Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Cisco Systems VPN Client Version 5.0.07.0440
- Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
- Client Type(s): Windows, WinNT
- Running on: 6.2.9200
- Config file directory: C:\Program Files (x86)\Cisco Systems\VPN Client\
- 1 08:31:06.075 03/30/20 Sev=Warning/3 GUI/0xE3B00003
- GI EnumPPP callback timed out.
- 2 08:31:12.926 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 3 08:31:12.929 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 4 08:31:12.938 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 5 08:31:12.938 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 6 08:31:12.940 03/30/20 Sev=Info/4 GUI/0x63B00010
- Skipping expired certificate cn=Grzegorz Matusz,ou=Sekcja Wsparcia Sprzedazy i Logistyki,ou=Dzial Systemow Sprzedazy i CRM,ou=Pion Informatyki,ou=Cyfrowy_Polsat - Uzytkownicy,dc=polsatc (Serial Number: 1100021730F9FB45A992F2A0AC000100021730).
- 7 08:31:13.010 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 8 08:31:13.010 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 9 08:31:13.018 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 10 08:31:13.018 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 11 08:31:13.025 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 12 08:31:13.026 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 13 08:31:13.034 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 14 08:31:13.034 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 15 08:31:13.040 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 16 08:31:13.040 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 17 08:31:13.045 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 18 08:31:13.045 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 19 08:31:13.052 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 20 08:31:13.053 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 21 08:31:13.060 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 22 08:31:13.061 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 23 08:31:13.062 03/30/20 Sev=Info/6 GUI/0x63B00011
- Reloaded the Certificates in all Certificate Stores successfully.
- 24 08:31:13.069 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 25 08:31:13.069 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 26 08:31:13.076 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 27 08:31:13.076 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 28 08:31:13.119 03/30/20 Sev=Info/4 CM/0x63100002
- Begin connection process
- 29 08:31:13.078 03/30/20 Sev=Info/4 GUI/0x63B00010
- Skipping expired certificate cn=Grzegorz Matusz,ou=Sekcja Wsparcia Sprzedazy i Logistyki,ou=Dzial Systemow Sprzedazy i CRM,ou=Pion Informatyki,ou=Cyfrowy_Polsat - Uzytkownicy,dc=polsatc (Serial Number: 1100021730F9FB45A992F2A0AC000100021730).
- 30 08:31:13.124 03/30/20 Sev=Info/4 CM/0x63100004
- Establish secure connection
- 31 08:31:13.085 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 32 08:31:13.124 03/30/20 Sev=Info/4 CM/0x63100024
- Attempt connection with server "193.164.142.8"
- 33 08:31:13.085 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 34 08:31:13.092 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 35 08:31:13.092 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 36 08:31:13.094 03/30/20 Sev=Info/5 GUI/0x63B00001
- SerialHash value in profile does not match the cert found on the Smartcard
- 37 08:31:13.095 03/30/20 Sev=Info/6 GUI/0x63B0000E
- Wrote CertSerialHash value for profile Cp3. CertName: cn=Grzegorz Matusz,ou=Sekcja Wsparcia Sprzedazy i Logistyki,ou=Dzial Systemow Sprzedazy i CRM,ou=Pion Informatyki,ou=Cyfrowy_Polsat - Uzytkownicy,dc=polsatc
- 38 08:31:13.108 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 39 08:31:13.109 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 40 08:31:13.115 03/30/20 Sev=Info/4 CERT/0x63600015
- Cert (cn=Grzegorz Matusz,ou=Sekcja Wsparcia Sprzedazy i Logistyki,ou=Dzial Systemow Sprzedazy i CRM,ou=Pion Informatyki,ou=Cyfrowy_Polsat - Uzytkownicy,dc=polsatc) verification succeeded.
- 41 08:31:13.383 03/30/20 Sev=Info/6 IKE/0x6300003B
- Attempting to establish a connection with 193.164.142.8.
- 42 08:31:13.394 03/30/20 Sev=Info/6 CERT/0x63600026
- Attempting to find a Certificate using Serial Hash.
- 43 08:31:13.395 03/30/20 Sev=Info/6 CERT/0x63600027
- Found a Certificate using Serial Hash.
- 44 08:31:13.395 03/30/20 Sev=Info/4 IKE/0x63000001
- Starting IKE Phase 1 Negotiation
- 45 08:31:13.395 03/30/20 Sev=Info/4 IKE/0x63000013
- SENDING >>> ISAKMP OAK MM (SA, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 193.164.142.8
- 46 08:31:13.399 03/30/20 Sev=Info/4 IPSEC/0x63700008
- IPSec driver successfully started
- 47 08:31:13.399 03/30/20 Sev=Info/4 IPSEC/0x63700014
- Deleted all keys
- 48 08:31:13.459 03/30/20 Sev=Info/5 IKE/0x6300002F
- Received ISAKMP packet: peer = 193.164.142.8
- 49 08:31:13.459 03/30/20 Sev=Info/4 IKE/0x63000014
- RECEIVING <<< ISAKMP OAK MM (SA, VID(Nat-T), VID(Frag)) from 193.164.142.8
- 50 08:31:13.468 03/30/20 Sev=Info/5 IKE/0x63000001
- Peer supports NAT-T
- 51 08:31:13.469 03/30/20 Sev=Info/5 IKE/0x63000001
- Peer supports IKE fragmentation payloads
- 52 08:31:13.469 03/30/20 Sev=Info/6 IKE/0x63000001
- IOS Vendor ID Contruction successful
- 53 08:31:13.469 03/30/20 Sev=Info/4 IKE/0x63000013
- SENDING >>> ISAKMP OAK MM (KE, NON, NAT-D, NAT-D, VID(?), VID(Unity)) to 193.164.142.8
- 54 08:31:13.507 03/30/20 Sev=Info/5 IKE/0x6300002F
- Received ISAKMP packet: peer = 193.164.142.8
- 55 08:31:13.507 03/30/20 Sev=Info/4 IKE/0x63000014
- RECEIVING <<< ISAKMP OAK MM (KE, NON, CERT_REQ, CERT_REQ, CERT_REQ, VID(Unity), VID(Xauth), VID(?), VID(?), NAT-D, NAT-D) from 193.164.142.8
- 56 08:31:13.507 03/30/20 Sev=Info/5 IKE/0x63000001
- Peer is a Cisco-Unity compliant peer
- 57 08:31:13.507 03/30/20 Sev=Info/5 IKE/0x63000001
- Peer supports XAUTH
- 58 08:31:13.507 03/30/20 Sev=Info/5 IKE/0x63000082
- Received IOS Vendor ID with unknown capabilities flag 0x20000001
- 59 08:31:13.582 03/30/20 Sev=Warning/2 CERT/0xE3600001
- Failed to sign hash: B_EncryptInit() failed
- 60 08:31:13.582 03/30/20 Sev=Warning/2 CERT/0xE3600001
- Failed to sign hash with error 0x20f (527)
- 61 08:31:13.582 03/30/20 Sev=Info/4 CERT/0xE3600005
- Failed to RSA sign the hash for IKE phase 1 negotiation using my certificate.
- 62 08:31:13.582 03/30/20 Sev=Warning/2 IKE/0xE300009B
- Failed to generate signature: Signature generation failed (SigUtil:97)
- 63 08:31:13.582 03/30/20 Sev=Warning/2 IKE/0xE300009B
- Failed to build Signature payload (MsgHandlerMM:489)
- 64 08:31:13.582 03/30/20 Sev=Warning/2 IKE/0xE300009B
- Failed to build MM msg5 (NavigatorMM:312)
- 65 08:31:13.582 03/30/20 Sev=Warning/2 IKE/0xE30000A7
- Unexpected SW error occurred while processing Identity Protection (Main Mode) negotiator:(Navigator:2263)
- 66 08:31:13.582 03/30/20 Sev=Info/4 IKE/0x63000017
- Marking IKE SA for deletion (I_Cookie=923AB17AF0DDA723 R_Cookie=72D614E94B476527) reason = DEL_REASON_IKE_NEG_FAILED
- 67 08:31:13.582 03/30/20 Sev=Info/4 IKE/0x63000013
- SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 193.164.142.8
- 68 08:31:14.536 03/30/20 Sev=Info/4 IKE/0x6300004B
- Discarding IKE SA negotiation (I_Cookie=923AB17AF0DDA723 R_Cookie=72D614E94B476527) reason = DEL_REASON_IKE_NEG_FAILED
- 69 08:31:14.536 03/30/20 Sev=Info/4 CM/0x63100014
- Unable to establish Phase 1 SA with server "193.164.142.8" because of "DEL_REASON_IKE_NEG_FAILED"
- 70 08:31:14.537 03/30/20 Sev=Info/5 CM/0x63100025
- Initializing CVPNDrv
- 71 08:31:14.557 03/30/20 Sev=Info/6 CM/0x63100046
- Set tunnel established flag in registry to 0.
- 72 08:31:14.558 03/30/20 Sev=Info/4 IKE/0x63000001
- IKE received signal to terminate VPN connection
- 73 08:31:14.743 03/30/20 Sev=Info/4 IPSEC/0x63700014
- Deleted all keys
- 74 08:31:14.743 03/30/20 Sev=Info/4 IPSEC/0x63700014
- Deleted all keys
- 75 08:31:14.743 03/30/20 Sev=Info/4 IPSEC/0x63700014
- Deleted all keys
- 76 08:31:14.743 03/30/20 Sev=Info/4 IPSEC/0x6370000A
- IPSec driver successfully stopped
- 77 08:31:18.606 03/30/20 Sev=Info/6 CVPND/0x63400006
- Service reports: "Running".
- 78 08:31:18.606 03/30/20 Sev=Info/6 CVPND/0x63400006
- Service reports: "Running".
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement