Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

SonicWall VPN emergency! Connects but no Auth. 1

Status
Not open for further replies.

mucous

Technical User
Nov 28, 2002
164
US
Hello,

I am having a serious issue using the SonicWall Global VPN client with one of my users. About two and a half weeks ago, my two remote users began experiencing trouble connecting through our VPN. We are a Win2K office with one file server (handles DHCP, DNS, Also PDC) and an Exchange 2000 server (DNS also). We're on Active directory too. Both users have Dell C640 Latitudes, 512 mb ram and were connecting via cable modems. The entire office is up to date with latest service packs and antivirus. They are in the office one week out of every month. The trouble is that they can connect and get an IP address from our internal DHCP server, but cannot browe shared folders or pull email on Outlook. They Do have OWA and it's working fine. They are in the office this week so I have been working furiously on the problem before they go back home to connect from their home offices. Both have the same permissions set.
I resolved the problem for one of them by rebuilding her laptop, reformatting, then reinstalling averything. She can now access the VPN correctly. I tried the same for the other user and the problem is still there. The strange thing is, is that I can log onto her laptop from outside the office and connect through the VPN and am able to browse shared folders and open Outlook, but when I log on as her, the user, The connection is established, but I am unable to ping or trace to the servers. Obviously, i am unable to open any shares or use her Outlook. I have been round and round with SonicWall support on this and they are saying it's a permissions problem, but I think otherwise. I've generated connection reports from both the admin login and the user login and see that the user is not sending authentication, whereas the admin login is. I feel permissions are not the issue as if no authentication is being sent, then permissions haven't come into play yet. I am sending the logs in my next post and would greatly appreciate any ideas on what is happening. I am stumped and this user is going back home later today. Help!!
 
I am logged into her laptop remotely as administrator in this log. You can see that authentication is being sent through the VPN client into our network...

Application Name: SonicWALL Global VPN Client
Application Version: 2.2.0.131
IPsec Driver Name: SonicWALL VPN Client IPSec Driver for Windows 98/Me/NT/2000/XP
IPsec Driver Version: 9.30
Virtual Adapter Driver Name: SonicWALL VPN Adapter
Virtual Adapter Driver Version: 9.01
DNE Adapter Driver Name: Deterministic Network Enhancer
DNE Adapter Driver Version: 2.21.7.233
Reported Generated At: 00:24:26 Thu Jun 17 2004

System Summary
OS Name: Microsoft Windows 2000 Professional
System Name: 5.0.2195 Service Pack 4 Build 2195
OS Manufacturer: Microsoft Corporation
System Name: N008PQH
System Manufacturer: Dell Computer Corporation
System Model: Latitude C640
System Type: X86-based PC
Processor: x86 Family 15 Model 2 Stepping 7 GenuineIntel ~1994 Mhz
BIOS Version: 01/12/04
Windows Directory: C:\WINNT
Locale: United States
Time Zone: Eastern Daylight Time
Total Physical Memory: 511 MB
Available Physical Memory: 357 MB
Total Virtual Memory: 2047 MB
Available Virtual Memory: 1999 MB
Page File Space: 1247 MB

Windows IP Configuration

Host Name . . . . . . . . . . . . : n008pqh
Primary Dns Suffix . . . . . . . : XXXXX.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled . . . . . . . : No
WINS Proxy Enabled . . . . . . . : No
DNS Suffix Search List . . . . . : XXXXX.com

Ethernet adapter SonicWALL Virtual Adapter:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : SonicWALL VPN Adapter
Physical Address. . . . . . . . . : 00-60-73-EE-05-CD
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : No
IP Address. . . . . . . . . . . . : 192.168.3.62
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.3.1
DHCP Server . . . . . . . . . . . : 192.168.3.2
DNS Servers . . . . . . . . . . . : 192.168.3.2
192.168.3.3
Primary WINS Server . . . . . . . : 192.168.3.2
Lease Obtained. . . . . . . . . . : Thursday, June 17, 2004 12:24:15 AM
Lease Expires . . . . . . . . . . : Friday, June 25, 2004 12:24:15 AM

