No Cisco VPN Connection through AEBS

I have an HP nc8430 for work and had no problem connecting through a my home cable modem, AEBS and Cisco VPN tunnel to our secure network at work. Inexplicably the wireless connection via the VPN has stopped working. The PC can connect to the Internet directly through the AEBS as long as the VPN is not connected and can directly connect from the cable modem and VPN using an ethernet cable (wired connection). Does anyone have any suggestions? The IT "gurus" at work have been of little help.
12 PowerBook G4   Mac OS X (10.4.9)  

Hi Fred!
I suggest posting your question in a more appropriate forum such as the AirPort for Windows forum found here <http://discussions.apple.com/forum.jspa?forumID=1014>. This fourm is dedicated to Mac and Windows compatibility issues.
On a side note, while it may be popular to call the folks in the IT world "gurus" while rolling your eyes, keep in mind that just because they can't help you doesn't mean they don't know their jobs. (I would never expect a General Practioner doctor to be knowledgeable in heart surgery.) In this case they should only be expected to support your computer connecting directly to the Internet and then to your company network. Your network (the AEBS) is your responsibility, not theirs. If they try to help you and fail then be glad you at least have an IT group that's open to working with you. Some aren't willing to even go that far.
Best of luck finding your answer! bill
1 GHz Powerbook G4   Mac OS X (10.4.9)  

Similar Messages

  • Cisco VPN Connection Problems

    Hello Everyone,
    We're having a problem with the Cisco VPN connection capability in Snow Leopard.
    The transaction complains that our shared secret is incorrect. What I believe is happening is that certain assumptions are made about the IKE proposals and encryption etc. There doesn't appear to be a place to tailor these in the connection profile. There may be at the system level (which I'm unaware of).
    Has anyone else experienced this problem?
    I believe the same problem applies to the iPhone's Cisco VPN connector.
    Furthermore, Cisco is not providing Snow-Leopard IPSec home-to-network clients any longer; they are promoting the AnyConnect SSL VPN instead, for which they have a BETA build available specifically for Snow Leopard.
    So this reduces our options (yes, I'm working on VPNTracker).
    Thank you.

    It is a known limitation that you are only able to establish a single VPN connection to the same VPN server through a router doing NAT like yours.
    What client exactly do you use and what settings did you define there?

  • Cisco VPN connects but then no services are available.

    Where to start:
    I have a situation where by my remote office, 5 machines, connects to head office via Cisco VPN client.
    Recently we have been able to make a vpn connection but once connected we have no services available like connecting to servers, internet, network drives, voip phone or even pinging any of the services. We get an IP address on the virtual network adaptor created by vpn connection but then nothing.
    After a hec of amount of troubleshooting I swapped out our router, Draytek Vigor 2820, for another 2820. Same problem. I then took my Draytek Vigor from home, that does work, to the office and it works perfectly fine using the 2600 router in the office. I then tried a dlink router and that worked in office as well. So it has something to do with the 2820 router. It has been working fine for months and now recently, having changed nothing on it, it has stopped working for us with Cisco vpn connection. Does anyone have any clues as to why and what I could do on the router to resolve issue or could it be something on the cisco side that needs changing? I have already updated firmware to latest version on router.
    Any help / advice would be great appreciated.
    Regards,
    Ashley

    Can you please share the configuration as there might be something that change after the upgrade that might cause the issue.

  • Cisco vpn connection

    I am tryijng to set up a cisco vpn connection.
    I tried to do it manually throygh setting set up a vpn connection an by installion a config.
    Always i get the message "voer de gebruikersgegevens in" what means in English enter your user contents or something.
    I tried everything, setting of my Wifi before configuring
    The information I filled in are:
    Beschrijving: Optimix VPN
    Server: 195.18.88.130
    Account: my username
    Password: .....
    Uses cert: no
    Groepsnaam: Optimixmobiel
    Geheim: .....
    Can somebody tell me what the problem is?
    Kindly regards

    I have the same problem. I configured My iPhone to connect my PIX trough VPN.
    In the first time the first phrase wouldn't succeeded.
    But I read this ( http://blogs.oreilly.com/iphone/2008/07/strong-passwords-can-hurt.html ) and that's now not really the problem. (to strong pw)
    When I let the iPhone connect I see a popup 'Enter User Authentication' if I chose OK, its gone (I have the Dutch version)
    If I see the syslog I see this: Authentication failed for user ''
    it looks like the iPhone send an empty user account?
    How can we fix this?
    Regards,
    Dennis Kortekaas
    The Netherlands

  • Cisco VPN connection drops on airport extreme on OS X 10.6.7

    I recently bought Airport Extreme and I must say the wifi coverage and strength is amazing compared to the DLink or Belkin routers that I tried. THe whole thing setup like in 2 minutes. Love it.
    Now the problem. I use CISCO VPN provided by work a lot as I work from home frequently. I have found that the VPN connection drops like in 2-5 minutes of connecting. I looked through the several threads and apple response " to use NAT-T in CISCO VPN preferences". Only thing is that I did not see any NAT setting options in preferences and also I am unable to edit anything in the CISCO VPN pref (probably things locked out by our IT who provided the vpn software).
    I also tried someone's suggestion that I switch to manual radio channels in the airport utility config - but that didn't work either.
    Any suggestions?
    I am on OS X 10.6.7 and CISCO VPN CLIENT 4.9.0.1.0180
    URGENT HELP NEEDED

    airport is off how can i turn it on?
    Click on the AirPort icon in the OS X menu bar. Select "Turn Wi-Fi On" or "Turn AirPort On" as appropriate.
    how can i reinstall mac os x 10.6.7?
    I would suggest that you start with the Snow Leopard installation disk. You can then update to 10.6.7 from Software Update.

  • IPSEC Cisco VPN connection. Modifying default VPN gateway allows internet traffic but loses access to VPN

    Hello!!
    I'm using the IPSEC Cisco VPN Network property to connect to my company.
    Once I get connected, I lose internet access, because all the traffic is redirected through the tunnel and I want both, of course.
    If I modify the default getaway in the routing table, with this command
    route change default x.x.x.x, where this is the getaway IP when not connected to the VPN,
    I gain access to internet, but I lose access through the VPN tunnel.
    I was reading about it in google, and what I have to do is to add a static route to the VPN again, but I don't know how.
    Could you please help me?
    thanks in advance!!

    Hi Norbert,
    I am sorry to say that configuring routes in Azure Virtual network is not supported. I recommend you to submit your reuqirement on Azure Feedback and hope it would be released soon:
    http://feedback.azure.com/forums/217313-networking-dns-traffic-manager-vpn-vnet
    Best regards,
    Susie
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected]

