Re: Error 412 Cisco VPN Client: Reason 412 – T

From: Jay McMickle <jay.mcmickle_at_yahoo.com>
Date: Wed, 17 Oct 2012 11:45:32 -0500

What about ESP and UDP 500 (isakmp)?

If yes, you're going to have to help us help you. A few lines of info isn't going to get us very far. ;)

Regards,
Jay McMickle- CCIE #35355 (RS), 3x CCNP (RS,Security,Design)
Sent from my iPhone

On Oct 17, 2012, at 9:57 AM, Gaurav Thukral <pearlgaurav_at_gmail.com> wrote:

> UDP/4500 is open.
>
> On Wed, Oct 17, 2012 at 8:20 PM, Ryan West <rwest_at_zyedge.com> wrote:
>
>> Maybe UDP/4500 is being blocked, you can try TCP/10000 or start using
>> AnyConnect, which will be blocked far less on firewalls outbound.
>>
>> -ryan
>>
>> -----Original Message-----
>> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
>> Gaurav Thukral
>> Sent: Wednesday, October 17, 2012 10:47 AM
>> To: Group study
>> Subject: Error 412 Cisco VPN Client: Reason 412  The remote peer is no
>> longer responding
>>
>> Hi All
>>
>> I am unable to connect Via VPN using XP machine. I am getting the below
>> mentioned error.
>>
>> Kindly let me know if anyone faced this issue.
>>
>> Thanks
>> Gaurav
>>
>>
>>
>> #############################################################
>>
>>
>> Cisco Systems VPN Client Version 5.0.07.0410 Copyright (C) 1998-2010 Cisco
>> Systems, Inc. All Rights Reserved.
>> Client Type(s): Windows, WinNT
>> Running on: 5.1.2600 Service Pack 3
>> Config file directory: C:\Program Files\Cisco Systems\VPN Client\
>>
>> 1 19:45:51.484 10/17/12 Sev=Info/6 CERT/0x63600026
>> Attempting to find a Certificate using Serial Hash.
>>
>> 2 19:45:51.484 10/17/12 Sev=Info/6 CERT/0x63600027
>> Found a Certificate using Serial Hash.
>>
>> 3 19:45:51.484 10/17/12 Sev=Info/6 GUI/0x63B00011
>> Reloaded the Certificates in all Certificate Stores successfully.
>>
>> 4 19:45:53.765 10/17/12 Sev=Info/4 CM/0x63100002
>> Begin connection process
>>
>> 5 19:45:53.812 10/17/12 Sev=Info/4 CM/0x63100004
>> Establish secure connection
>>
>> 6 19:45:53.812 10/17/12 Sev=Info/4 CM/0x63100024
>> Attempt connection with server "houvpn.oceaneering.com"
>>
>> 7 19:45:54.187 10/17/12 Sev=Info/6 IKE/0x6300003B
>> Attempting to establish a connection with 208.46.106.55.
>>
>> 8 19:45:54.203 10/17/12 Sev=Info/4 IKE/0x63000001
>> Starting IKE Phase 1 Negotiation
>>
>> 9 19:45:54.250 10/17/12 Sev=Info/4 IKE/0x63000013
>> SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd),
>> VID(Frag), VID(Nat-T), VID(Unity)) to 208.46.106.55
>>
>> 10 19:45:54.265 10/17/12 Sev=Info/4 IPSEC/0x63700008
>> IPSec driver successfully started
>>
>> 11 19:45:54.265 10/17/12 Sev=Info/4 IPSEC/0x63700014
>> Deleted all keys
>>
>> 12 19:45:59.281 10/17/12 Sev=Info/4 IKE/0x63000021
>> Retransmitting last packet!
>>
>> 13 19:45:59.281 10/17/12 Sev=Info/4 IKE/0x63000013
>> SENDING >>> ISAKMP OAK AG (Retransmission) to 208.46.106.55
>>
>> 14 19:46:04.406 10/17/12 Sev=Info/4 IKE/0x63000021
>> Retransmitting last packet!
>>
>> 15 19:46:04.406 10/17/12 Sev=Info/4 IKE/0x63000013
>> SENDING >>> ISAKMP OAK AG (Retransmission) to 208.46.106.55
>>
>> 16 19:46:09.406 10/17/12 Sev=Info/4 IKE/0x63000021
>> Retransmitting last packet!
>>
>> 17 19:46:09.406 10/17/12 Sev=Info/4 IKE/0x63000013
>> SENDING >>> ISAKMP OAK AG (Retransmission) to 208.46.106.55
>>
>> 18 19:46:14.406 10/17/12 Sev=Info/4 IKE/0x63000017
>> Marking IKE SA for deletion (I_Cookie=EC68C5F3368AF274
>> R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
>>
>> 19 19:46:14.906 10/17/12 Sev=Info/4 IKE/0x6300004B
>> Discarding IKE SA negotiation (I_Cookie=EC68C5F3368AF274
>> R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
>>
>> *20 19:46:14.906 10/17/12 Sev=Info/4 CM/0x63100014
>> Unable to establish Phase 1 SA with server "houvpn.oceaneering.com"
>> because of "DEL_REASON_PEER_NOT_RESPONDING"
>> *
>> 21 19:46:14.906 10/17/12 Sev=Info/5 CM/0x63100025
>> Initializing CVPNDrv
>>
>> 22 19:46:14.921 10/17/12 Sev=Info/6 CM/0x63100046
>> Set tunnel established flag in registry to 0.
>>
>> 23 19:46:14.921 10/17/12 Sev=Info/4 IKE/0x63000001
>> IKE received signal to terminate VPN connection
>>
>> 24 19:46:14.953 10/17/12 Sev=Info/4 IPSEC/0x63700014
>> Deleted all keys
>>
>> 25 19:46:14.953 10/17/12 Sev=Info/4 IPSEC/0x63700014
>> Deleted all keys
>>
>> 26 19:46:14.953 10/17/12 Sev=Info/4 IPSEC/0x63700014
>> Deleted all keys
>>
>> 27 19:46:14.953 10/17/12 Sev=Info/4 IPSEC/0x6370000A
>> IPSec driver successfully stopped
>>
>>
>>
>>
>> --
>> Thanks & Regards,
>> Gaurav Thukral
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
>
>
> --
> Thanks & Regards,
> Gaurav Thukral
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html

Blogs and organic groups at http://www.ccie.net
Received on Wed Oct 17 2012 - 11:45:32 ART

This archive was generated by hypermail 2.2.0 : Thu Nov 01 2012 - 10:53:33 ART