EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 23:14:43.065 02/26/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 23:14:43.095 02/26/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 23:14:43.095 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 23:14:43.145 02/26/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1467 for TCP connection. 5 23:14:43.305 02/26/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 23:14:43.305 02/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 23:14:43.305 02/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1467, dst port 4005 8 23:14:43.305 02/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1467 9 23:14:43.305 02/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1467, dst port 4005 10 23:14:43.305 02/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 23:14:43.817 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 23:14:43.828 02/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 23:14:43.868 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 23:14:44.159 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 23:14:44.159 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 23:14:44.159 02/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 23:14:44.159 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 23:14:44.159 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 23:14:44.159 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 23:14:44.179 02/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 23:14:44.179 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 23:14:44.179 02/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 23:14:44.179 02/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 23:14:44.299 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 23:14:44.299 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 23:14:44.299 02/26/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 23:14:44.299 02/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B353299724BD5B2D R_Cookie=E6738FBCDC638043) reason = DEL_REASON_LOAD_BALANCING 28 23:14:44.329 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 23:14:45.313 02/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B353299724BD5B2D R_Cookie=E6738FBCDC638043) reason = DEL_REASON_LOAD_BALANCING 30 23:14:45.313 02/26/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 23:14:45.313 02/26/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 23:14:45.313 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 23:14:45.333 02/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 23:14:45.333 02/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1467, dst port 4005 35 23:14:45.333 02/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1467, dst port 4005 36 23:14:46.317 02/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1467 37 23:14:46.317 02/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1467, dst port 4005 38 23:14:46.317 02/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 23:14:46.829 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 23:14:46.849 02/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 23:14:46.869 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 23:14:47.141 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 23:14:47.141 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 23:14:47.141 02/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 23:14:47.141 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 23:14:47.141 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 23:14:47.141 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 23:14:47.151 02/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 23:14:47.151 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 23:14:47.151 02/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 23:14:47.151 02/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 23:14:47.271 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 23:14:47.271 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 23:14:47.271 02/26/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 23:15:02.350 02/26/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 23:15:02.350 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 23:15:02.350 02/26/06 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 58 23:15:02.350 02/26/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 59 23:15:02.350 02/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=690E470DB2879948 R_Cookie=8ECE36C281C6C023) reason = DEL_REASON_RESET_SADB 60 23:15:02.350 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 61 23:15:02.350 02/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=690E470DB2879948 R_Cookie=8ECE36C281C6C023) reason = DEL_REASON_RESET_SADB 62 23:15:02.400 02/26/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 63 23:15:02.400 02/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 64 23:15:02.400 02/26/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1467 for TCP connection. 65 23:15:02.410 02/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 66 23:15:02.410 02/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1467, dst port 4005 67 23:15:02.410 02/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 68 23:15:02.410 02/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 69 23:15:02.410 02/26/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 70 23:15:06.145 02/26/06 Sev=Info/4 CM/0x63100002 Begin connection process 71 23:15:06.155 02/26/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 72 23:15:06.155 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 73 23:15:06.215 02/26/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1476 for TCP connection. 74 23:15:06.406 02/26/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 75 23:15:06.406 02/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 23:15:06.406 02/26/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 77 23:15:06.406 02/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1476, dst port 4005 78 23:15:06.406 02/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1476 79 23:15:06.406 02/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1476, dst port 4005 80 23:15:06.406 02/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 81 23:15:06.908 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 82 23:15:06.928 02/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 83 23:15:06.958 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 84 23:15:07.189 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 85 23:15:07.189 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 86 23:15:07.189 02/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 87 23:15:07.189 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 88 23:15:07.189 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 89 23:15:07.189 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 90 23:15:07.199 02/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 91 23:15:07.199 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 92 23:15:07.199 02/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 93 23:15:07.199 02/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 94 23:15:07.280 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 95 23:15:07.280 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 96 23:15:07.280 02/26/06 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 97 23:15:07.280 02/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=4D70C5F63C562B45 R_Cookie=CA8B30F97FD48A50) reason = DEL_REASON_LOAD_BALANCING 98 23:15:07.280 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 99 23:15:07.912 02/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=4D70C5F63C562B45 R_Cookie=CA8B30F97FD48A50) reason = DEL_REASON_LOAD_BALANCING 100 23:15:07.912 02/26/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 101 23:15:07.912 02/26/06 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 102 23:15:07.912 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 103 23:15:07.922 02/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 104 23:15:08.414 02/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1476, dst port 4005 105 23:15:08.414 02/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1476, dst port 4005 106 23:15:08.414 02/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 1476 107 23:15:08.414 02/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 1476, dst port 4005 108 23:15:08.414 02/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 109 23:15:08.916 02/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 110 23:15:08.936 02/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 111 23:15:08.956 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 112 23:15:09.187 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 113 23:15:09.187 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 114 23:15:09.187 02/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 115 23:15:09.187 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 116 23:15:09.187 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 117 23:15:09.187 02/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 118 23:15:09.197 02/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 119 23:15:09.197 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 120 23:15:09.197 02/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 121 23:15:09.197 02/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 122 23:15:09.267 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 123 23:15:09.267 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 124 23:15:09.267 02/26/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 125 23:15:21.907 02/26/06 Sev=Info/4 CM/0x63100017 xAuth application returned 126 23:15:21.907 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 127 23:15:24.447 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 128 23:15:24.447 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 129 23:15:24.447 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 130 23:15:24.447 02/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 131 23:15:24.557 02/26/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 132 23:15:24.557 02/26/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 133 23:15:24.557 02/26/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 134 23:15:24.557 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 135 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 136 23:15:25.531 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 137 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.8.20 138 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 139 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 140 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 141 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 142 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 143 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas East Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 144 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 145 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 146 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 147 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 148 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 149 23:15:25.531 02/26/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 150 23:15:25.541 02/26/06 Sev=Info/4 CM/0x63100019 Mode Config data received 151 23:15:25.541 02/26/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.8.20, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 152 23:15:25.551 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 153 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 154 23:15:25.652 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 155 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 156 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 157 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 158 23:15:25.652 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 159 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 160 23:15:25.652 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 161 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=8ACA66E1 OUTBOUND SPI = 0x5D0AAD83 INBOUND SPI = 0x062C9F72) 162 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x5D0AAD83 163 23:15:25.652 02/26/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x062C9F72 164 23:15:26.734 02/26/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.8.20/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 165 23:15:26.744 02/26/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 166 23:15:26.764 02/26/06 Sev=Info/4 CM/0x6310001A One secure connection established 167 23:15:26.764 02/26/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.1.23.221. Current address(es): 10.1.23.221, 10.4.8.20. 168 23:15:26.764 02/26/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.8.20. Current address(es): 10.1.23.221, 10.4.8.20. 169 23:15:26.864 02/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 170 23:15:26.864 02/26/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 171 23:15:26.864 02/26/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 172 23:15:26.864 02/26/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x83ad0a5d into key list 173 23:15:26.864 02/26/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 174 23:15:26.874 02/26/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x729f2c06 into key list 175 23:15:26.874 02/26/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.8.20 176 23:15:27.485 02/26/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x83ad0a5d for inbound key with SPI=0x729f2c06 177 23:20:09.471 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 178 23:20:56.038 02/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071508 179 23:20:56.038 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 180 23:20:56.108 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 181 23:20:56.108 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 182 23:20:56.108 02/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071509, seq# expected = 1089071509 183 23:25:09.893 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 184 23:30:10.325 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 185 23:35:10.757 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 186 23:40:11.649 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 187 23:45:11.581 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 188 23:50:12.464 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 189 23:55:12.329 02/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 190 23:56:56.234 02/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071509 191 23:56:56.234 02/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 192 23:56:56.304 02/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 193 23:56:56.304 02/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 194 23:56:56.304 02/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071510, seq# expected = 1089071510 195 00:00:12.503 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 196 00:05:12.682 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 197 00:08:54.552 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071510 198 00:08:54.552 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 199 00:08:54.633 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 200 00:08:54.633 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 201 00:08:54.633 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071511, seq# expected = 1089071511 202 00:10:12.358 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 203 00:15:13.038 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 204 00:20:13.216 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 205 00:20:57.891 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071511 206 00:20:57.891 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 207 00:20:57.971 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 208 00:20:57.971 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 209 00:20:57.971 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071512, seq# expected = 1089071512 210 00:25:13.404 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 211 00:30:13.582 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 212 00:32:56.722 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071512 213 00:32:56.722 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 214 00:32:56.802 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 215 00:32:56.802 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 216 00:32:56.802 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071513, seq# expected = 1089071513 217 00:35:13.760 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 218 00:40:14.440 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 219 00:45:00.061 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071513 220 00:45:00.061 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 221 00:45:00.262 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 222 00:45:00.272 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 223 00:45:00.272 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071514, seq# expected = 1089071514 224 00:45:13.614 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 225 00:50:14.819 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 226 00:55:15.321 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 227 00:56:27.242 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071514 228 00:56:27.242 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 229 00:56:32.736 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071515 230 00:56:32.736 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 231 00:56:38.230 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071516 232 00:56:38.230 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 233 00:56:43.724 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071517 234 00:56:43.724 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 235 00:56:49.218 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071518 236 00:56:49.218 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 237 00:56:49.308 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 238 00:56:49.308 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 239 00:56:49.308 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071519, seq# expected = 1089071519 240 01:00:14.999 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 241 01:05:08.687 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071519 242 01:05:08.687 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 243 01:05:08.767 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 244 01:05:08.767 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 245 01:05:08.767 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071520, seq# expected = 1089071520 246 01:05:15.680 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 247 01:08:47.954 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071520 248 01:08:47.954 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 249 01:08:48.034 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 250 01:08:48.034 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 251 01:08:48.034 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071521, seq# expected = 1089071521 252 01:10:15.362 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 253 01:15:16.043 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 254 01:20:15.725 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 255 01:20:42.196 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071521 256 01:20:42.196 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 257 01:20:42.276 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 258 01:20:42.276 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 259 01:20:42.276 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071522, seq# expected = 1089071522 260 01:25:16.406 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 261 01:30:16.088 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 262 01:32:40.934 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071522 263 01:32:40.934 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 264 01:32:41.024 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 265 01:32:41.024 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 266 01:32:41.024 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071523, seq# expected = 1089071523 267 01:35:16.768 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 268 01:40:16.450 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 269 01:44:39.681 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071523 270 01:44:39.681 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 271 01:44:39.761 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 272 01:44:39.761 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 273 01:44:39.761 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071524, seq# expected = 1089071524 274 01:45:16.642 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 275 01:50:17.323 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 276 01:55:17.005 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 277 01:56:38.418 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071524 278 01:56:38.418 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 279 01:56:38.498 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 280 01:56:38.498 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 281 01:56:38.498 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071525, seq# expected = 1089071525 282 02:00:17.196 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 283 02:05:17.378 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 284 02:08:35.168 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071525 285 02:08:35.168 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 286 02:08:35.248 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 287 02:08:35.248 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 288 02:08:35.248 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071526, seq# expected = 1089071526 289 02:10:18.059 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 290 02:15:17.741 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 291 02:20:18.422 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 292 02:20:34.405 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071526 293 02:20:34.405 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 294 02:20:34.485 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 295 02:20:34.485 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 296 02:20:34.485 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071527, seq# expected = 1089071527 297 02:25:18.104 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 298 02:30:18.785 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 299 02:32:33.142 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071527 300 02:32:33.142 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 301 02:32:33.222 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 302 02:32:33.222 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 303 02:32:33.222 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071528, seq# expected = 1089071528 304 02:35:18.467 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 305 02:40:19.148 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 306 02:44:32.379 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071528 307 02:44:32.379 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 308 02:44:32.459 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 309 02:44:32.459 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 310 02:44:32.459 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071529, seq# expected = 1089071529 311 02:45:18.830 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 312 02:50:19.183 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 313 02:55:19.553 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 314 02:56:52.927 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071529 315 02:56:52.927 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 316 02:56:52.997 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 317 02:56:52.997 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 318 02:56:52.997 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071530, seq# expected = 1089071530 319 03:00:19.742 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 320 03:05:05.363 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071530 321 03:05:05.363 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 322 03:05:05.444 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 323 03:05:05.444 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 324 03:05:05.444 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071531, seq# expected = 1089071531 325 03:05:19.429 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 326 03:05:56.062 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071531 327 03:05:56.062 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 328 03:05:56.153 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 329 03:05:56.153 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 330 03:05:56.153 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071532, seq# expected = 1089071532 331 03:08:57.274 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071532 332 03:08:57.274 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 333 03:08:57.354 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 334 03:08:57.354 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 335 03:08:57.354 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071533, seq# expected = 1089071533 336 03:10:19.597 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 337 03:15:20.277 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 338 03:20:20.465 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 339 03:20:55.603 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071533 340 03:20:55.603 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 341 03:20:55.813 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 342 03:20:55.813 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 343 03:20:55.813 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071534, seq# expected = 1089071534 344 03:25:20.643 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 345 03:30:20.821 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 346 03:32:58.941 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071534 347 03:32:58.941 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 348 03:32:59.022 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 349 03:32:59.022 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 350 03:32:59.022 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071535, seq# expected = 1089071535 351 03:35:20.999 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 352 03:40:21.187 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 353 03:42:41.739 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=18019) 354 03:42:47.260 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=33123) 355 03:42:52.280 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=64867) 356 03:42:57.802 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=35684) 357 03:44:58.274 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071535 358 03:44:58.274 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 359 03:44:58.355 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 360 03:44:58.355 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 361 03:44:58.355 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071536, seq# expected = 1089071536 362 03:45:20.863 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 363 03:50:21.717 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 364 03:55:22.548 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 365 03:56:44.228 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071536 366 03:56:44.228 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 367 03:56:44.308 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 368 03:56:44.308 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 369 03:56:44.308 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071537, seq# expected = 1089071537 370 04:00:22.212 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 371 04:05:22.383 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 372 04:08:46.339 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071537 373 04:08:46.339 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 374 04:08:46.419 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 375 04:08:46.429 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 376 04:08:46.429 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071538, seq# expected = 1089071538 377 04:10:22.053 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 378 04:15:22.725 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 379 04:20:23.397 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 380 04:20:43.442 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071538 381 04:20:43.452 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 382 04:20:43.522 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 383 04:20:43.522 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 384 04:20:43.522 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071539, seq# expected = 1089071539 385 04:25:23.568 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 386 04:30:23.238 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 387 04:32:45.556 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071539 388 04:32:45.556 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 389 04:32:45.646 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 390 04:32:45.646 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 391 04:32:45.646 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071540, seq# expected = 1089071540 392 04:35:23.409 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 393 04:37:37.218 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=53093) 394 04:37:42.229 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=24166) 395 04:37:47.741 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=42867) 396 04:37:53.253 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=21108) 397 04:37:58.766 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=50292) 398 04:38:04.278 02/27/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=128.221.195.16 FragId=24693) 399 04:40:24.101 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 400 04:44:47.690 02/27/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 1089071540 401 04:44:47.690 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 402 04:44:47.790 02/27/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 403 04:44:47.790 02/27/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 404 04:44:47.790 02/27/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 1089071541, seq# expected = 1089071541 405 04:45:23.770 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 406 04:50:23.825 02/27/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1476, dst port 4005 407 04:50:46.080 02/27/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 408 04:50:46.080 02/27/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 409 04:50:46.080 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.16 410 04:50:46.080 02/27/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5D0AAD83 INBOUND SPI = 62C9F72) 411 04:50:46.080 02/27/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=8ACA66E1 412 04:50:46.090 02/27/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=22F2AC80583EB0B6 R_Cookie=4BD91E03BAA41324) reason = DEL_REASON_RESET_SADB 413 04:50:46.090 02/27/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.16 414 04:50:46.090 02/27/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=22F2AC80583EB0B6 R_Cookie=4BD91E03BAA41324) reason = DEL_REASON_RESET_SADB 415 04:50:46.090 02/27/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 416 04:50:46.090 02/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 417 04:50:46.120 02/27/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 418 04:50:46.130 02/27/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1476 for TCP connection. 419 04:50:46.130 02/27/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.16 disconnected: duration: 0 days 5:35:20 420 04:50:46.130 02/27/06 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 421 04:50:46.140 02/27/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 422 04:50:51.988 02/27/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 423 04:50:51.988 02/27/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 424 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x729f2c06 425 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x729f2c06 426 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x83ad0a5d 427 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x83ad0a5d 428 04:50:51.988 02/27/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1476, dst port 4005 429 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 430 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 431 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 432 04:50:51.988 02/27/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys