首页
学习
活动
专区
圈层
工具
发布
首页
学习
活动
专区
圈层
工具
MCP广场
社区首页 >问答首页 >连接Cisco VPN客户端原因412出现故障

连接Cisco VPN客户端原因412出现故障
EN

Server Fault用户
提问于 2015-05-28 19:54:46
回答 1查看 35.3K关注 0票数 1

我正在使用Windows8.1尝试使用Cisco VPN连接到Office。

我试着连接,几秒钟后我得到了这个:

由客户端原因412在本地终止的安全VPN连接:远程对等端不再响应。

我的IT部门说有东西堵住了端口10000的流量。我已经尝试关闭所有的软件防火墙,并验证了我的路由器已经启用VPN通道。

我联系了我的ISP,他们声称它应该工作,他们提供的配置文件对其他人都有效。

这是我的日志:

代码语言:javascript
运行
复制
Cisco Systems VPN Client Version 5.0.07.0440
Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.2.9200 

205    14:09:57.154  05/28/15  Sev=Info/4   CM/0x63100002
Begin connection process

206    14:09:57.156  05/28/15  Sev=Info/4   CM/0x63100004
Establish secure connection

207    14:09:57.156  05/28/15  Sev=Info/4   CM/0x63100024
Attempt connection with server "66.162.2.6"

208    14:09:57.159  05/28/15  Sev=Info/6   CM/0x6310002F
Allocated local TCP port 57238 for TCP connection.

209    14:09:57.705  05/28/15  Sev=Info/4   IPSEC/0x63700008
IPSec driver successfully started

210    14:09:57.705  05/28/15  Sev=Info/4   IPSEC/0x63700014
Deleted all keys

211    14:09:57.705  05/28/15  Sev=Info/6   IPSEC/0x6370002C
Sent 4 packets, 0 were fragmented.

212    14:09:57.705  05/28/15  Sev=Info/6   IPSEC/0x63700020
TCP SYN sent to 66.162.2.6, src port 57238, dst port 10000

213    14:09:57.705  05/28/15  Sev=Info/6   IPSEC/0x6370001C
TCP SYN-ACK received from 66.162.2.6, src port 10000, dst port 57238

214    14:09:57.705  05/28/15  Sev=Info/6   IPSEC/0x63700021
TCP ACK sent to 66.162.2.6, src port 57238, dst port 10000

215    14:09:57.705  05/28/15  Sev=Info/4   CM/0x63100029
TCP connection established on port 10000 with server "66.162.2.6"

216    14:09:58.207  05/28/15  Sev=Info/4   CM/0x63100024
Attempt connection with server "66.162.2.6"

217    14:09:58.213  05/28/15  Sev=Info/6   IKE/0x6300003B
Attempting to establish a connection with 66.162.2.6.

218    14:09:58.216  05/28/15  Sev=Info/4   IKE/0x63000001
Starting IKE Phase 1 Negotiation

219    14:09:58.226  05/28/15  Sev=Info/4   IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Unity)) to 66.162.2.6

220    14:10:03.707  05/28/15  Sev=Info/4   IKE/0x63000021
Retransmitting last packet!

221    14:10:03.707  05/28/15  Sev=Info/4   IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 66.162.2.6

222    14:10:08.707  05/28/15  Sev=Info/4   IKE/0x63000021
Retransmitting last packet!

223    14:10:08.707  05/28/15  Sev=Info/4   IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 66.162.2.6

224    14:10:14.205  05/28/15  Sev=Info/4   IKE/0x63000021
Retransmitting last packet!

225    14:10:14.205  05/28/15  Sev=Info/4   IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 66.162.2.6

226    14:10:19.207  05/28/15  Sev=Info/4   IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=4CE6E0F6AFDD6219 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

227    14:10:20.206  05/28/15  Sev=Info/4   IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=4CE6E0F6AFDD6219 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

228    14:10:20.206  05/28/15  Sev=Info/4   CM/0x63100014
Unable to establish Phase 1 SA with server "66.162.2.6" because of "DEL_REASON_PEER_NOT_RESPONDING"

229    14:10:20.206  05/28/15  Sev=Info/5   CM/0x63100025
Initializing CVPNDrv

230    14:10:20.217  05/28/15  Sev=Info/4   CM/0x6310002D
Resetting TCP connection on port 10000

231    14:10:20.218  05/28/15  Sev=Info/6   CM/0x63100030
Removed local TCP port 57238 for TCP connection.

232    14:10:20.225  05/28/15  Sev=Info/6   CM/0x63100046
Set tunnel established flag in registry to 0.

233    14:10:20.226  05/28/15  Sev=Info/4   IKE/0x63000001
IKE received signal to terminate VPN connection

234    14:10:20.241  05/28/15  Sev=Info/6   IPSEC/0x63700023
TCP RST sent to 66.162.2.6, src port 57238, dst port 10000

235    14:10:20.241  05/28/15  Sev=Info/4   IPSEC/0x63700014
Deleted all keys

236    14:10:20.241  05/28/15  Sev=Info/4   IPSEC/0x63700014
Deleted all keys

237    14:10:20.241  05/28/15  Sev=Info/4   IPSEC/0x63700014
Deleted all keys

238    14:10:20.241  05/28/15  Sev=Info/4   IPSEC/0x6370000A
IPSec driver successfully stopped

有人知道为什么会发生这种情况吗?还有其他要排除故障的步骤吗?

EN

回答 1

Server Fault用户

回答已采纳

发布于 2015-05-28 20:08:31

由几个不同的原因造成的:

  1. 客户端位于(或使用)防火墙后面,防火墙阻塞端口TCP 4500/10000或UDP 4500/10000或500和/或ESP。
  2. 您的Internet连接不稳定,并且正在丢弃数据包。
  3. VPN客户端位于NAT设备后面,而VPN服务器没有启用NAT。

可能的解决办法:

  1. 如果您正在使用无线,尝试连接有线,并确保您有一个稳定的网络到您的851。
  2. 在客户端上关闭防火墙,然后测试连接以确定问题是否仍然发生。如果没有打开防火墙,则可以在防火墙中添加端口500、端口4500和ESP协议的异常规则。
  3. 在配置文件中打开NAT/TCP(记得在防火墙中解除端口10000 )
  4. 使用编辑器编辑您的配置文件,并将ForceKeepAlive=0更改为1

--别忘了重新启动服务--

通过在命令提示符中发出命令-go到服务

-Stop思科系统,Inc.VPN服务

-Stop因特网连接共享服务

-Right单击ICS服务并选择属性。然后将启动类型更改为“禁用”或“手动”。

-Start思科系统,Inc.VPN服务

票数 2
EN
页面原文内容由Server Fault提供。腾讯云小微IT领域专用引擎提供翻译支持
原文链接:

https://serverfault.com/questions/695119

复制
相关文章

相似问题

领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档