Ethernet adapter Notebook Adapter:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 3Com EtherLink PCI
Physical Address. . . . . . . . . : 00-0B-DB-02-F9-10
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 192.168.1.92
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DNS Servers . . . . . . . . . . . : 12.127.16.83
12.127.17.83
Lease Obtained. . . . . . . . . . : Wednesday, June 16, 2004 11:29:47 PM
Lease Expires . . . . . . . . . . : Thursday, June 17, 2004 11:29:47 PM


===========================================================================
Interface List:
Interface MAC Address Description
0x00000001 00-00-00-00-00-00 MS TCP Loopback interface
0x07000004 00-0B-DB-02-F9-10 3Com EtherLink PCI
0x08000003 00-60-73-EE-05-CD SonicWALL VPN Adapter
===========================================================================

===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.92 1
0.0.0.0 0.0.0.0 192.168.3.1 192.168.3.62 1
68.167.49.218 255.255.255.255 192.168.1.1 192.168.1.92 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.92 192.168.1.92 1
192.168.1.92 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.255 255.255.255.255 192.168.1.92 192.168.1.92 1
192.168.3.0 255.255.255.0 192.168.3.62 192.168.3.62 1
192.168.3.2 255.255.255.255 192.168.3.62 192.168.3.62 1
192.168.3.62 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.3.255 255.255.255.255 192.168.3.62 192.168.3.62 1
224.0.0.0 224.0.0.0 192.168.1.92 192.168.1.92 1
224.0.0.0 224.0.0.0 192.168.3.62 192.168.3.62 1
255.255.255.255 255.255.255.255 192.168.1.92 192.168.1.92 1
Default Gateway: 192.168.1.1
===========================================================================

===========================================================================
ARP Table Entries:
Internet Address Physical Address Interface Type
192.168.1.1 00-0C-41-AB-3B-2C 192.168.1.92 3
192.168.3.2 00-0C-41-AB-3B-2C 192.168.3.62 3
192.168.3.3 00-0C-41-AB-3B-2C 192.168.3.62 3
===========================================================================

*** Connections ***
NATSO VPN (68.167.49.218): Configuration Complete
Destination Networks
--------------------
192.168.3.0/255.255.255.0/BOOTPS: Phase 2 Complete
192.168.3.0/255.255.255.0/Any: Idle
192.168.3.0/255.255.255.0/Any: Idle


Negotiated Phase 1 SA Parameters
--------------------------------
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Authentication Method: Pre-shared key
DH Group: Default 768-bit MODP group (Group 1)
Connect Time: Thursday June 17 2004 12:24:15 AM
Duration: 28800 seconds
Expiration Time: Thursday June 17 2004 08:24:15 AM

Negotiated Phase 2 SA Parameters
--------------------------------
IPSec Protocol: Encapsulating Security Payload
ESP Enc Algorithm: Triple DES
ESP Auth Algorithm: HMAC-SHA
Encapsulation Mode: UDP Encapsulation Tunnel
Diffie-Hellman Group: N/A (PFS not enabled)


*** SECURITY POLICY DATABASE ***
UID From MAC From IP To IP 1 To IP 2 FPort TPort Prot IPolicy ISADBUID OPolicy OSADBUID Peer IP Peer MAC FOMF FIMF TOMF TIMF Event ID
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
00000031 00:60:73:EE:05:CD 000.000.000.000 000.000.000.000 000.000.000.000 BOOTPC BOOTPS UDP Inspect 00000005 Secure 00000006 068.167.049.218 000C41AB3B2C 00000032 00000034 00000038 00000032 000002C8
00000030 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 BOOTPC BOOTPS UDP Inspect 00000000 Bypass 00000000 000.000.000.000 000000000000 00000030 00000030 00000030 00000030 00000000
00000028 00:0B:DB:02:F9:10 000.000.000.000 000.000.000.000 000.000.000.000 Any ISAKMP UDP Inspect 00000000 Inspect 00000000 068.167.049.218 000C41AB3B2C 00000000 00000000 00000030 00000030 00000000
00000029 00:0B:DB:02:F9:10 000.000.000.000 000.000.000.000 000.000.000.000 Any DISCAR UDP Bypass 00000000 Inspect 00000000 000.000.000.000 000000000000 00000000 00000000 00000030 00000030 00000000
00000033 00:60:73:EE:05:CD 192.168.003.062 000.000.000.000 000.000.000.000 Any DNS UDP Bypass 00000005 Secure 00000006 068.167.049.218 000C41AB3B2C 00000012 00000014 00000038 00000032 000002C8
00000035 00:0B:DB:02:F9:10 192.168.001.092 068.167.049.218 000.000.000.000 Any Any ESP Discard 00000000 Bypass 00000000 000.000.000.000 000000000000 00000014 00000014 00000014 00000014 00000000
00000032 00:60:73:EE:05:CD 192.168.003.062 192.168.003.000 255.255.255.000 Any Any N/A Bypass 00000005 Secure 00000006 068.167.049.218 000C41AB3B2C 00000004 00000004 0000000C 00000004 000002C8
00000034 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 Any Any N/A Discard 00000000 Discard 00000000 000.000.000.000 000000000000 00000000 00000000 00000000 00000000 00000000
00000027 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 Any Any N/A Bypass 00000000 Bypass 00000000 000.000.000.000 000000000000 00000000 00000000 00000000 00000000 00000000


*** LOG MESSAGES ***
2004/06/17 00:23:59:589 Information <local host> Event publisher registered for Log Output.
2004/06/17 00:23:59:609 Information <local host> Reading configuration file C:\Documents and Settings\administrator\Application Data\SonicWALL\SonicWALL Global VPN Client\Administrator\SonicWALL Global.
2004/06/17 00:24:14:691 Information <local host> Saving configuration file C:\Documents and Settings\administrator\Application Data\SonicWALL\SonicWALL Global VPN Client\Administrator\SonicWALL Global.
2004/06/17 00:24:14:711 Information <local host> The configuration file 'C:\Documents and Settings\administrator\Application Data\SonicWALL\SonicWALL Global VPN Client\Administrator\SonicWALL Global' has been saved.
2004/06/17 00:24:14:721 Information <local host> Saving configuration file C:\Documents and Settings\administrator\Application Data\SonicWALL\SonicWALL Global VPN Client\Administrator\SonicWALL Global.
2004/06/17 00:24:14:731 Information <local host> The configuration file 'C:\Documents and Settings\administrator\Application Data\SonicWALL\SonicWALL Global VPN Client\Administrator\SonicWALL Global' has been saved.
2004/06/17 00:24:14:781 Information <local host> SonicWALL Global VPN Client version 2.2.0.131
2004/06/17 00:24:14:782 Information <local host> The connection "XXXXX VPN" has been enabled.
2004/06/17 00:24:15:122 Information 68.167.49.218 Starting ISAKMP phase 1 negotiation.
2004/06/17 00:24:15:462 Information 68.167.49.218 Starting aggressive mode phase 1 exchange.
2004/06/17 00:24:15:463 Information 68.167.49.218 NAT Detected: Local host is behind a NAT device.
2004/06/17 00:24:15:464 Information 68.167.49.218 NAT Detected: Peer is behind a NAT device.
2004/06/17 00:24:15:465 Information 68.167.49.218 The SA lifetime for phase 1 is 28800 seconds.
2004/06/17 00:24:15:466 Information 68.167.49.218 Phase 1 has completed.
2004/06/17 00:24:15:522 Information 68.167.49.218 Received request for policy version.
2004/06/17 00:24:15:523 Information 68.167.49.218 Sending policy version reply.
2004/06/17 00:24:15:592 Information 68.167.49.218 Received policy change is not required.
2004/06/17 00:24:15:593 Information 68.167.49.218 Sending policy acknowledgement.
2004/06/17 00:24:15:594 Information 68.167.49.218 The configuration for the connection is up to date.
2004/06/17 00:24:15:602 Information 68.167.49.218 Starting ISAKMP phase 2 negotiation with 192.168.3.0/255.255.255.0:BOOTPC:BOOTPS:UDP.
2004/06/17 00:24:15:603 Information 68.167.49.218 Starting quick mode phase 2 exchange.
2004/06/17 00:24:15:673 Information 68.167.49.218 The SA lifetime for phase 2 is 28800 seconds.
2004/06/17 00:24:15:674 Information 68.167.49.218 Phase 2 with 192.168.3.0/255.255.255.0:BOOTPC:BOOTPS:UDP has completed.
2004/06/17 00:24:15:675 Information <local host> Renewing IP address for the virtual interface (00-60-73-EE-05-CD).
2004/06/17 00:24:19:598 Information <local host> The IP address for the virtual interface has changed to 192.168.3.62.
2004/06/17 00:24:19:608 Information <local host> The system ARP cache has been flushed.
2004/06/17 00:24:19:609 Information 68.167.49.218 NetWkstaUserGetInfo returned: user: Administrator, logon domain: XXXXX, logon server: N008PQH
2004/06/17 00:24:20:760 Information 68.167.49.218 NetGetDCName returned: logon server: \\XXXXXXXX
2004/06/17 00:24:20:761 Information 68.167.49.218 calling NetUserGetInfo: Server: \\XXXXXXX, User: Administrator, level: 3
2004/06/17 00:24:24:605 Information 68.167.49.218 Sending dead peer detection request.
2004/06/17 00:24:24:655 Information 68.167.49.218 Received dead peer detection acknowledgement.
 