  • Cisco vpn connect problem with 3g dongle

    Hi,
    I am trying to connect cisco vpn but every time i am getting following error while trying to connect from huawei 3g usb dongle in win8. for win7 it works fine with no issue. Also the problem is only form datacard, form lan and wireless interaface i can easily connect to vpn without any issue. Any help/idea/suggestion highly appreciated?
    Cisco Systems VPN Client Version 5.0.07.0440
    Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 6.2.9200
    25     08:06:46.846  12/25/13  Sev=Info/4    CM/0x63100002
    Begin connection process
    26     08:06:46.848  12/25/13  Sev=Info/4    CM/0x63100004
    Establish secure connection
    27     08:06:46.848  12/25/13  Sev=Info/4    CM/0x63100024
    Attempt connection with server "116.68.208.113"
    28     08:06:46.849  12/25/13  Sev=Info/6    IKE/0x6300003B
    Attempting to establish a connection with 116.68.208.113.
    29     08:06:46.855  12/25/13  Sev=Info/4    IKE/0x63000001
    Starting IKE Phase 1 Negotiation
    30     08:06:46.858  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 116.68.208.113
    31     08:06:47.145  12/25/13  Sev=Info/4    IPSEC/0x63700008
    IPSec driver successfully started
    32     08:06:47.145  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    33     08:06:52.144  12/25/13  Sev=Info/4    IKE/0x63000021
    Retransmitting last packet!
    34     08:06:52.144  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to 116.68.208.113
    35     08:06:57.144  12/25/13  Sev=Info/4    IKE/0x63000021
    Retransmitting last packet!
    36     08:06:57.144  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to 116.68.208.113
    37     08:07:02.145  12/25/13  Sev=Info/4    IKE/0x63000021
    Retransmitting last packet!
    38     08:07:02.145  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to 116.68.208.113
    39     08:07:07.145  12/25/13  Sev=Info/4    IKE/0x63000017
    Marking IKE SA for deletion  (I_Cookie=97205EA6A12866F0 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
    40     08:07:07.645  12/25/13  Sev=Info/4    IKE/0x6300004B
    Discarding IKE SA negotiation (I_Cookie=97205EA6A12866F0 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
    41     08:07:07.645  12/25/13  Sev=Info/4    CM/0x63100014
    Unable to establish Phase 1 SA with server "116.68.208.113" because of "DEL_REASON_PEER_NOT_RESPONDING"
    42     08:07:07.645  12/25/13  Sev=Info/5    CM/0x63100025
    Initializing CVPNDrv
    43     08:07:07.645  12/25/13  Sev=Info/6    CM/0x63100046
    Set tunnel established flag in registry to 0.
    44     08:07:07.645  12/25/13  Sev=Info/4    IKE/0x63000001
    IKE received signal to terminate VPN connection
    45     08:07:08.146  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    46     08:07:08.146  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    47     08:07:08.146  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    48     08:07:08.146  12/25/13  Sev=Info/4    IPSEC/0x6370000A
    IPSec driver successfully stopped
    49     08:19:59.202  12/25/13  Sev=Info/4    CM/0x63100002
    Begin connection process
    50     08:19:59.202  12/25/13  Sev=Info/4    CM/0x63100004
    Establish secure connection
    51     08:19:59.202  12/25/13  Sev=Info/4    CM/0x63100024
    Attempt connection with server "116.68.208.113"
    52     08:19:59.202  12/25/13  Sev=Info/6    IKE/0x6300003B
    Attempting to establish a connection with 116.68.208.113.
    53     08:19:59.202  12/25/13  Sev=Info/4    IKE/0x63000001
    Starting IKE Phase 1 Negotiation
    54     08:19:59.218  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 116.68.208.113
    55     08:19:59.656  12/25/13  Sev=Info/4    IPSEC/0x63700008
    IPSec driver successfully started
    56     08:19:59.656  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    57     08:20:04.656  12/25/13  Sev=Info/4    IKE/0x63000021
    Retransmitting last packet!
    58     08:20:04.656  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to 116.68.208.113
    59     08:20:09.656  12/25/13  Sev=Info/4    IKE/0x63000021
    Retransmitting last packet!
    60     08:20:09.656  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to 116.68.208.113
    61     08:20:14.656  12/25/13  Sev=Info/4    IKE/0x63000021
    Retransmitting last packet!
    62     08:20:14.656  12/25/13  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (Retransmission) to 116.68.208.113
    63     08:20:19.656  12/25/13  Sev=Info/4    IKE/0x63000017
    Marking IKE SA for deletion  (I_Cookie=46B8917FD54C64AC R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
    64     08:20:20.156  12/25/13  Sev=Info/4    IKE/0x6300004B
    Discarding IKE SA negotiation (I_Cookie=46B8917FD54C64AC R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
    65     08:20:20.156  12/25/13  Sev=Info/4    CM/0x63100014
    Unable to establish Phase 1 SA with server "116.68.208.113" because of "DEL_REASON_PEER_NOT_RESPONDING"
    66     08:20:20.156  12/25/13  Sev=Info/5    CM/0x63100025
    Initializing CVPNDrv
    67     08:20:20.156  12/25/13  Sev=Info/6    CM/0x63100046
    Set tunnel established flag in registry to 0.
    68     08:20:20.156  12/25/13  Sev=Info/4    IKE/0x63000001
    IKE received signal to terminate VPN connection
    69     08:20:20.156  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    70     08:20:20.156  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    71     08:20:20.156  12/25/13  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    72     08:20:20.156  12/25/13  Sev=Info/4    IPSEC/0x6370000A
    IPSec driver successfully stopped

    Hi Karsten,
    Thank you for the reply !!! & best wishes for the new year 2014.
    The problem is like this, if i select datacard connection type to NDIS it works but it doesnt work when i select RAS(modem) connection type for 3G datacard it doesnt. (NDIS and RAS(Modem) connection types are the 2 modes currently supporetd by the datacard.). Is there any case the users are experiencing from the similar problem? and what they have done to solve the issues? And thank you for the workaroung, i have checked the shrew-soft with win7 and it was working fine but not on win8, i will check shrew-soft on win8 very soon. Also we can move to the anyconnect solution but just want to know if this can solve our problem or not? whether there will be any issues with anyconnect solution for win 8 or not? can you please confim.
    Thank you

  • Aiport Extreme cannot establish VPN connection through router must bypass

    Hello - I own an Airport Extreme with the latest firmware update. I cannot connect to my work VPN through the Airport Extreme router. If I bypass the router and connect directly to my modem the VPN works fine. My VPN connections also work fine in any other internet hotspot. Any ideas Apple folks? I am using MacPro, and MacBook with bootcamp MacOSX and Windows XP Pro.

