Firstly, apologies for such a long posting... I am using Cisco VPN client v4.0.3(D) and Cisco PIX 6.3(4) I am having unpredictable results when trying to connect from a client to the PIX VPN. I can ALWAYS ping the PIX gateway. Sometimes the VPN connection establishes without a problem while otherv times it fails with a message... "Secure VPN connection terminated locally by the Client. Reason 403:Unable to contact the security gateway"...
Client Log of unsucessful attempt...
Cisco Systems VPN Client Version 4.0.3 (D) Copyright (C) 1998-2003 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600
1 16:21:38.375 03/13/08 Sev=Info/4 CM/0x63100002 Begin connection process2 16:21:38.390 03/13/08 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully
3 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet4 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100024 Attempt connection with server "193.120.151.100"
5 16:21:39.390 03/13/08 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 193.120.151.100.6 16:21:39.500 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 193.120.151.100
7 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started8 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
9 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.10010 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT- D, NAT-D, VID(?), VID(Unity)) to 193.120.151.100
18 16:21:39.562 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA19 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
20 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x63000071 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device21 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
22 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system23 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator
24 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).25 16:21:39.593 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 193.120.151.100
26 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!27 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100
28 16:21:49.984 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA29 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!
30 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.10031 16:21:54.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.100
32 16:21:54.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(Retransmission) to 193.120.151.10035 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!
36 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.10037 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x6300002D Phase-2 retransmission count exceeded: MsgID=3DFB0765
38 16:21:59.984 03/13/08 Sev=Info/6 IKE/0x6300003D Sending DPD request to 193.120.151.100, seq# = 175822505139 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to
193.120.151.10040 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED
41 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 193.120.151.10042 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED
43 16:22:02.984 03/13/08 Sev=Info/4 CM/0x6310000F Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system44 16:22:02.984 03/13/08 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv
45 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection46 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000085 Microsoft IPSec Policy Agent service started successfully
47 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys48 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
49 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys50 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped
PIX debug of above attempt... crypto_isakmp_process_block:src:146.212.29.67, dest:139.120.151.100 spt:57 dpt:500 OAK_AG exchange ISAKMP (0): processing SA payload. message ID = 0
ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 2 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 3 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 4 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 5 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 6 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 7 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 8 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 9 against priority 10 policy ISAKMP: encryption 3DES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP (0): atts are not acceptable. crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
ISAKMP (0): retransmitting phase 1 (0)... crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg
ISAKMP (0): retransmitting phase 1 (1)...TFW# ISAKMP (0): deleting SA: src 146.212.29.67, dst 139.120.151.100 ISADB: reaper checking SA 0x101dba4, conn_id = 0 DELETE IT!
VPN Peer:ISAKMP: Peer Info for 146.212.29.67/57 not found - peers:0
*********************************************************************************************** within a couple of minutes I can connect...Cisco Systems VPN Client Version 4.0.3 (D) Copyright (C) 1998-2003 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600
1 16:21:38.375 03/13/08 Sev=Info/4 CM/0x63100002 Begin connection process2 16:21:38.390 03/13/08 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully
3 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet4 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100024 Attempt connection with server "193.120.151.100"
5 16:21:39.390 03/13/08 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 193.120.151.100.6 16:21:39.500 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 193.120.151.100
7 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started8 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
9 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.10010 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT- D, NAT-D, VID(?), VID(Unity)) to 193.120.151.100
18 16:21:39.562 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA19 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
20 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x63000071 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device21 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
22 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system23 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator
24 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).25 16:21:39.593 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 193.120.151.100
26 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!27 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100
28 16:21:49.984 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA29 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!
30 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.10031 16:21:54.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.100
32 16:21:54.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(Retransmission) to 193.120.151.10035 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!
36 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.10037 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x6300002D Phase-2 retransmission count exceeded: MsgID=3DFB0765
38 16:21:59.984 03/13/08 Sev=Info/6 IKE/0x6300003D Sending DPD request to 193.120.151.100, seq# = 175822505139 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to
193.120.151.10040 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED
41 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 193.120.151.10042 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED
43 16:22:02.984 03/13/08 Sev=Info/4 CM/0x6310000F Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system44 16:22:02.984 03/13/08 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv
45 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection46 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000085 Microsoft IPSec Policy Agent service started successfully
47 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys48 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
49 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys50 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped
PIX debug of sucessful attempt... crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:36 dpt:500 OAK_AG exchange ISAKMP (0): processing SA payload. message ID = 0
ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 2 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 3 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 4 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 5 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 6 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 7 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 8 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 9 against priority 10 policy ISAKMP: encryption 3DES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP (0): atts are not acceptable. crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP_TRANSACTION exchange crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 OAK_QM exchange crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP (0): processing NOTIFY payload 36136 protocol 1 spi 0, message ID = 4258702155 ISAMKP (0): received DPD_R_U_THERE from peer 146.212.29.92 ISAKMP (0): sending NOTIFY message 36137 protocol 1 return status is IKMP_NO_ERR_NO_TRANS crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP (0): processing NOTIFY payload 36136 protocol 1 spi 0, message ID = 3990777061 ISAMKP (0): received DPD_R_U_THERE from peer 146.212.29.92 ISAKMP (0): sending NOTIFY message 36137 protocol 1 return status is IKMP_NO_ERR_NO_TRANS crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP (0): processing NOTIFY payload 36136 protocol 1 spi 0, message ID = 2692735947 ISAMKP (0): received DPD_R_U_THERE from peer 146.212.29.92 ISAKMP (0): sending NOTIFY message 36137 protocol 1 return status is IKMP_NO_ERR_NO_TRANS
************************************************************ Can anyone identify what may be causing this issue? TIA...