I have recently switched to a ADSL plan with a permanent NO-NAT IP address and am still having great difficulty connecting to a server using Terminal Services through a tunnel. VPN 7 shows that I have succesfully connected to a tunnel but won't allow me to TS through it.
I have connected fine in the past using a dialup connection.
I did however notice some errors in the log file (VPN 7) and wonder if anyone can make sense of whats been happening by reading them.
I cannot ping the server either and also have just tried something called DR TCP, changing my MTU setting to 1472 after i read this in another post. Still no TS access.
Here is the VPN log
*************************************
May 16 12:47:32.387 JO-MAIN emapi[2692]: 301 Internal warning: accept fails (Socket operation on non-socket.)
May 16 12:47:37.374 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Entering EMAPI initial wait state.
May 16 12:47:37.374 JO-MAIN vpnd[2476]: 117 Daemon starting
May 16 12:47:37.354 JO-MAIN isakmpd[492]: 117 isakmpd Info: Daemon starting
May 16 12:47:37.434 JO-MAIN isakmpd[492]: 120 isakmpd Info: Not waiting for Mobile
May 16 12:47:37.444 JO-MAIN vpn: 401 Internal error: can't set interface parameters for IP address 192.168.0.101
May 16 12:47:37.444 JO-MAIN vpn: 343 Interfaces Warning: The interface 192.168.0.101 was configured, but was not found on the firewall.
May 16 12:47:38.445 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reloading tunnels to vpnd with 3 sec wait.
May 16 12:47:38.445 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reloading tunnels to RaptorMobile with 3 sec wait.
May 16 12:47:39.527 JO-MAIN isakmpd[492]: 120 isakmpd Info: Cannot find entrust config file C:\Program Files\Symantec\VPNClient\entrust.cf. Will use default configuration.
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: IKMPLogin: Switched to lite mode, cannot access CA directory
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Try to turn off crl validation...
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Successfully logged into the ISAKMP engine with a default profile which has no Certificate support
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reconfiguring Isakmp tunnels
May 16 12:47:39.867 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Continue operation.
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reloading tunnels to RaptorMobile with 15 sec wait.
May 16 12:47:44.354 JO-MAIN emapi[1732]: 100 nsetup Trace: Session Notification enabled.
May 16 12:47:44.414 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reconfiguring Isakmp tunnels
May 16 12:47:44.424 JO-MAIN emapi[1732]: 100 nsetup Trace: Connecting security gateway 193.114.XX.XX
May 16 12:47:44.424 JO-MAIN emapi[1732]: 100 nsetup Trace: Retrieving configuration for gateway 193.114.XX.XX
May 16 12:47:47.548 JO-MAIN isakmpd[492]: 120 isakmpd Info: Initiator, Established ISAKMP SA (Lsg=192.168.0.101, Rsg=193.114.XX.XX), [tunTemplate=Universal]
May 16 12:47:48.059 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Beginning authentication with remote security gateway at 193.114.XX.XX.
May 16 12:47:48.059 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Authenticating via Default authentication...
May 16 12:47:48.620 JO-MAIN emapi[1732]: 200 Symantec Enterprise VPN Client Notify: Authenticating via S/Key...
May 16 12:47:49.121 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Finished authentication with remote security gateway at 193.114.XX.XX.
May 16 12:47:49.121 JO-MAIN isakmpd[492]: 120 isakmpd Info: Authenticated
May 16 12:47:49.681 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Downloaded secure tunnel (XXX.XXX.114.3/255.255.255.255).
May 16 12:47:50.433 JO-MAIN emapi[1732]: 100 nsetup Trace: Connecting tunnel to XXX.XXX.114.3
May 16 12:48:27.025 JO-MAIN isakmpd[492]: 120 isakmpd Info: Initiator, Established IPSEC SA TUNNEL 0.isakmp.4 type=INSTANCE (Lnet/sg=192.168.0.101/192.168.0.101, Rnet/sg=XXX.XXX.114.3/193.114.XX.XX) Lspi=0x85d0b2ca Rspi=0xfadd6ed4 Auth Header = AH_NONE ESP Header = DES_MD5 IPComp algorithm = DEFLATE, [tunTemplate=Universal]
May 16 12:48:27.035 JO-MAIN emapi[1732]: 100 nsetup Trace: Tunnel to XXX.XXX.114.3 Connected
May 16 12:48:27.035 JO-MAIN emapi[1732]: 100 nsetup Trace: Security gateway 193.114.XX.XX Connected
***************************
IP's where changed with X's just in case you thought something funny was happening.
Anyone have any ideas to what I could try next?
I have connected fine in the past using a dialup connection.
I did however notice some errors in the log file (VPN 7) and wonder if anyone can make sense of whats been happening by reading them.
I cannot ping the server either and also have just tried something called DR TCP, changing my MTU setting to 1472 after i read this in another post. Still no TS access.
Here is the VPN log
*************************************
May 16 12:47:32.387 JO-MAIN emapi[2692]: 301 Internal warning: accept fails (Socket operation on non-socket.)
May 16 12:47:37.374 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Entering EMAPI initial wait state.
May 16 12:47:37.374 JO-MAIN vpnd[2476]: 117 Daemon starting
May 16 12:47:37.354 JO-MAIN isakmpd[492]: 117 isakmpd Info: Daemon starting
May 16 12:47:37.434 JO-MAIN isakmpd[492]: 120 isakmpd Info: Not waiting for Mobile
May 16 12:47:37.444 JO-MAIN vpn: 401 Internal error: can't set interface parameters for IP address 192.168.0.101
May 16 12:47:37.444 JO-MAIN vpn: 343 Interfaces Warning: The interface 192.168.0.101 was configured, but was not found on the firewall.
May 16 12:47:38.445 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reloading tunnels to vpnd with 3 sec wait.
May 16 12:47:38.445 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reloading tunnels to RaptorMobile with 3 sec wait.
May 16 12:47:39.527 JO-MAIN isakmpd[492]: 120 isakmpd Info: Cannot find entrust config file C:\Program Files\Symantec\VPNClient\entrust.cf. Will use default configuration.
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: IKMPLogin: Switched to lite mode, cannot access CA directory
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Try to turn off crl validation...
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Successfully logged into the ISAKMP engine with a default profile which has no Certificate support
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reconfiguring Isakmp tunnels
May 16 12:47:39.867 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Continue operation.
May 16 12:47:39.867 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reloading tunnels to RaptorMobile with 15 sec wait.
May 16 12:47:44.354 JO-MAIN emapi[1732]: 100 nsetup Trace: Session Notification enabled.
May 16 12:47:44.414 JO-MAIN isakmpd[492]: 120 isakmpd Info: Reconfiguring Isakmp tunnels
May 16 12:47:44.424 JO-MAIN emapi[1732]: 100 nsetup Trace: Connecting security gateway 193.114.XX.XX
May 16 12:47:44.424 JO-MAIN emapi[1732]: 100 nsetup Trace: Retrieving configuration for gateway 193.114.XX.XX
May 16 12:47:47.548 JO-MAIN isakmpd[492]: 120 isakmpd Info: Initiator, Established ISAKMP SA (Lsg=192.168.0.101, Rsg=193.114.XX.XX), [tunTemplate=Universal]
May 16 12:47:48.059 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Beginning authentication with remote security gateway at 193.114.XX.XX.
May 16 12:47:48.059 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Authenticating via Default authentication...
May 16 12:47:48.620 JO-MAIN emapi[1732]: 200 Symantec Enterprise VPN Client Notify: Authenticating via S/Key...
May 16 12:47:49.121 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Finished authentication with remote security gateway at 193.114.XX.XX.
May 16 12:47:49.121 JO-MAIN isakmpd[492]: 120 isakmpd Info: Authenticated
May 16 12:47:49.681 JO-MAIN emapi[1732]: 100 Symantec Enterprise VPN Client Info: Downloaded secure tunnel (XXX.XXX.114.3/255.255.255.255).
May 16 12:47:50.433 JO-MAIN emapi[1732]: 100 nsetup Trace: Connecting tunnel to XXX.XXX.114.3
May 16 12:48:27.025 JO-MAIN isakmpd[492]: 120 isakmpd Info: Initiator, Established IPSEC SA TUNNEL 0.isakmp.4 type=INSTANCE (Lnet/sg=192.168.0.101/192.168.0.101, Rnet/sg=XXX.XXX.114.3/193.114.XX.XX) Lspi=0x85d0b2ca Rspi=0xfadd6ed4 Auth Header = AH_NONE ESP Header = DES_MD5 IPComp algorithm = DEFLATE, [tunTemplate=Universal]
May 16 12:48:27.035 JO-MAIN emapi[1732]: 100 nsetup Trace: Tunnel to XXX.XXX.114.3 Connected
May 16 12:48:27.035 JO-MAIN emapi[1732]: 100 nsetup Trace: Security gateway 193.114.XX.XX Connected
***************************
IP's where changed with X's just in case you thought something funny was happening.
Anyone have any ideas to what I could try next?