VPN Client & PIX

Firstly, apologies for such a long posting... I am using Cisco VPN client v4.0.3(D) and Cisco PIX 6.3(4) I am having unpredictable results when trying to connect from a client to the PIX VPN. I can ALWAYS ping the PIX gateway. Sometimes the VPN connection establishes without a problem while otherv times it fails with a message... "Secure VPN connection terminated locally by the Client. Reason 403:Unable to contact the security gateway"...

Client Log of unsucessful attempt...

Cisco Systems VPN Client Version 4.0.3 (D) Copyright (C) 1998-2003 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600

1 16:21:38.375 03/13/08 Sev=Info/4 CM/0x63100002 Begin connection process

2 16:21:38.390 03/13/08 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully

3 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet

4 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100024 Attempt connection with server "193.120.151.100"

5 16:21:39.390 03/13/08 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 193.120.151.100.

6 16:21:39.500 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 193.120.151.100

7 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started

8 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

9 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.100

10 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT- D, NAT-D, VID(?), VID(Unity)) to 193.120.151.100

18 16:21:39.562 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA

19 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

20 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x63000071 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device

21 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

22 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

23 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator

24 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).

25 16:21:39.593 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 193.120.151.100

26 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

27 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100

28 16:21:49.984 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA

29 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

30 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100

31 16:21:54.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.100

32 16:21:54.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(Retransmission) to 193.120.151.100

35 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

36 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100

37 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x6300002D Phase-2 retransmission count exceeded: MsgID=3DFB0765

38 16:21:59.984 03/13/08 Sev=Info/6 IKE/0x6300003D Sending DPD request to 193.120.151.100, seq# = 1758225051

39 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to

193.120.151.100

40 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED

41 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 193.120.151.100

42 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED

43 16:22:02.984 03/13/08 Sev=Info/4 CM/0x6310000F Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

44 16:22:02.984 03/13/08 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv

45 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection

46 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000085 Microsoft IPSec Policy Agent service started successfully

47 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

48 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

49 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

50 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped

PIX debug of above attempt... crypto_isakmp_process_block:src:146.212.29.67, dest:139.120.151.100 spt:57 dpt:500 OAK_AG exchange ISAKMP (0): processing SA payload. message ID = 0

ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 2 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 3 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 4 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 5 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 6 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 7 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 8 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 9 against priority 10 policy ISAKMP: encryption 3DES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP (0): atts are not acceptable. crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

ISAKMP (0): retransmitting phase 1 (0)... crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

crypto_isakmp_process_block:src:146.212.29.83, dest:139.120.151.100 spt:50266 dpt:4500 ISAKMP: sa not found for ike msg

ISAKMP (0): retransmitting phase 1 (1)...TFW# ISAKMP (0): deleting SA: src 146.212.29.67, dst 139.120.151.100 ISADB: reaper checking SA 0x101dba4, conn_id = 0 DELETE IT!

VPN Peer:ISAKMP: Peer Info for 146.212.29.67/57 not found - peers:0

*********************************************************************************************** within a couple of minutes I can connect...

Cisco Systems VPN Client Version 4.0.3 (D) Copyright (C) 1998-2003 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600

1 16:21:38.375 03/13/08 Sev=Info/4 CM/0x63100002 Begin connection process

2 16:21:38.390 03/13/08 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully

3 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet

4 16:21:38.390 03/13/08 Sev=Info/4 CM/0x63100024 Attempt connection with server "193.120.151.100"

5 16:21:39.390 03/13/08 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 193.120.151.100.

6 16:21:39.500 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 193.120.151.100

7 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started

8 16:21:39.500 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

9 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.100

10 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT- D, NAT-D, VID(?), VID(Unity)) to 193.120.151.100

18 16:21:39.562 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA

19 16:21:39.562 03/13/08 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194

20 16:21:39.562 03/13/08 Sev=Info/5 IKE/0x63000071 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device

21 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

22 16:21:39.562 03/13/08 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

23 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator

24 16:21:39.578 03/13/08 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy).