    My workaround was taking the router back and getting a D-Link router.  Had it set up in 10 minutes with the VPN working, and staying connected.  I agree, there is something with the firmware on the router.  Good luck!

  • OEL 5 - Cisco VPN connects proper, then in a few minutes times out

    Issue
    I installed the latest Linux Cisco VPN (e.g. on Oracle Enterprise linux)
    Error
    I get this-->
    [user@localhost ~]$ vpnclient connect xyz
    Cisco Systems VPN Client Version 4.8.01 (0640)
    Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Linux
    Running on: Linux 2.6.18-164.el5xen #1 SMP Thu Sep 3 02:41:56 EDT 2009 i686
    Config file directory: /etc/opt/cisco-vpnclient
    Initializing the VPN connection.
    Contacting the gateway at xxx.xx.xxx.xxx
    Contacting the gateway at xxx.xx.xxx.xxx (balancing)
    User Authentication for xyz...
    Enter Username and Password.
    Username [xyz]:
    Password []:
    Authenticating user.
    Negotiating security policies.
    Securing communication channel.
    Your VPN connection is secure.
    VPN tunnel information.
    Client address: xxx.xxx.xxx.xxx
    Server address: xxx.xx.xxx.xxx
    Encryption: 168-bit 3-DES
    Authentication: HMAC-SHA
    IP Compression: None
    NAT passthrough is active on port UDP 4500
    Local LAN Access is disabled
    Secure VPN Connection terminated locally by the Client
    Reason: Remote peer is no longer responding.
    Disconnecting the VPN connection.
    [user@localhost ~]$
    Questions
    Even when I drop the OEL 5 firewall -- the remote peer will still "no longer respond"
    Also, while the VPN is connected, browsers set to the proper proxy and mail do not connect and return data, etc...
    Then it just does this -->
    Secure VPN Connection terminated locally by the Client
    Reason: Remote peer is no longer responding.
    Any advise will be appreciated....
    Thanks.....
    Edited by: mheath on Dec 7, 2009 2:41 PM

    1) Note that I do understand that external mail will not work when connected to the vpn, only internal mail
    2) When the vpn is connected, the following should work and both "do not work":
    a) When pointing to the proper proxy, the browser should display "external pages like google" and internal pages..
    b) And, internal imap mail should work - it does not
    3) on a windows machine in the same exact subnet/network vpn works fine...?
    4) Also, I have had vpn working with ubuntu 9.1x just previously in the same exact subnet/network!
    5) ==> Something is not letting the vpn communicate "after" it is connected on the OEL 5 server ?
    Thanks...

  • Configure cisco vpn connection in linux console

    Hi all,
    how do I configure cisco vpn_client connection in ubuntu/debian/raspbian linux console using .pcf file?
    Thanks ahead.

    I mean, what packages should I install?
    Is it possible to use only "apt-get install" or I should also use "dpkg"?
    Is it possible to avoid using any guid interfaces because it is headless pc?
    I'm asking because I successfully use openvpn connection in console and I hope that cisco vpn is also possible here.
    Thanks for your attention and best regards!

  • Cisco VPN connection just 'hangs', during connection.

    Hello all.
    I have installed Cisco VPN Client 4.6.00.0045, every so often when I try to connect it, it prompts for the username and password, which I enter, then it appears to try and connect but nothing, I have left it and left it for over 1hr at times, to see is its just slow, but nothing.
    If I try and click on the Cancel Connection option, it doesnt cancel, if I use Task Manager, to end task it doesnt, the only way I appear to be able to 'get the system running' is by restarting the workstation.
    My workstation is on a works network, other PCs are able to connect using the same VPN details, so it cant be Firewall etc...
    My PC is running XP Pro SP2
    Any ideas on what could be the problem?
    Extract from a screen shot and logs belows;
    Securing communications channel
    Initializing the connection
    Contacting the security gateway at xxx.xxx.xxx.xxx?
    Authenticating user
    Contacting the security gateway at xxx.xxx.xxx.xxx?
    Negotiating security policies
    Securing communications channel
    64 06:46:59.335 06/13/07
    Assigned VA private interface addr xx.xx.xx.xxx

    Have been having the same issue for several months. Similar configuration with XP Pro (SP3 now) using VPN Client 5.0.02.0090.
    When the VPN client hangs, the svchost.exe uses up 100% of the CPU and a reboot is the only solution. Sometimes it take 5 or 6 reboots before the VPN will connect.
    If I wait long enough after the initial login, I can usually connect but this does not always help. If I wait too long, however, or run other programs before I start the VPN Client, it will hang. If the system disconnects for some reason, the VPN client usually hangs on the reconnect.
    I've been looking for an answer to this problem for some time now and this is the fist place I've seen where another user was experiencing the same issue.

  • Cisco VPN connection not reliable

    I connect to my VPN, and all works fine. After a while (always different, from 15 minutes to 2 hours), the VPN connection is not usable anymore, but it is indicated by the VPN indicator on the top of the screen that it is still connected. I cannot connect to my intranet servers anymore.
    Anyone with same problem? Anyway to fix it?
    I remember having the same problem via VPNC when I used to use Linux a while ago, but that was fixed later on in VPNC implementation when new package was available.

    I have a similar problem. In my case, after a similar period of time (some random time which can be anything from a couple of minutes to a couple of hours) the connection drops and the wifi becomes unusable until it is turned off and on. This only happens when i am at work using the cisco vpn. It doesn't happen with other wifi connections in other places. Apple have told me the problem is with cisco.

  • Change Host Name/IP VPN Connection through command line

    Hello.
    Please, does anyone know what commands
    to use to change the Hostname/IP
    of a VPN Connection?
    Thank you very much.

    You need this : Connection
    Manager Administation Kit 
    Arnav Sharma | http://arnavsharma.net/ Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading
    the thread.

  • Cisco VPN connecting problem

    Dear Sirs,
    I've tried to connect to VPN by Cisco IPsec protocol. I know shared password, etc and added VPN in Network Settings.
    But when I tried to connect, after some time connection isn't established. There is what I find in system console:
    16.01.15 17:33:27,870 nesessionmanager[322]: IPSec connecting to server 212.44.149.51
    16.01.15 17:33:27,872 nesessionmanager[322]: IPSec Phase1 starting.
    16.01.15 17:33:27,951 racoon[1675]: accepted connection on vpn control socket.
    16.01.15 17:33:27,951 racoon[1675]: accepted connection on vpn control socket.
    16.01.15 17:33:27,951 racoon[1675]: IPSec connecting to server 212.44.149.51
    16.01.15 17:33:27,951 racoon[1675]: IPSec connecting to server 212.44.149.51
    16.01.15 17:33:27,952 racoon[1675]: Connecting.
    16.01.15 17:33:27,952 racoon[1675]: IPSec Phase 1 started (Initiated by me).
    16.01.15 17:33:27,952 racoon[1675]: IPSec Phase 1 started (Initiated by me).
    16.01.15 17:33:27,955 racoon[1675]: IKE Packet: transmit success. (Initiator, Aggressive-Mode message 1).
    16.01.15 17:33:27,955 racoon[1675]: >>>>> phase change status = Phase 1 started by us
    16.01.15 17:33:27,955 racoon[1675]: >>>>> phase change status = Phase 1 started by us
    16.01.15 17:33:28,558 racoon[1675]: port 62465 expected, but 0
    16.01.15 17:33:28,558 racoon[1675]: port 62465 expected, but 0
    16.01.15 17:33:28,583 racoon[1675]: IKEv1 Phase 1 AUTH: success. (Initiator, Aggressive-Mode Message 2).
    16.01.15 17:33:28,583 racoon[1675]: >>>>> phase change status = Phase 1 started by peer
    16.01.15 17:33:28,583 racoon[1675]: >>>>> phase change status = Phase 1 started by peer
    16.01.15 17:33:28,583 racoon[1675]: IKE Packet: receive success. (Initiator, Aggressive-Mode message 2).
    16.01.15 17:33:28,584 racoon[1675]: IKEv1 Phase 1 Initiator: success. (Initiator, Aggressive-Mode).
    16.01.15 17:33:28,584 racoon[1675]: IKE Packet: transmit success. (Initiator, Aggressive-Mode message 3).
    16.01.15 17:33:28,584 racoon[1675]: IPSec Phase 1 established (Initiated by me).
    16.01.15 17:33:28,584 racoon[1675]: IPSec Phase 1 established (Initiated by me).
    16.01.15 17:33:28,624 racoon[1675]: IPSec Extended Authentication requested.
    16.01.15 17:33:28,624 racoon[1675]: IPSec Extended Authentication requested.
    16.01.15 17:33:28,630 nesessionmanager[322]: IPSec requesting Extended Authentication.
    16.01.15 17:33:30,863 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:30,864 racoon[1675]: IPSec Extended Authentication sent.
    16.01.15 17:33:30,864 racoon[1675]: IPSec Extended Authentication sent.
    16.01.15 17:33:30,865 nesessionmanager[322]: IPSec sending Extended Authentication.
    16.01.15 17:33:30,911 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:30,915 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:30,915 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:30,915 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:30,959 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:30,959 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:30,959 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:30,959 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,015 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,015 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,015 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,015 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,077 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,078 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,078 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,078 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,117 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,117 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,117 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,118 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,155 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,156 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,156 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,156 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,195 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,196 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,196 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,196 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,264 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,265 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,265 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,265 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,337 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,337 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,337 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,337 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,413 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,414 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,414 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,414 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,494 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,495 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,495 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,495 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,534 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,534 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,534 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,534 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,571 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,572 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,572 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,572 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,608 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,608 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,608 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,608 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,648 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,649 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,649 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,649 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,690 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,690 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,690 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,690 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,739 racoon[1675]: IKE Packet: transmit success. (Mode-Config message).
    16.01.15 17:33:31,740 racoon[1675]: IKEv1 Config: retransmited. (Mode-Config retransmit).
    16.01.15 17:33:31,740 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:31,740 racoon[1675]: IPSec Network Configuration requested.
    16.01.15 17:33:34,015 racoon[1675]: IKE Packet: transmit success. (Phase 2 Retransmit).
    16.01.15 17:33:34,016 racoon[1675]: IKE Packet: transmit success. (Phase 2 Retransmit).
    16.01.15 17:33:34,016 racoon[1675]: IKE Packet: transmit success. (Phase 2 Retransmit).
    16.01.15 17:33:34,375 racoon[1675]: IKE Packet: transmit success. (Phase 2 Retransmit).
    And so on until timeout disconnect:
    16.01.15 17:34:00,855 nesessionmanager[322]: NESMLegacySession[VPN (Cisco IPSec):BDE93340-0A9A-49D1-B607-D4D451B2FDB9]: status changed to disconnecting
    16.01.15 17:34:00,855 nesessionmanager[322]: IPSec disconnecting from server 212.44.149.51
    16.01.15 17:34:00,858 racoon[1675]: IPSec disconnecting from server 212.44.149.51
    16.01.15 17:34:00,859 racoon[1675]: IPSec disconnecting from server 212.44.149.51
    16.01.15 17:34:00,872 racoon[1675]: Invalid pfkey proto: 0
    16.01.15 17:34:00,872 racoon[1675]: Invalid pfkey proto: 0
    16.01.15 17:34:00,872 racoon[1675]: Invalid pfkey proto: 0
    16.01.15 17:34:00,872 racoon[1675]: Invalid pfkey proto: 0
    What this mean? What could be wrong?
    Thanks in advance,
    Igor

    See related threads
    VPN with Yosemite Client
    Can log into Yosemite server (4.0) VPN service with a Mavericks client, but not Yosemite client

  • IPv6 connectivity through AEBS to HE

    Hi,
    I have upgraded my AEBS to 7.5.2 and am trying to get IPv6 connectivity to HE. The HE tunnel configuration is :
    IPv6 Tunnel Endpoints
    Server IPv4 address: 66.220.18.42
    Server IPv6 address: 2001:470:c:c77::1/64
    Client IPv4 address: 71.139.20.48
    Client IPv6 address: 2001:470:c:c77::2/64
    Available DNS Resolvers
    Anycasted IPv6 Caching Nameserver: 2001:470:20::2
    Anycasted IPv4 Caching Nameserver: 74.82.42.42
    Routed IPv6 Prefixes and rDNS Delegations
    Routed /48: 2001:470:f2e6::/48
    Routed /64: 2001:470:d:c77::/64
    AEBS V6 setup is:
    IPv6 mode = Tunnel
    Block incoming ipv6 connections
    config ipv6 = manually
    remote ipv4 addr. = 66.220.18.42
    wan ipv6 addr. = 2001:470:c:c77::2
    ipv6 default route = 2001:470:c:c77::1
    lan ipv6 addr. = 2001:470:d:c77::1
    Imac is set to get v6 addr automatically and the config is:
    Kens-iMac:~ ken$ ifconfig
    lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
    inet6 ::1 prefixlen 128
    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
    inet 127.0.0.1 netmask 0xff000000
    inet6 fd92:20e4:f390:f1d9:d69a:20ff:fec1:aa98 prefixlen 128
    gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
    stf0: flags=0 mtu 1280
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    ether d4:9a:20:c1:aa:98
    inet6 fe80::d69a:20ff:fec1:aa98%en0 prefixlen 64 scopeid 0x4
    inet 192.168.1.6 netmask 0xffffff00 broadcast 192.168.1.255
    inet6 2001:470:d:c77:d69a:20ff:fec1:aa98 prefixlen 64 autoconf
    media: autoselect (1000baseT <full-duplex,flow-control>)
    status: active
    fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
    lladdr d4:9a:20:ff:fe:c1:aa:98
    media: autoselect <full-duplex>
    status: inactive
    en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    ether d4:9a:20:5c:2e:b7
    media: autoselect (<unknown type>)
    status: inactive
    vmnet8: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    ether 00:50:56:c0:00:08
    inet 172.16.96.1 netmask 0xffffff00 broadcast 172.16.96.255
    vmnet1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    ether 00:50:56:c0:00:01
    inet 172.16.202.1 netmask 0xffffff00 broadcast 172.16.202.255
    utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
    inet6 fe80::d69a:20ff:fec1:aa98%utun0 prefixlen 64 scopeid 0x9
    inet6 fd00:6587:52d7:42:d69a:20ff:fec1:aa98 prefixlen 64
    Netstat -r is
    Routing tables
    Internet:
    Destination Gateway Flags Refs Use Netif Expire
    default 192.168.1.1 UGSc 20 0 en0
    127 localhost UCS 0 0 lo0
    localhost localhost UH 4 60028 lo0
    169.254 link#4 UCS 1 0 en0
    169.254.1.0 link#4 UHRLW 1 1350 en0 6
    172.16.96/24 link#7 UC 1 0 vmnet8
    172.16.96.255 link#7 UHLWbI 1 682 vmnet8
    172.16.202/24 link#8 UC 1 0 vmnet1
    172.16.202.255 link#8 UHLWbI 2 681 vmnet1
    192.168.1 link#4 UCS 3 0 en0
    192.168.1.1 0:1e:52:f0:5e:a2 UHLWI 20 20 en0 855
    192.168.1.6 localhost UHS 0 0 lo0
    192.168.1.38 0:22:41:1b:25:b4 UHLWI 0 0 en0 856
    192.168.1.255 link#4 UHLWbI 1 681 en0
    Internet6:
    Destination Gateway Flags Netif Expire
    default kens.local UGSc en0
    localhost localhost UH lo0
    2001:470:d:c77:: link#4 UC en0
    2001:470:d:c77:d69 d4:9a:20:c1:aa:98 UHL lo0
    fd00:6587:52d7:: fd00:6587:52d7:42: UGCS utun0
    fd00:6587:52d7:42: fd00:6587:52d7:42: UGHW utun0
    fd00:6587:52d7:42: link#9 UHL lo0
    fd92:20e4:f390:f1d link#1 UHL lo0
    fe80::%lo0 localhost Uc lo0
    localhost link#1 UHL lo0
    fe80::%en0 link#4 UC en0
    playme.local 0:11:24:6f:9:5e UHLW en0
    kens.local 0:1e:52:f0:5e:a2 UHLW en0
    kens-imac.local d4:9a:20:c1:aa:98 UHL lo0
    fe80::%utun0 fe80::d69a:20ff:fe Uc utun0
    fe80::d69a:20ff:fe link#9 UHL lo0
    ff01:: localhost Um lo0
    ff02:: localhost UmC lo0
    ff02:: link#4 UmC en0
    ff02:: fe80::d69a:20ff:fe UmC utun0
    But the problem is that I can't ping or resolve IPv6 names, although I can ping the local side of the ipv6 tunnel
    Kens-iMac:~ ken$ ping6 2001:470:c:c77::1
    PING6(56=4088 bytes) 2001:470:d:c77:d69a:20ff:fec1:aa98 --> 2001:470:c:c77::1
    Request timeout for icmp_seq=0
    Request timeout for icmp_seq=1
    Request timeout for icmp_seq=2
    Request timeout for icmp_seq=3
    Request timeout for icmp_seq=4
    ^C
    --- 2001:470:c:c77::1 ping6 statistics ---
    6 packets transmitted, 0 packets received, 100.0% packet loss
    Kens-iMac:~ ken$ ping6 2001:470:c:c77::2
    PING6(56=4088 bytes) 2001:470:d:c77:d69a:20ff:fec1:aa98 --> 2001:470:c:c77::2
    16 bytes from 2001:470:c:c77::2, icmp_seq=0 hlim=64 time=6.498 ms
    16 bytes from 2001:470:c:c77::2, icmp_seq=1 hlim=64 time=0.335 ms
    16 bytes from 2001:470:c:c77::2, icmp_seq=2 hlim=64 time=0.365 ms
    16 bytes from 2001:470:c:c77::2, icmp_seq=3 hlim=64 time=0.364 ms
    16 bytes from 2001:470:c:c77::2, icmp_seq=4 hlim=64 time=0.368 ms
    16 bytes from 2001:470:c:c77::2, icmp_seq=5 hlim=64 time=0.334 ms
    16 bytes from 2001:470:c:c77::2, icmp_seq=6 hlim=64 time=0.371 ms
    ^C
    --- 2001:470:c:c77::2 ping6 statistics ---
    7 packets transmitted, 7 packets received, 0.0% packet loss
    round-trip min/avg/max/std-dev = 0.334/1.234/6.498/2.149 ms
    and traceroute6 ...
    Kens-iMac:~ ken$ traceroute6 ipv6.google.com
    traceroute6 to ipv6.l.google.com (2001:4860:8010::93) from 2001:470:d:c77:d69a:20ff:fec1:aa98, 64 hops max, 12 byte packets
    1 2001:470:d:c77::1 0.372 ms 0.392 ms 0.333 ms
    2 * * *
    3 * * *
    4 * *^C
    does anyone have any ideas on what is not working and why ?

    Looks like an AT&T PPPOE connection - the addresses of those change all of the time. Make sure that the "Client IPv4 address" is correct at the HE side.
    You can update it with a URL, see http://fcartegnie.free.fr/articles/Hurricane%27s%20IPv6%20TunnelBroker%20Endpoin t%20ipv4%20address%20updater.html for details one endpoint updateing using just a URL.

Maybe you are looking for

  • ME2L Report

    Dear All, I need to add a separate column in report ME2L. That is the total value of oder quantity into net price which is coming from a PO. But i dont know the relevant tables for those. Please help. Thanks, Ama

  • Datacache.SPDistributedCache is probably down error found in event viewer Sharepoint 2013

    I see this error every day in event viewer and Distributed Cache is Running in CA without any interruption. How can i resolve it? what could it cause this error? Thanks, Deepak

  • CRM FAQ Signup Thread

    Hello Everyone, I moving the signup for building CRM Technical FAQ into this thread.  We will keep the list here until we get something more formal.  I will update thread based on your posts below. I will try to "bump" this up every week. More than o

  • Hiding based on responsibility

    This is probably an easy one to answer, however I am a bit new to the OA world. I have a custom page (11.5.10) and I want to hide an image based on a user's responsibility. I have a switcher region for the page working fine (with two images) based on

  • OTP of ASDM using external radius server ( Not RSA )

    Hello, Just seeing if the ASDM will support OTP using an external radius server, and not RSA.  I see there was a feature added to 8.2 that states its possible with RSA, but nothing of any other support.  Just checking to see if someone know for sure.