EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 01:45:11.290 02/25/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 01:45:11.290 02/25/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xC0A80102 (DRVIFACE:1199). 3 01:45:11.320 02/25/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 4 01:45:11.320 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 5 01:45:11.470 02/25/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1121 for TCP connection. 6 01:45:11.630 02/25/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 01:45:11.630 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 01:45:11.630 02/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1121, dst port 4005 9 01:45:11.630 02/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1121 10 01:45:11.630 02/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1121, dst port 4005 11 01:45:11.630 02/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 01:45:12.131 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 01:45:12.151 02/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 01:45:12.171 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 01:45:12.331 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 01:45:12.331 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 01:45:12.331 02/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 01:45:12.331 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 01:45:12.331 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 01:45:12.331 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 01:45:12.381 02/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 01:45:12.381 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 01:45:12.381 02/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 01:45:12.381 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 01:45:12.401 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 01:45:12.401 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 01:45:12.401 02/25/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 01:45:12.401 02/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A896B07E70A005D6 R_Cookie=E71F747999653943) reason = DEL_REASON_LOAD_BALANCING 29 01:45:12.401 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 01:45:13.122 02/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A896B07E70A005D6 R_Cookie=E71F747999653943) reason = DEL_REASON_LOAD_BALANCING 31 01:45:13.122 02/25/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 01:45:13.122 02/25/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 01:45:13.122 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 01:45:13.142 02/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 01:45:13.633 02/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1121, dst port 4005 36 01:45:13.633 02/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1121, dst port 4005 37 01:45:13.633 02/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1121 38 01:45:13.633 02/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1121, dst port 4005 39 01:45:13.633 02/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 40 01:45:14.134 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 41 01:45:14.154 02/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 42 01:45:14.174 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 43 01:45:14.344 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 44 01:45:14.344 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 45 01:45:14.344 02/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 01:45:14.344 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 01:45:14.344 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 01:45:14.344 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 01:45:14.344 02/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 01:45:14.344 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 51 01:45:14.344 02/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 01:45:14.344 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 01:45:14.364 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 54 01:45:14.364 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 55 01:45:14.364 02/25/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 01:45:21.084 02/25/06 Sev=Info/4 CM/0x63100017 xAuth application returned 57 01:45:21.084 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 58 01:45:21.084 02/25/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 59 01:45:21.084 02/25/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 60 01:45:21.084 02/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=38AE4AC5357A5F47 R_Cookie=433FCBAAD3736F18) reason = DEL_REASON_RESET_SADB 61 01:45:21.084 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 62 01:45:21.084 02/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=38AE4AC5357A5F47 R_Cookie=433FCBAAD3736F18) reason = DEL_REASON_RESET_SADB 63 01:45:21.124 02/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 64 01:45:21.124 02/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 65 01:45:21.124 02/25/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1121 for TCP connection. 66 01:45:21.134 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 67 01:45:21.134 02/25/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1121 68 01:45:21.134 02/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1121, dst port 4005 69 01:45:21.134 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 70 01:45:21.134 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 71 01:45:21.134 02/25/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 72 01:45:31.018 02/25/06 Sev=Info/4 CM/0x63100002 Begin connection process 73 01:45:31.018 02/25/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xC0A80102 (DRVIFACE:1199). 74 01:45:31.028 02/25/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 75 01:45:31.028 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 76 01:45:31.038 02/25/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1131 for TCP connection. 77 01:45:31.158 02/25/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 78 01:45:31.158 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 79 01:45:31.158 02/25/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 80 01:45:31.158 02/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1131, dst port 4005 81 01:45:31.158 02/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1131 82 01:45:31.158 02/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1131, dst port 4005 83 01:45:31.158 02/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 84 01:45:31.669 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 85 01:45:31.679 02/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 86 01:45:31.709 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 87 01:45:31.879 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 88 01:45:31.879 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 89 01:45:31.879 02/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 90 01:45:31.879 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 91 01:45:31.879 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 92 01:45:31.879 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 93 01:45:31.889 02/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 94 01:45:31.889 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 95 01:45:31.889 02/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 96 01:45:31.889 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 97 01:45:31.909 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 98 01:45:31.909 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 99 01:45:31.909 02/25/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 100 01:45:31.919 02/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B6E7774BCD0DC2CB R_Cookie=C98408F12CA86FD3) reason = DEL_REASON_LOAD_BALANCING 101 01:45:31.919 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 102 01:45:32.650 02/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B6E7774BCD0DC2CB R_Cookie=C98408F12CA86FD3) reason = DEL_REASON_LOAD_BALANCING 103 01:45:32.650 02/25/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 104 01:45:32.650 02/25/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 105 01:45:32.650 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 106 01:45:32.670 02/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 107 01:45:33.161 02/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1131, dst