[c-nsp] Cisco VPN intermittent disconnects
Joseph Mays
mays at win.net
Thu Oct 25 15:15:32 EDT 2012
We have a client on a connection to a cisco switch at one of our locations, routing out through a 3600 to a cisco firewall at a remote location. The firewall is a CISCO 5505 running 8.25.
When they connect to the remote firewall with a cisco VPN client (Cisco VPN client for windows version 5.0.07.0290) they get intermittent drops in service. If they set up a hard firewall from inside their network that connects to the remote firewall, and then run their connections through that, it works fine. I asked them to try setting the MTU on the cisco client down to 576 from 1300 -- same result. They can also run the client through another wan connection to the remote firewall and it works fine. It seems to be something about connecting to the remote firewall with this client across the WAN connection that runs through us, but no errors are occurring on any of the interfaces in the path, and I can't find that any packets are being dropped or anything.
I received a snippet of Cisco VPN client logs from the customer, but I'm not well-versed in it enough to see if it's providing any useful info. Quite possibly it is and I just am not recognizing the fact.
Cisco Systems VPN Client Version 5.0.07.0290
Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.1.7601 Service Pack 1
Config file directory: C:\Program Files (x86)\Cisco Systems\VPN Client\
1 14:29:34.774 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
2 14:29:34.774 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051025
3 14:29:39.843 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
4 14:29:39.843 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051026
5 14:29:44.912 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
6 14:29:44.912 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051027
7 14:29:49.981 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
8 14:29:49.981 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051028
9 14:29:55.051 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
10 14:29:55.051 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051029
11 14:30:00.120 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
12 14:30:00.120 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051030
13 14:30:00.620 10/25/12 Sev=Info/6 IPSEC/0x63700022
TCP heartbeat sent to 199.30.90.62, src port 1331, dst port 10000
14 14:30:05.192 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
15 14:30:05.192 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051031
16 14:30:10.259 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
17 14:30:10.259 10/25/12 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 199.30.90.62, our seq# = 2332051032
18 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
19 14:30:15.216 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
20 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051025, seq# expected = 2332051032
21 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
22 14:30:15.216 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
23 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051026, seq# expected = 2332051032
24 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
25 14:30:15.216 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
26 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051027, seq# expected = 2332051032
27 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
28 14:30:15.216 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
29 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051028, seq# expected = 2332051032
30 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
31 14:30:15.216 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
32 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051029, seq# expected = 2332051032
33 14:30:15.216 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
34 14:30:15.217 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
35 14:30:15.217 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051030, seq# expected = 2332051032
36 14:30:15.217 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
37 14:30:15.217 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
38 14:30:15.217 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051031, seq# expected = 2332051032
39 14:30:15.217 10/25/12 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 199.30.90.62
40 14:30:15.217 10/25/12 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 199.30.90.62
41 14:30:15.217 10/25/12 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 199.30.90.62, seq# received = 2332051032, seq# expected = 2332051032
42 14:32:42.397 10/25/12 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 199.30.90.62
More information about the cisco-nsp
mailing list