Krijg met mijn notebook geen verbinding met mijn werk.
Notebook (Cisco VPN Client) --> WPA Wifi --> Router --> ADSL --> WERK
Via mijn workstation werk het wel gewoon. Zelfde installatie CD (nlite). Het logbestand van de VPN-verbinding kan je hieronder vinden.
Cisco Systems VPN Client Version 4.8.00.0440
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
Config file directory: C:\Program Files\Cisco VPN Client
43 21:15:34.424 09/02/06 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
44 21:15:34.424 09/02/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
45 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 80.127.175.146
46 21:15:34.894 09/02/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 80.127.175.146
47 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
48 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
49 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports DPD
50 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
51 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
52 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
53 21:15:34.924 09/02/06 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
54 21:15:34.924 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 80.127.175.146
55 21:15:34.924 09/02/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
56 21:15:34.924 09/02/06 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
57 21:15:34.924 09/02/06 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
58 21:15:34.924 09/02/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
59 21:15:34.975 09/02/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 80.127.175.146
60 21:15:34.975 09/02/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 80.127.175.146
61 21:15:34.975 09/02/06 Sev=Info/4 CM/0x63100015
Launch xAuth application
62 21:15:35.035 09/02/06 Sev=Info/4 CM/0x63100017
xAuth application returned
63 21:15:35.035 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 80.127.175.146
64 21:15:35.415 09/02/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 80.127.175.146
65 21:15:35.415 09/02/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 80.127.175.146
66 21:15:35.415 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 80.127.175.146
67 21:15:35.415 09/02/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
68 21:15:36.016 09/02/06 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
69 21:15:36.016 09/02/06 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
70 21:15:36.026 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 80.127.175.146
Notebook (Cisco VPN Client) --> WPA Wifi --> Router --> ADSL --> WERK
Via mijn workstation werk het wel gewoon. Zelfde installatie CD (nlite). Het logbestand van de VPN-verbinding kan je hieronder vinden.
Cisco Systems VPN Client Version 4.8.00.0440
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
Config file directory: C:\Program Files\Cisco VPN Client
43 21:15:34.424 09/02/06 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
44 21:15:34.424 09/02/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
45 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 80.127.175.146
46 21:15:34.894 09/02/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?), VID(?)) from 80.127.175.146
47 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
48 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
49 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports DPD
50 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
51 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports IKE fragmentation payloads
52 21:15:34.894 09/02/06 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
53 21:15:34.924 09/02/06 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
54 21:15:34.924 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 80.127.175.146
55 21:15:34.924 09/02/06 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
56 21:15:34.924 09/02/06 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
57 21:15:34.924 09/02/06 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
58 21:15:34.924 09/02/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
59 21:15:34.975 09/02/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 80.127.175.146
60 21:15:34.975 09/02/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 80.127.175.146
61 21:15:34.975 09/02/06 Sev=Info/4 CM/0x63100015
Launch xAuth application
62 21:15:35.035 09/02/06 Sev=Info/4 CM/0x63100017
xAuth application returned
63 21:15:35.035 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 80.127.175.146
64 21:15:35.415 09/02/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 80.127.175.146
65 21:15:35.415 09/02/06 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 80.127.175.146
66 21:15:35.415 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 80.127.175.146
67 21:15:35.415 09/02/06 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
68 21:15:36.016 09/02/06 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
69 21:15:36.016 09/02/06 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
70 21:15:36.026 09/02/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 80.127.175.146
... all gonna wonder how you ever thought you could live so large and leave so little for the rest of us...