port 4005 108 01:45:33.161 02/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1131, dst port 4005 109 01:45:33.161 02/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1131 110 01:45:33.161 02/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1131, dst port 4005 111 01:45:33.161 02/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 112 01:45:33.652 02/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 113 01:45:33.672 02/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 114 01:45:33.702 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 115 01:45:33.862 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 116 01:45:33.862 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 117 01:45:33.862 02/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 118 01:45:33.862 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 119 01:45:33.862 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 120 01:45:33.862 02/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 121 01:45:33.882 02/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 122 01:45:33.882 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 123 01:45:33.882 02/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 124 01:45:33.882 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 125 01:45:33.902 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 126 01:45:33.902 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 127 01:45:33.902 02/25/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 128 01:45:43.185 02/25/06 Sev=Info/4 CM/0x63100017 xAuth application returned 129 01:45:43.185 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 130 01:45:45.579 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 131 01:45:45.579 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 132 01:45:45.579 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 133 01:45:45.579 02/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 134 01:45:45.709 02/25/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 135 01:45:45.709 02/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 136 01:45:45.709 02/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 137 01:45:45.709 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 138 01:45:46.650 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 139 01:45:46.650 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 140 01:45:46.650 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.18 141 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 142 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 143 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 144 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 145 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 146 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 147 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 148 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 149 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 150 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 151 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 152 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 153 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 154 01:45:46.660 02/25/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 155 01:45:46.660 02/25/06 Sev=Info/4 CM/0x63100019 Mode Config data received 156 01:45:46.710 02/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.18, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 157 01:45:46.710 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 158 01:45:46.710 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 159 01:45:46.710 02/25/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 160 01:45:46.751 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 161 01:45:46.751 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 162 01:45:46.751 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 163 01:45:46.751 02/25/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 13 seconds, setting expiry to 86387 seconds from now 164 01:45:46.771 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 165 01:45:46.771 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 166 01:45:46.771 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 167 01:45:46.771 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 168 01:45:46.771 02/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=09EBC718 OUTBOUND SPI = 0x0A0D25C1 INBOUND SPI = 0x3F41EFAC) 169 01:45:46.771 02/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0A0D25C1 170 01:45:46.771 02/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x3F41EFAC 171 01:45:47.752 02/25/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.18/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 172 01:45:47.762 02/25/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 173 01:45:47.782 02/25/06 Sev=Info/4 CM/0x6310001A One secure connection established 174 01:45:47.792 02/25/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 192.168.1.2, 10.13.32.18. 175 01:45:47.792 02/25/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.18. Current address(es): 192.168.1.3, 192.168.1.2, 10.13.32.18. 176 01:45:48.012 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 177 01:45:48.012 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc1250d0a into key list 178 01:45:48.012 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 179 01:45:48.012 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xacef413f into key list 180 01:45:48.012 02/25/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.18 181 01:45:49.174 02/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xc1250d0a for inbound key with SPI=0xacef413f 182 01:50:34.584 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 183 01:55:34.516 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 184 02:00:35.458 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 185 02:05:36.391 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 186 02:10:36.332 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 187 02:15:36.774 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 188 02:20:37.216 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 189 02:25:37.709 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 190 02:30:38.151 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 191 02:32:52.834 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757687 192 02:32:52.834 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 193 02:32:52.854 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 194 02:32:52.854 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 195 02:32:52.854 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757688, seq# expected = 2702757688 196 02:35:38.583 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 197 02:40:39.005 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 198 02:45:39.447 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 199 02:50:39.378 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 200 02:55:40.271 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 201 02:58:30.015 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757688 202 02:58:30.015 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 02:58:30.035 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 02:58:30.035 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 02:58:30.035 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757689, seq# expected = 2702757689 206 03:00:40.703 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 207 03:05:41.135 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 208 03:10:42.067 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 209 03:15:41.999 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 210 03:20:42.431 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 211 03:25:42.863 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 212 03:30:43.295 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 213 03:35:43.226 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 214 03:40:44.169 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 215 03:45:44.601 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 216 03:50:44.532 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 217 03:55:45.465 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 218 04:00:45.649 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 219 04:05:45.881 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 220 04:10:46.303 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 221 04:15:46.745 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 222 04:20:47.177 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 223 04:25:47.599 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 224 04:30:47.541 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 225 04:35:48.473 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 226 04:40:48.905 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 227 04:45:49.337 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 228 04:50:49.769 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 229 04:55:50.201 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 230 05:00:50.761 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 231 05:05:50.430 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 232 05:10:51.087 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 233 05:15:50.742 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 234 05:20:50.397 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 235 05:25:51.555 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 236 05:30:51.711 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 237 05:35:50.885 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 238 05:40:51.562 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 239 05:45:52.209 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 240 05:50:52.375 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 241 05:55:52.029 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 242 06:00:52.684 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 243 06:02:12.553 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757689 244 06:02:12.553 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 245 06:02:12.573 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 246 06:02:12.573 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 247 06:02:12.573 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757690, seq# expected = 2702757690 248 06:05:52.687 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 249 06:10:53.000 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 250 06:14:12.215 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757690 251 06:14:12.215 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 252 06:14:12.265 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 253 06:14:12.265 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 254 06:14:12.265 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757691, seq# expected = 2702757691 255 06:15:53.324 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 256 06:20:53.648 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 257 06:25:53.972 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 258 06:26:11.491 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757691 259 06:26:11.491 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 260 06:26:11.511 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 261 06:26:11.511 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 262 06:26:11.511 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757692, seq# expected = 2702757692 263 06:30:54.296 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 264 06:35:55.130 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 265 06:38:13.289 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757692 266 06:38:13.289 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 267 06:38:13.319 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 268 06:38:13.319 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 269 06:38:13.319 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757693, seq# expected = 2702757693 270 06:40:54.463 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 271 06:45:55.288 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 272 06:50:10.563 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757693 273 06:50:10.563 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 274 06:50:10.593 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 275 06:50:10.593 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 276 06:50:10.593 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757694, seq# expected = 2702757694 277 06:50:55.121 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 278 06:55:55.836 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 279 07:00:55.878 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 280 07:02:11.818 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757694 281 07:02:11.818 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 282 07:02:11.838 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 283 07:02:11.838 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 284 07:02:11.838 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757695, seq# expected = 2702757695 285 07:05:55.470 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 286 07:10:56.394 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 287 07:14:11.174 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757695 288 07:14:11.174 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 07:14:11.194 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 07:14:11.194 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 07:14:11.194 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757696, seq# expected = 2702757696 292 07:15:56.325 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 293 07:20:57.258 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 294 07:25:57.690 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 295 07:30:58.623 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 296 07:35:58.564 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 297 07:38:14.760 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757696 298 07:38:14.760 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 299 07:38:14.790 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 300 07:38:14.790 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 301 07:38:14.790 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757697, seq# expected = 2702757697 302 07:40:59.497 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 303 07:45:59.428 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 304 07:50:13.804 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757697 305 07:50:13.804 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 306 07:50:13.834 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 307 07:50:13.834 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 308 07:50:13.834 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757698, seq# expected = 2702757698 309 07:50:59.369 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 310 07:56:00.833 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 311 08:01:01.269 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 312 08:06:01.724 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 313 08:09:59.065 02/25/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xc1250d0a is about to expire, requesting a new one 314 08:09:59.065 02/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.18, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 315 08:09:59.065 02/25/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=4BF93C49) Initiator = ID=10.13.32.18 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 316 08:09:59.065 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 317 08:09:59.095 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 318 08:09:59.095 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 319 08:09:59.095 02/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 320 08:09:59.095 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 321 08:09:59.105 02/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=4BF93C49 OUTBOUND SPI = 0x1A310A82 INBOUND SPI = 0x3D7D8AE3) 322 08:09:59.105 02/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x1A310A82 323 08:09:59.105 02/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x3D7D8AE3 324 08:09:59.105 02/25/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 325 08:09:59.586 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 326 08:09:59.586 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x820a311a into key list 327 08:09:59.586 02/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 328 08:09:59.586 