59 17:23:07.890 09/27/06 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully

60 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

61 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

62 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

63 17:23:07.890 09/27/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped

************************ LAPTOP LOG ************************ Cisco Systems VPN Client Version 4.8.01.0300 Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\\Program Files\\Cisco Systems\\VPN Client\\

1 17:09:17.656 09/27/06 Sev=Warning/3 GUI/0xA3B0000B Reloaded the Certificates in all Certificate Stores successfully.

2 17:09:18.734 09/27/06 Sev=Info/4 CM/0x63100002 Begin connection process

3 17:09:18.750 09/27/06 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully

4 17:09:18.750 09/27/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet

5 17:09:18.750 09/27/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "vpn.edensandavant.com"

6 17:09:18.781 09/27/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 72.159.147.130.

7 17:09:18.812 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 72.159.147.130

8 17:09:18.875 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

9 17:09:18.875 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 72.159.147.130

17 17:09:18.906 09/27/06 Sev=Info/6 IKE/0x63000055 Sent a keepalive on the IPSec SA

18 17:09:18.906 09/27/06 Sev=Info/4 IKE/0x63000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

19 17:09:18.906 09/27/06 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device

20 17:09:18.906 09/27/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

21 17:09:18.906 09/27/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started

22 17:09:18.906 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

23 17:09:18.906 09/27/06 Sev=Info/6 IPSEC/0x6370002C Sent 1116 packets, 0 were fragmented.

24 17:09:18.953 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

25 17:09:18.953 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.130

29 17:09:19.046 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

30 17:09:19.046 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.130

32 17:09:19.046 09/27/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

33 17:09:19.062 09/27/06 Sev=Info/5 IKE/0x6300005E Client sending a firewall request to concentrator

34 17:09:19.062 09/27/06 Sev=Info/5 IKE/0x6300005D Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).

35 17:09:19.062 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 72.159.147.130

36 17:09:19.125 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

37 17:09:19.125 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 72.159.147.130

54 17:09:19.218 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

55 17:09:19.218 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING >> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 72.159.147.130

85 17:10:04.468 09/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 72.159.147.130, our seq# = 205082945

86 17:10:04.515 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

87 17:10:04.515 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to

72.159.147.130

90 17:10:19.968 09/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 72.159.147.130, our seq# = 205082946

91 17:10:20.015 09/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 72.159.147.130

92 17:10:20.015 09/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130

127 17:17:09.625 09/27/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 7B12D7C2 INBOUND SPI = 39E7F88B)

128 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000049 Discarding IPsec SA negotiation, MsgID=2A699BE2

129 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=64AAF2FD5DA2CB65 R_Cookie=BB643A0F26D3EED6) reason = DEL_REASON_RESET_SADB

130 17:17:09.625 09/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 72.159.147.130

131 17:17:09.625 09/27/06 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102 20 72.159.147.130 255.255.255.255 192.168.20.1 192.168.20.102 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102 1 192.168.9.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.10.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102 20 192.168.20.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.20.1 255.255.255.255 192.168.20.102 192.168.20.102 1 192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102 20 192.168.30.0 255.255.255.0 192.168.50.250 192.168.50.250 1 192.168.50.0 255.255.255.0 192.168.50.250 192.168.50.250 20 192.168.50.250 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.50.255 255.255.255.255 192.168.50.250 192.168.50.250 20 224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102 20 224.0.0.0 240.0.0.0 192.168.50.250 192.168.50.250 20 255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102 1 255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0 1 255.255.255.255 255.255.255.255 192.168.50.250 192.168.50.250 1

132 17:17:09.640 09/27/06 Sev=Info/6 CM/0x63100037 The routing table was returned to original state prior to Virtual Adapter

133 17:17:11.187 09/27/06 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.20.1 192.168.20.102 20 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.223.75 255.255.255.255 192.168.20.102 192.168.20.102 1 192.168.20.0 255.255.255.0 192.168.20.102 192.168.20.102 20 192.168.20.102 255.255.255.255 127.0.0.1 127.0.0.1 20 192.168.20.255 255.255.255.255 192.168.20.102 192.168.20.102 20 224.0.0.0 240.0.0.0 192.168.20.102 192.168.20.102 20 255.255.255.255 255.255.255.255 192.168.20.102 0.0.0.0 1 255.255.255.255 255.255.255.255 192.168.20.102 192.168.20.102 1

134 17:17:11.187 09/27/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled

135 17:17:11.187 09/27/06 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=64AAF2FD5DA2CB65 R_Cookie=BB643A0F26D3EED6) reason = DEL_REASON_RESET_SADB

136 17:17:11.187 09/27/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

137 17:17:11.187 09/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv

138 17:17:11.187 09/27/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device vpn.edensandavant.com disconnected: duration:

0 days 0:7:51

139 17:17:11.203 09/27/06 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.

140 17:17:11.203 09/27/06 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully

141 17:17:11.203 09/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv

142 17:17:11.218 09/27/06 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0.

143 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8bf8e739

144 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8bf8e739

145 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc2d7127b

146 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc2d7127b

147 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

148 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

149 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped

150 17:17:11.234 09/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
Reply to
BB
Loading thread data ...

Hi,

54 17:23:07.859 09/27/06 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=56E32B7363621FF7 R_Cookie=961E773ECEB59413) reason = DEL_REASON_CANNOT_AUTH

55 17:23:07.859 09/27/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "vpn.edensandavant.com" because of "DEL_REASON_CANNOT_AUTH"

Means that you have authentication problems. This could be a number of reason why. Are you connectiong both PC's at the same time ? Maybe your system only allows you one login/connection at the time.

Or maybe your simply types wrong username password on the laptop.

HTH Martin Bilgrav

Reply to
Martin Bilgrav

So the same PCF file are imported into botuh PC's. - ok In that case you might have somekind of Antivirus program and/or Personal Firewall Software, that blokck your needs.

HTH Martin Bilgrav

Reply to
Martin Bilgrav

Try to use UDP encapsulation (NAT-T), or better yet TCP encapsulation (if configured on the concentrator end) instead of pure IPSEC. On both your home computers.

Reply to
Andrei Ivanov

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.