I am logged on as the user on the same laptop in this report. As you can see, no authentication is being sent, so how can this be a permissions issue if it's not even gotten to the permissions point yet? SonicWall has been of no help on this and I am rapidly running out of time. My user is boarding a plane later today and I need this VPN thing solved before she leaves to get on that plane. Any ideas are greatly appreciated!!

Here is the log for the user:

Application Name: SonicWALL Global VPN Client
Application Version: 2.2.0.131
IPsec Driver Name: SonicWALL VPN Client IPSec Driver for Windows 98/Me/NT/2000/XP
IPsec Driver Version: 9.30
Virtual Adapter Driver Name: SonicWALL VPN Adapter
Virtual Adapter Driver Version: 9.01
DNE Adapter Driver Name: Deterministic Network Enhancer
DNE Adapter Driver Version: 2.21.7.233
Reported Generated At: 23:44:55 Wed Jun 16 2004

System Summary
OS Name: Microsoft Windows 2000 Professional
System Name: 5.0.2195 Service Pack 4 Build 2195
OS Manufacturer: Microsoft Corporation
System Name: N008PQH
System Manufacturer: Dell Computer Corporation
System Model: Latitude C640
System Type: X86-based PC
Processor: x86 Family 15 Model 2 Stepping 7 GenuineIntel ~1994 Mhz
BIOS Version: 01/12/04
Windows Directory: C:\WINNT
Locale: United States
Time Zone: Eastern Daylight Time
Total Physical Memory: 511 MB
Available Physical Memory: 348 MB
Total Virtual Memory: 2047 MB
Available Virtual Memory: 1999 MB
Page File Space: 1247 MB

Windows IP Configuration

Host Name . . . . . . . . . . . . : n008pqh
Primary Dns Suffix . . . . . . . : XXXXX.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled . . . . . . . : No
WINS Proxy Enabled . . . . . . . : No
DNS Suffix Search List . . . . . : XXXXX.com

Ethernet adapter SonicWALL Virtual Adapter:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : SonicWALL VPN Adapter
Physical Address. . . . . . . . . : 00-60-73-EE-05-CD
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : No
IP Address. . . . . . . . . . . . : 192.168.3.62
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.3.1
DHCP Server . . . . . . . . . . . : 192.168.3.2
DNS Servers . . . . . . . . . . . : 192.168.3.2
192.168.3.3
Lease Obtained. . . . . . . . . . : Wednesday, June 16, 2004 11:43:25 PM
Lease Expires . . . . . . . . . . : Thursday, June 24, 2004 11:43:25 PM

Ethernet adapter Notebook Adapter:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 3Com EtherLink PCI
Physical Address. . . . . . . . . : 00-0B-DB-02-F9-10
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 192.168.1.92
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DNS Servers . . . . . . . . . . . : 12.127.16.83
12.127.17.83
Lease Obtained. . . . . . . . . . : Wednesday, June 16, 2004 11:29:47 PM
Lease Expires . . . . . . . . . . : Thursday, June 17, 2004 11:29:47 PM


===========================================================================
Interface List:
Interface MAC Address Description
0x00000001 00-00-00-00-00-00 MS TCP Loopback interface
0x07000004 00-0B-DB-02-F9-10 3Com EtherLink PCI
0x08000003 00-60-73-EE-05-CD SonicWALL VPN Adapter
===========================================================================

===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.92 1
0.0.0.0 0.0.0.0 192.168.3.1 192.168.3.62 1
68.167.49.218 255.255.255.255 192.168.1.1 192.168.1.92 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.92 192.168.1.92 1
192.168.1.92 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.255 255.255.255.255 192.168.1.92 192.168.1.92 1
192.168.3.0 255.255.255.0 192.168.3.62 192.168.3.62 1
192.168.3.2 255.255.255.255 192.168.3.62 192.168.3.62 1
192.168.3.62 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.3.255 255.255.255.255 192.168.3.62 192.168.3.62 1
224.0.0.0 224.0.0.0 192.168.1.92 192.168.1.92 1
224.0.0.0 224.0.0.0 192.168.3.62 192.168.3.62 1
255.255.255.255 255.255.255.255 192.168.1.92 192.168.1.92 1
Default Gateway: 192.168.1.1
===========================================================================

===========================================================================
ARP Table Entries:
Internet Address Physical Address Interface Type
192.168.1.1 00-0C-41-AB-3B-2C 192.168.1.92 3
192.168.3.2 00-60-73-EE-05-CE 192.168.3.62 3
192.168.3.3 00-60-73-EE-05-CE 192.168.3.62 3
===========================================================================

*** Connections ***
NATSO VPN (68.167.49.218): Configuration Complete
Destination Networks
--------------------
192.168.3.0/255.255.255.0/BOOTPS: Phase 2 Complete
192.168.3.0/255.255.255.0/Any: Idle
192.168.3.0/255.255.255.0/Any: Idle


Negotiated Phase 1 SA Parameters
--------------------------------
Encryption Algorithm: DES-CBC
Hash Algorithm: MD5
Authentication Method: Pre-shared key
DH Group: Default 768-bit MODP group (Group 1)
Connect Time: Wednesday June 16 2004 11:43:19 PM
Duration: 28800 seconds
Expiration Time: Thursday June 17 2004 07:43:19 AM

Negotiated Phase 2 SA Parameters
--------------------------------
IPSec Protocol: Encapsulating Security Payload
ESP Enc Algorithm: Triple DES
ESP Auth Algorithm: HMAC-SHA
Encapsulation Mode: UDP Encapsulation Tunnel
Diffie-Hellman Group: N/A (PFS not enabled)


*** SECURITY POLICY DATABASE ***
UID From MAC From IP To IP 1 To IP 2 FPort TPort Prot IPolicy ISADBUID OPolicy OSADBUID Peer IP Peer MAC FOMF FIMF TOMF TIMF Event ID
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
00000022 00:60:73:EE:05:CD 000.000.000.000 000.000.000.000 000.000.000.000 BOOTPC BOOTPS UDP Inspect 00000003 Secure 00000004 068.167.049.218 000C41AB3B2C 00000032 00000034 00000038 00000032 00000310
00000021 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 BOOTPC BOOTPS UDP Inspect 00000000 Bypass 00000000 000.000.000.000 000000000000 00000030 00000030 00000030 00000030 00000000
00000019 00:0B:DB:02:F9:10 000.000.000.000 000.000.000.000 000.000.000.000 Any ISAKMP UDP Inspect 00000000 Inspect 00000000 068.167.049.218 000C41AB3B2C 00000000 00000000 00000030 00000030 00000000
00000020 00:0B:DB:02:F9:10 000.000.000.000 000.000.000.000 000.000.000.000 Any DISCAR UDP Bypass 00000000 Inspect 00000000 000.000.000.000 000000000000 00000000 00000000 00000030 00000030 00000000
00000024 00:60:73:EE:05:CD 000.000.000.000 000.000.000.000 000.000.000.000 Any DNS UDP Bypass 00000000 Secure 00000000 068.167.049.218 000C41AB3B2C 00000012 00000014 00000038 00000032 00000310
00000026 00:0B:DB:02:F9:10 192.168.001.092 068.167.049.218 000.000.000.000 Any Any ESP Discard 00000000 Bypass 00000000 000.000.000.000 000000000000 00000014 00000014 00000014 00000014 00000000
00000023 00:0B:DB:02:F9:10 192.168.001.092 192.168.003.000 255.255.255.000 Any Any N/A Bypass 00000000 Secure 00000000 068.167.049.218 000C41AB3B2C 00000004 00000004 0000000C 00000004 00000310
00000025 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 Any Any N/A Discard 00000000 Discard 00000000 000.000.000.000 000000000000 00000000 00000000 00000000 00000000 00000000
00000018 00:00:00:00:00:00 000.000.000.000 000.000.000.000 000.000.000.000 Any Any N/A Bypass 00000000 Bypass 00000000 000.000.000.000 000000000000 00000000 00000000 00000000 00000000 00000000


*** LOG MESSAGES ***
2004/06/16 23:41:25:432 Information <local host> Event publisher registered for Log Output.
2004/06/16 23:41:25:452 Information <local host> Saving configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:41:25:472 Information <local host> The keyset could not be opened and may not exist. A new keyset will be created for file encryption.
2004/06/16 23:41:25:532 Information <local host> The keyset for file encryption has been created.
2004/06/16 23:41:25:533 Information <local host> The key exchange key pair does not exist and will be created.
2004/06/16 23:41:25:652 Information <local host> The key exchange key pair has been created.
2004/06/16 23:41:25:653 Information <local host> The configuration file 'C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
2004/06/16 23:41:25:654 Information <local host> Reading configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:41:25:702 Information <local host> Saving configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:41:25:712 Information <local host> The configuration file 'C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
2004/06/16 23:41:26:493 Information <local host> The ISAKMP port (500) is already in use. Port 1166 will be used as the ISAKMP source port.
2004/06/16 23:41:26:513 Information <local host> SonicWALL Global VPN Client version 2.2.0.131
2004/06/16 23:42:04:558 Information <local host> Saving configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:42:19:580 Information <local host> The configuration file 'C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
2004/06/16 23:42:19:581 Information <local host> The connection "XXXXX VPN" has been enabled.
2004/06/16 23:42:19:920 Information 68.167.49.218 Starting ISAKMP phase 1 negotiation.
2004/06/16 23:42:20:140 Information 68.167.49.218 Starting aggressive mode phase 1 exchange.
2004/06/16 23:42:20:141 Information 68.167.49.218 Received invalid ID information notify.
2004/06/16 23:42:20:142 Information 68.167.49.218 Re-evaluating ID info after notify message.
2004/06/16 23:43:15:089 Information <local host> Saving configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:43:15:400 Information 68.167.49.218 Starting ISAKMP phase 1 negotiation.
2004/06/16 23:43:15:760 Information 68.167.49.218 Starting aggressive mode phase 1 exchange.
2004/06/16 23:43:15:761 Information 68.167.49.218 NAT Detected: Local host is behind a NAT device.
2004/06/16 23:43:15:762 Information 68.167.49.218 The SA lifetime for phase 1 is 28800 seconds.
2004/06/16 23:43:15:763 Information 68.167.49.218 Phase 1 has completed.
2004/06/16 23:43:15:861 Information 68.167.49.218 Received request for policy version.
2004/06/16 23:43:15:862 Information 68.167.49.218 Sending policy version reply.
2004/06/16 23:43:15:941 Information 68.167.49.218 Received policy update.
2004/06/16 23:43:15:942 Information 68.167.49.218 Sending policy acknowledgement.
2004/06/16 23:43:15:943 Information 68.167.49.218 The configuration for the connection has been updated.
2004/06/16 23:43:15:944 Information 68.167.49.218 Sending phase 1 delete.
2004/06/16 23:43:19:736 Information 68.167.49.218 Starting ISAKMP phase 1 negotiation.
2004/06/16 23:43:20:067 Information 68.167.49.218 Starting aggressive mode phase 1 exchange.
2004/06/16 23:43:20:068 Information 68.167.49.218 NAT Detected: Local host is behind a NAT device.
2004/06/16 23:43:20:069 Information 68.167.49.218 The SA lifetime for phase 1 is 28800 seconds.
2004/06/16 23:43:20:070 Information 68.167.49.218 Phase 1 has completed.
2004/06/16 23:43:20:137 Information 68.167.49.218 Received request for policy version.
2004/06/16 23:43:20:138 Information 68.167.49.218 Sending policy version reply.
2004/06/16 23:43:20:197 Information 68.167.49.218 Received policy change is not required.
2004/06/16 23:43:20:198 Information 68.167.49.218 Sending policy acknowledgement.
2004/06/16 23:43:20:199 Information 68.167.49.218 The configuration for the connection is up to date.
2004/06/16 23:43:20:217 Information 68.167.49.218 Starting ISAKMP phase 2 negotiation with 192.168.3.0/255.255.255.0:BOOTPC:BOOTPS:UDP.
2004/06/16 23:43:20:218 Information 68.167.49.218 Starting quick mode phase 2 exchange.
2004/06/16 23:43:20:287 Information 68.167.49.218 The SA lifetime for phase 2 is 28800 seconds.
2004/06/16 23:43:20:288 Information 68.167.49.218 Phase 2 with 192.168.3.0/255.255.255.0:BOOTPC:BOOTPS:UDP has completed.
2004/06/16 23:43:20:289 Information <local host> Renewing IP address for the virtual interface (00-60-73-EE-05-CD).
2004/06/16 23:43:30:101 Information <local host> The configuration file 'C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
2004/06/16 23:43:30:102 Information <local host> Saving configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:43:30:121 Information <local host> The configuration file 'C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
2004/06/16 23:43:35:198 Information <local host> Saving configuration file C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf.
2004/06/16 23:43:35:218 Information <local host> The configuration file 'C:\Documents and Settings\roberta\Application Data\SonicWALL\SonicWALL Global VPN Client\SonicWALL Global VPN Client.rcf' has been saved.
 
I am having similar issues, I can ping the server but I can't get to my network places, network drives, or outlook. How did you resolve the issue? please let me know .... onyensoh@hotmail.com
 
Ok... SonicWall support was saying all along that it was a permissions issue. They said to make the user administrator of the local machine. I did this and was still not having any success. The resolution finally arrived when I assigned the user full rights to the program files folder. This gave them all access to everything including the SonicWall software installed on the machine, thus allowing the software to send full authentication for the user into our domain for access. No one at SonicWall explicitly said it was the software that needed the full access. They kept telling me to give the user administrator rights, which truthfully, wasn't an answer I wasnted to hear. Try assigning full rights to the program files folder for your user. I also located their computer in Active directory, Users and computers, and assigned full rights to their laptop there. It works like a charm now. Hope this helps you also. Was very painful and frustrating time here until reaching this resolution.

Have a good one.
 
Thanks for giving the answer to your problem.

I ran across your post while looking for a solution to a different problem and remembered it. A couple of days later, I realized your solution fixes a problem I was having on a different machine. I gave the user rights to their C: drive and now they can browse the network. (The user was getting prompted for a username and password and his didn't work, but mine did.) Thanks.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top