02/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe38a7d3d into key list 329 08:10:29.098 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 330 08:10:29.098 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 331 08:10:29.098 02/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = A0D25C1 INBOUND SPI = 3F41EFAC) 332 08:10:29.098 02/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=09EBC718 333 08:10:29.609 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xacef413f 334 08:10:29.609 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xacef413f 335 08:10:29.609 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc1250d0a 336 08:10:29.609 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc1250d0a 337 08:10:59.151 02/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x820a311a for inbound key with SPI=0xe38a7d3d 338 08:11:02.166 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 339 08:14:17.446 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757698 340 08:14:17.446 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 341 08:14:17.466 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 342 08:14:17.466 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 343 08:14:17.466 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757699, seq# expected = 2702757699 344 08:16:02.598 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 345 08:21:03.030 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 346 08:26:03.462 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 347 08:26:12.955 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757699 348 08:26:12.955 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 349 08:26:12.975 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 350 08:26:12.975 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 351 08:26:12.975 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757700, seq# expected = 2702757700 352 08:31:03.884 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 353 08:36:04.326 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 354 08:38:11.509 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757700 355 08:38:11.509 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 356 08:38:11.539 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 357 08:38:11.539 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 358 08:38:11.539 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757701, seq# expected = 2702757701 359 08:41:04.758 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 360 08:41:30.274 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757701 361 08:41:30.274 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 362 08:41:30.304 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 363 08:41:30.304 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 364 08:41:30.304 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757702, seq# expected = 2702757702 365 08:46:05.190 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 366 08:50:11.023 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757702 367 08:50:11.023 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 368 08:50:11.053 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 369 08:50:11.053 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 370 08:50:11.053 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757703, seq# expected = 2702757703 371 08:51:05.622 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 372 08:56:06.054 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 373 09:01:05.996 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 374 09:02:10.594 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757703 375 09:02:10.594 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 376 09:02:10.614 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 09:02:10.614 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 378 09:02:10.614 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757704, seq# expected = 2702757704 379 09:06:06.939 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 380 09:11:07.361 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 381 09:16:07.292 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 382 09:21:07.724 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 383 09:26:08.657 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 384 09:31:08.598 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 385 09:36:09.030 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 386 09:41:09.492 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 387 09:46:10.435 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 388 09:51:10.356 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 389 09:56:11.289 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 390 10:01:10.734 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 391 10:03:57.987 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757704 392 10:03:57.997 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 393 10:03:58.017 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 394 10:03:58.017 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 395 10:03:58.017 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757705, seq# expected = 2702757705 396 10:06:11.679 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 397 10:11:12.121 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 398 10:16:12.553 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 399 10:21:13.005 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 400 10:26:09.431 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757705 401 10:26:09.431 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 402 10:26:09.451 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 403 10:26:09.451 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 404 10:26:09.451 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757706, seq# expected = 2702757706 405 10:26:13.437 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 406 10:31:14.370 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 407 10:34:27.648 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 408 10:35:50.767 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 409 10:35:54.773 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 410 10:35:58.278 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 411 10:35:58.278 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 412 10:35:58.278 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 413 10:36:14.301 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 414 10:36:57.874 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 415 10:36:57.874 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 416 10:36:57.874 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 417 10:36:57.874 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 418 10:36:57.874 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 419 10:36:57.874 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 420 10:37:57.950 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 421 10:37:57.950 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 422 10:37:57.950 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 423 10:38:32.510 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 424 10:38:58.036 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 425 10:38:58.036 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 426 10:38:58.036 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 427 10:38:58.036 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 428 10:38:58.036 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 429 10:38:58.036 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 430 10:39:22.572 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 431 10:41:14.753 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 432 10:43:10.419 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 433 10:43:29.937 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 434 10:46:08.165 02/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 435 10:46:08.165 02/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 436 10:46:08.165 02/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 437 10:46:15.185 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 438 10:51:15.627 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 439 10:56:15.568 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 440 11:01:16.566 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 