Maybe UDP/4500 is being blocked, you can try TCP/10000 or start using AnyConnect, which will be blocked far less on firewalls outbound.
-ryan
-----Original Message-----
From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of Gaurav Thukral
Sent: Wednesday, October 17, 2012 10:47 AM
To: Group study
Subject: Error 412 Cisco VPN Client: Reason 412  The remote peer is no longer responding
Hi All
I am unable to connect Via VPN using XP machine. I am getting the below mentioned error.
Kindly let me know if anyone faced this issue.
Thanks
Gaurav
#############################################################
Cisco Systems VPN Client Version 5.0.07.0410 Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Program Files\Cisco Systems\VPN Client\
1      19:45:51.484  10/17/12  Sev=Info/6    CERT/0x63600026
Attempting to find a Certificate using Serial Hash.
2      19:45:51.484  10/17/12  Sev=Info/6    CERT/0x63600027
Found a Certificate using Serial Hash.
3      19:45:51.484  10/17/12  Sev=Info/6    GUI/0x63B00011
Reloaded the Certificates in all Certificate Stores successfully.
4      19:45:53.765  10/17/12  Sev=Info/4    CM/0x63100002
Begin connection process
5      19:45:53.812  10/17/12  Sev=Info/4    CM/0x63100004
Establish secure connection
6      19:45:53.812  10/17/12  Sev=Info/4    CM/0x63100024
Attempt connection with server "houvpn.oceaneering.com"
7      19:45:54.187  10/17/12  Sev=Info/6    IKE/0x6300003B
Attempting to establish a connection with 208.46.106.55.
8      19:45:54.203  10/17/12  Sev=Info/4    IKE/0x63000001
Starting IKE Phase 1 Negotiation
9      19:45:54.250  10/17/12  Sev=Info/4    IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 208.46.106.55
10     19:45:54.265  10/17/12  Sev=Info/4    IPSEC/0x63700008
IPSec driver successfully started
11     19:45:54.265  10/17/12  Sev=Info/4    IPSEC/0x63700014
Deleted all keys
12     19:45:59.281  10/17/12  Sev=Info/4    IKE/0x63000021
Retransmitting last packet!
13     19:45:59.281  10/17/12  Sev=Info/4    IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 208.46.106.55
14     19:46:04.406  10/17/12  Sev=Info/4    IKE/0x63000021
Retransmitting last packet!
15     19:46:04.406  10/17/12  Sev=Info/4    IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 208.46.106.55
16     19:46:09.406  10/17/12  Sev=Info/4    IKE/0x63000021
Retransmitting last packet!
17     19:46:09.406  10/17/12  Sev=Info/4    IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 208.46.106.55
18     19:46:14.406  10/17/12  Sev=Info/4    IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=EC68C5F3368AF274
R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
19     19:46:14.906  10/17/12  Sev=Info/4    IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=EC68C5F3368AF274
R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
*20     19:46:14.906  10/17/12  Sev=Info/4    CM/0x63100014
Unable to establish Phase 1 SA with server "houvpn.oceaneering.com" because of "DEL_REASON_PEER_NOT_RESPONDING"
*
21     19:46:14.906  10/17/12  Sev=Info/5    CM/0x63100025
Initializing CVPNDrv
22     19:46:14.921  10/17/12  Sev=Info/6    CM/0x63100046
Set tunnel established flag in registry to 0.
23     19:46:14.921  10/17/12  Sev=Info/4    IKE/0x63000001
IKE received signal to terminate VPN connection
24     19:46:14.953  10/17/12  Sev=Info/4    IPSEC/0x63700014
Deleted all keys
25     19:46:14.953  10/17/12  Sev=Info/4    IPSEC/0x63700014
Deleted all keys
26     19:46:14.953  10/17/12  Sev=Info/4    IPSEC/0x63700014
Deleted all keys
27     19:46:14.953  10/17/12  Sev=Info/4    IPSEC/0x6370000A
IPSec driver successfully stopped
-- Thanks & Regards, Gaurav Thukral Blogs and organic groups at http://www.ccie.netReceived on Wed Oct 17 2012 - 14:50:53 ART
This archive was generated by hypermail 2.2.0 : Thu Nov 01 2012 - 10:53:33 ART