25 16:21:39.593 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 193.120.151.100

26 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

27 16:21:44.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100

28 16:21:49.984 03/13/08 Sev=Info/6 IKE/0x63000054 Sent a keepalive on the IPSec SA

29 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

30 16:21:49.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100

31 16:21:54.562 03/13/08 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 193.120.151.100

32 16:21:54.562 03/13/08 Sev=Info/4 IKE/0x63000014 RECEIVING > ISAKMP OAK AG *(Retransmission) to 193.120.151.100

35 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000021 Retransmitting last packet!

36 16:21:54.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(Retransmission) to 193.120.151.100

37 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x6300002D Phase-2 retransmission count exceeded: MsgID=3DFB0765

38 16:21:59.984 03/13/08 Sev=Info/6 IKE/0x6300003D Sending DPD request to 193.120.151.100, seq# = 1758225051

39 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to

193.120.151.100

40 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED

41 16:21:59.984 03/13/08 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 193.120.151.100

42 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0D1DA2AA77DDB72C R_Cookie=B86DF3623003E651) reason = DEL_REASON_IKE_NEG_FAILED

43 16:22:02.984 03/13/08 Sev=Info/4 CM/0x6310000F Phase 1 SA deleted before Mode Config is completed cause by "DEL_REASON_IKE_NEG_FAILED". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

44 16:22:02.984 03/13/08 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv

45 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection

46 16:22:02.984 03/13/08 Sev=Info/4 IKE/0x63000085 Microsoft IPSec Policy Agent service started successfully

47 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

48 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

49 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x63700014 Deleted all keys

50 16:22:02.984 03/13/08 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped

PIX debug of sucessful attempt... crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:36 dpt:500 OAK_AG exchange ISAKMP (0): processing SA payload. message ID = 0

ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 2 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 3 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 4 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 256 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 5 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 6 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 7 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 8 against priority 10 policy ISAKMP: encryption AES-CBC ISAKMP: hash MD5 ISAKMP: default group 2 ISAKMP: auth pre-share ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP: keylength of 128 ISAKMP (0): atts are not acceptable. Next payload is 3 ISAKMP (0): Checking ISAKMP transform 9 against priority 10 policy ISAKMP: encryption 3DES-CBC ISAKMP: hash SHA ISAKMP: default group 2 ISAKMP: extended auth pre-share (init) ISAKMP: life type in seconds ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b ISAKMP (0): atts are not acceptable. crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP_TRANSACTION exchange crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 OAK_QM exchange crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP (0): processing NOTIFY payload 36136 protocol 1 spi 0, message ID = 4258702155 ISAMKP (0): received DPD_R_U_THERE from peer 146.212.29.92 ISAKMP (0): sending NOTIFY message 36137 protocol 1 return status is IKMP_NO_ERR_NO_TRANS crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP (0): processing NOTIFY payload 36136 protocol 1 spi 0, message ID = 3990777061 ISAMKP (0): received DPD_R_U_THERE from peer 146.212.29.92 ISAKMP (0): sending NOTIFY message 36137 protocol 1 return status is IKMP_NO_ERR_NO_TRANS crypto_isakmp_process_block:src:146.212.29.92, dest:139.120.151.100 spt:24677 dpt:4500 ISAKMP (0): processing NOTIFY payload 36136 protocol 1 spi 0, message ID = 2692735947 ISAMKP (0): received DPD_R_U_THERE from peer 146.212.29.92 ISAKMP (0): sending NOTIFY message 36137 protocol 1 return status is IKMP_NO_ERR_NO_TRANS

************************************************************ Can anyone identify what may be causing this issue? TIA...
Reply to
terrydoc
Loading thread data ...

Is there any particular reason that you aren't using any of the newer client releases in the 4.X or 5.0 series IPsec clients? Or even 4.0.5.D?

formatting link

-Gary

Reply to
Gary

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.