441 11:06:16.509 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 442 11:07:32.629 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757706 443 11:07:32.629 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 444 11:07:32.659 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 445 11:07:32.659 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 446 11:07:32.659 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757707, seq# expected = 2702757707 447 11:11:14.968 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757707 448 11:11:14.978 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 449 11:11:14.999 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 450 11:11:14.999 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 451 11:11:14.999 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757708, seq# expected = 2702757708 452 11:11:16.971 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 453 11:16:17.914 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 454 11:17:46.542 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757708 455 11:17:46.542 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 456 11:17:46.572 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 457 11:17:46.572 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 458 11:17:46.572 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757709, seq# expected = 2702757709 459 11:21:18.747 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 460 11:25:48.595 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757709 461 11:25:48.595 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 462 11:25:48.625 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 463 11:25:48.625 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 464 11:25:48.625 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757710, seq# expected = 2702757710 465 11:26:19.169 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 466 11:31:19.601 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 467 11:31:50.115 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757710 468 11:31:50.125 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 469 11:31:50.145 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 470 11:31:50.145 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 471 11:31:50.145 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757711, seq# expected = 2702757711 472 11:36:20.043 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 473 11:38:10.672 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757711 474 11:38:10.672 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 475 11:38:10.722 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 476 11:38:10.722 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 477 11:38:10.722 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757712, seq# expected = 2702757712 478 11:41:20.475 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 479 11:43:53.174 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757712 480 11:43:53.174 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 481 11:43:53.214 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 482 11:43:53.214 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 483 11:43:53.214 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757713, seq# expected = 2702757713 484 11:46:20.907 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 485 11:50:10.246 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757713 486 11:50:10.246 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 487 11:50:10.266 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 488 11:50:10.266 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 489 11:50:10.266 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757714, seq# expected = 2702757714 490 11:51:21.349 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 491 11:53:25.527 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757714 492 11:53:25.527 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 493 11:53:25.547 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 494 11:53:25.547 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 495 11:53:25.547 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757715, seq# expected = 2702757715 496 11:56:21.781 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 497 12:01:22.236 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 498 12:02:11.803 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757715 499 12:02:11.803 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 500 12:02:11.823 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 501 12:02:11.823 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 502 12:02:11.823 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757716, seq# expected = 2702757716 503 12:06:22.675 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 504 12:08:29.349 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757716 505 12:08:29.349 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 506 12:08:29.379 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 507 12:08:29.379 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 508 12:08:29.379 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757717, seq# expected = 2702757717 509 12:11:23.130 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 510 12:14:14.378 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757717 511 12:14:14.378 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 512 12:14:14.398 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 513 12:14:14.398 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 514 12:14:14.398 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757718, seq# expected = 2702757718 515 12:16:23.555 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 516 12:21:24.000 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 517 12:26:11.897 02/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2702757718 518 12:26:11.897 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 519 12:26:11.967 02/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 520 12:26:11.967 02/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 521 12:26:11.967 02/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2702757719, seq# expected = 2702757719 522 12:26:24.435 02/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1131, dst port 4005 523 12:28:44.007 02/25/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 524 12:28:44.007 02/25/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 525 12:28:44.007 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 526 12:28:44.007 02/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1A310A82 INBOUND SPI = 3D7D8AE3) 527 12:28:44.007 02/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=4BF93C49 528 12:28:44.007 02/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D62AB9A0D2024A1D R_Cookie=D225B38EBD35B509) reason = DEL_REASON_RESET_SADB 529 12:28:44.007 02/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 530 12:28:44.007 02/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D62AB9A0D2024A1D R_Cookie=D225B38EBD35B509) reason = DEL_REASON_RESET_SADB 531 12:28:44.007 02/25/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 532 12:28:44.007 02/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 533 12:28:44.007 02/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 534 12:28:44.018 02/25/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1131 for TCP connection. 535 12:28:44.018 02/25/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 10:42:57 536 12:28:44.048 02/25/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 537 12:28:46.210 02/25/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 538 12:28:46.220 02/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 539 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe38a7d3d 540 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe38a7d3d 541 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x820a311a 542 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x820a311a 543 12:28:46.250 02/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1131, dst port 4005 544 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 545 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 546 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 547 12:28:46.250 02/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys