Cisco Systems VPN Client Version 4.9.01 (0030) Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Mac OS X Running on: Darwin 10.5.0 Darwin Kernel Version 10.5.0: Fri Nov 5 23:20:39 PDT 2010; root:xnu-1504.9.17~1/RELEASE_I386 i386 Config file directory: /etc/opt/cisco-vpnclient 1 10:54:53.459 12/28/2010 Sev=Info/4 CM/0x43100002 Begin connection process 2 10:54:53.460 12/28/2010 Sev=Info/4 CM/0x43100004 Establish secure connection using Ethernet 3 10:54:53.460 12/28/2010 Sev=Info/4 CM/0x43100024 Attempt connection with server "38.117.157.146" 4 10:54:53.460 12/28/2010 Sev=Info/4 CVPND/0x43400019 Privilege Separation: binding to port: (500). 5 10:54:53.461 12/28/2010 Sev=Info/4 CVPND/0x43400019 Privilege Separation: binding to port: (4500). 6 10:54:53.461 12/28/2010 Sev=Info/6 IKE/0x4300003B Attempting to establish a connection with 38.117.157.146. 7 10:54:53.537 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 38.117.157.146 8 10:54:53.572 12/28/2010 Sev=Info/5 IKE/0x4300002F Received ISAKMP packet: peer = 38.117.157.146 9 10:54:53.573 12/28/2010 Sev=Info/4 IKE/0x43000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 38.117.157.146 10 10:54:53.573 12/28/2010 Sev=Info/5 IKE/0x43000001 Peer is a Cisco-Unity compliant peer 11 10:54:53.573 12/28/2010 Sev=Info/5 IKE/0x43000001 Peer supports XAUTH 12 10:54:53.573 12/28/2010 Sev=Info/5 IKE/0x43000001 Peer supports DPD 13 10:54:53.573 12/28/2010 Sev=Info/5 IKE/0x43000001 Peer supports NAT-T 14 10:54:53.573 12/28/2010 Sev=Info/5 IKE/0x43000001 Peer supports IKE fragmentation payloads 15 10:54:53.645 12/28/2010 Sev=Info/6 IKE/0x43000001 IOS Vendor ID Contruction successful 16 10:54:53.645 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 38.117.157.146 17 10:54:53.645 12/28/2010 Sev=Info/6 IKE/0x43000055 Sent a keepalive on the IPSec SA 18 10:54:53.645 12/28/2010 Sev=Info/4 IKE/0x43000083 IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194 19 10:54:53.645 12/28/2010 Sev=Info/5 IKE/0x43000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end IS behind a NAT device 20 10:54:53.645 12/28/2010 Sev=Info/4 CM/0x4310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 21 10:54:53.675 12/28/2010 Sev=Info/5 IKE/0x4300002F Received ISAKMP packet: peer = 38.117.157.146 22 10:54:53.675 12/28/2010 Sev=Info/4 IKE/0x43000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 38.117.157.146 23 10:54:53.675 12/28/2010 Sev=Info/4 CM/0x43100015 Launch xAuth application 24 10:54:53.855 12/28/2010 Sev=Info/4 IPSEC/0x43700008 IPSec driver successfully started 25 10:54:53.855 12/28/2010 Sev=Info/4 IPSEC/0x43700014 Deleted all keys 26 10:54:53.855 12/28/2010 Sev=Info/6 IPSEC/0x4370002C Sent 51 packets, 0 were fragmented. 27 10:54:57.636 12/28/2010 Sev=Info/4 CM/0x43100017 xAuth application returned 28 10:54:57.636 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 38.117.157.146 29 10:54:57.668 12/28/2010 Sev=Info/5 IKE/0x4300002F Received ISAKMP packet: peer = 38.117.157.146 30 10:54:57.668 12/28/2010 Sev=Info/4 IKE/0x43000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 38.117.157.146 31 10:54:57.668 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 38.117.157.146 32 10:54:57.668 12/28/2010 Sev=Info/4 CM/0x4310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 33 10:54:57.669 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 38.117.157.146 34 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x4300002F Received ISAKMP packet: peer = 38.117.157.146 35 10:54:57.698 12/28/2010 Sev=Info/4 IKE/0x43000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 38.117.157.146 36 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x43000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 172.25.189.1 37 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x43000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.240 38 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x43000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 192.168.37.5 39 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x43000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 66.28.0.61 40 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x4300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 41 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x4300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000001 42 10:54:57.698 12/28/2010 Sev=Info/5 IKE/0x4300000F SPLIT_NET #1 subnet = 192.168.37.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 43 10:54:57.699 12/28/2010 Sev=Info/5 IKE/0x4300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = domanidev.com 44 10:54:57.699 12/28/2010 Sev=Info/5 IKE/0x4300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000001 45 10:54:57.699 12/28/2010 Sev=Info/5 IKE/0x4300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc ASA5505 Version 7.2(3) built by builders on Wed 15-Aug-07 16:08 46 10:54:57.699 12/28/2010 Sev=Info/5 IKE/0x4300000D MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194 47 10:54:57.699 12/28/2010 Sev=Info/4 CM/0x43100019 Mode Config data received 48 10:54:57.699 12/28/2010 Sev=Info/4 IKE/0x43000056 Received a key request from Driver: Local IP = 192.168.1.5, GW IP = 38.117.157.146, Remote IP = 0.0.0.0 49 10:54:57.780 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID) to 38.117.157.146 50 10:54:57.781 12/28/2010 Sev=Info/4 IPSEC/0x43700014 Deleted all keys 51 10:54:57.813 12/28/2010 Sev=Info/5 IKE/0x4300002F Received ISAKMP packet: peer = 38.117.157.146 52 10:54:57.813 12/28/2010 Sev=Info/4 IKE/0x43000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 38.117.157.146 53 10:54:57.814 12/28/2010 Sev=Info/5 IKE/0x43000045 RESPONDER-LIFETIME notify has value of 86400 seconds 54 10:54:57.814 12/28/2010 Sev=Info/5 IKE/0x43000047 This SA has already been alive for 4 seconds, setting expiry to 86396 seconds from now 55 10:54:57.818 12/28/2010 Sev=Info/5 IKE/0x4300002F Received ISAKMP packet: peer = 38.117.157.146 56 10:54:57.819 12/28/2010 Sev=Info/4 IKE/0x43000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, KE, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 38.117.157.146 57 10:54:57.819 12/28/2010 Sev=Info/5 IKE/0x43000045 RESPONDER-LIFETIME notify has value of 28800 seconds 58 10:54:57.911 12/28/2010 Sev=Info/4 IKE/0x43000013 SENDING >>> ISAKMP OAK QM *(HASH) to 38.117.157.146 59 10:54:57.912 12/28/2010 Sev=Info/5 IKE/0x43000059 Loading IPsec SA (MsgID=1BB3BBD9 OUTBOUND SPI = 0x269733F7 INBOUND SPI = 0x93DAEB88) 60 10:54:57.912 12/28/2010 Sev=Info/5 IKE/0x43000025 Loaded OUTBOUND ESP SPI: 0x269733F7 61 10:54:57.912 12/28/2010 Sev=Info/5 IKE/0x43000026 Loaded INBOUND ESP SPI: 0x93DAEB88 62 10:54:57.912 12/28/2010 Sev=Info/4 CM/0x4310001A One secure connection established 63 10:54:57.912 12/28/2010 Sev=Info/4 CVPND/0x4340001E Privilege Separation: reducing MTU on primary interface. 64 10:54:57.913 12/28/2010 Sev=Info/4 CVPND/0x4340001B Privilege Separation: backing up resolv.conf file. 65 10:54:57.913 12/28/2010 Sev=Info/4 CVPND/0x4340001D Privilege Separation: chown( /var/run/resolv.conf.vpnbackup, uid=0, gid=1 ). 66 10:54:57.913 12/28/2010 Sev=Info/4 CVPND/0x43400018 Privilege Separation: opening file: (/var/run/resolv.conf). 67 10:54:57.918 12/28/2010 Sev=Info/4 CM/0x4310003B Address watch added for 192.168.1.5. Current hostname: new-host-3.home, Current address(es): 192.168.1.5. 68 10:54:58.284 12/28/2010 Sev=Info/4 IPSEC/0x43700010 Created a new key structure 69 10:54:58.285 12/28/2010 Sev=Info/4 IPSEC/0x4370000F Added key with SPI=0xf7339726 into key list 70 10:54:58.285 12/28/2010 Sev=Info/4 IPSEC/0x43700010 Created a new key structure 71 10:54:58.285 12/28/2010 Sev=Info/4 IPSEC/0x4370000F Added key with SPI=0x88ebda93 into key list 72 10:54:59.272 12/28/2010 Sev=Info/4 IPSEC/0x43700019 Activate outbound key with SPI=0xf7339726 for inbound key with SPI=0x88ebda93 73 10:55:14.265 12/28/2010 Sev=Info/6 IKE/0x43000055 Sent a keepalive on the IPSec SA