EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 00:46:36.659 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 00:46:36.659 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 00:46:36.659 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 00:46:36.669 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1437 for TCP connection. 5 00:46:36.679 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 00:46:36.679 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 00:46:36.679 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 8 00:46:36.679 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1437, dst port 4005 9 00:46:37.651 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1437 10 00:46:37.651 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1437, dst port 4005 11 00:46:37.651 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 00:46:38.152 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 00:46:38.172 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 00:46:38.192 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 00:46:38.352 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 00:46:38.362 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 00:46:38.362 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 00:46:38.362 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 00:46:38.362 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 00:46:38.362 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 00:46:38.362 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 00:46:38.362 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 00:46:38.362 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 00:46:38.362 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 00:46:38.412 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 00:46:38.412 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 00:46:38.412 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 00:46:38.412 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=15D19C760020B2EA R_Cookie=612454358AE47383) reason = DEL_REASON_LOAD_BALANCING 29 00:46:38.412 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 00:46:39.153 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=15D19C760020B2EA R_Cookie=612454358AE47383) reason = DEL_REASON_LOAD_BALANCING 31 00:46:39.153 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 00:46:39.153 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 00:46:39.153 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 00:46:39.163 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 00:46:39.654 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1437, dst port 4005 36 00:46:39.654 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1437, dst port 4005 37 00:46:39.654 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1437 38 00:46:39.654 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1437, dst port 4005 39 00:46:39.654 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 40 00:46:40.154 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 41 00:46:40.174 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 42 00:46:40.194 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 43 00:46:40.355 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 44 00:46:40.355 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 45 00:46:40.355 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 00:46:40.355 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 00:46:40.355 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 00:46:40.355 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 00:46:40.365 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 00:46:40.365 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 51 00:46:40.365 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 00:46:40.365 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 00:46:40.385 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 54 00:46:40.385 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 55 00:46:40.385 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 00:46:54.926 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 57 00:46:54.926 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 58 00:46:57.309 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 59 00:46:57.309 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 60 00:46:57.309 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 61 00:46:57.309 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 62 00:46:57.349 03/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 63 00:46:57.349 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 64 00:46:57.349 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 65 00:46:57.349 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 66 00:46:58.331 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 67 00:46:58.331 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 68 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.6 69 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 70 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 71 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 72 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 73 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 74 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 75 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 76 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 77 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 78 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 79 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 80 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 81 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 82 00:46:58.341 03/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 83 00:46:58.341 03/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 84 00:46:58.361 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.6, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 85 00:46:58.361 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 86 00:46:58.361 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 87 00:46:58.361 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 88 00:46:58.391 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 89 00:46:58.391 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 90 00:46:58.391 03/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 91 00:46:58.391 03/08/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 18 seconds, setting expiry to 86382 seconds from now 92 00:46:58.391 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 93 00:46:58.391 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 94 00:46:58.391 03/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 95 00:46:58.391 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 96 00:46:58.391 03/08/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=66B4B68D OUTBOUND SPI = 0x13AF9730 INBOUND SPI = 0x9F549AA8) 97 00:46:58.401 03/08/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x13AF9730 98 00:46:58.401 03/08/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x9F549AA8 99 00:47:01.155 03/08/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.6/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 100 00:47:01.195 03/08/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 101 00:47:01.215 03/08/06 Sev=Info/4 CM/0x6310001A One secure connection established 102 00:47:01.225 03/08/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.3, 192.168.1.2, 10.13.32.6. 103 00:47:01.225 03/08/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.6. Current address(es): 192.168.1.3, 192.168.1.2, 10.13.32.6. 104 00:47:01.305 03/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 105 00:47:01.315 03/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3097af13 into key list 106 00:47:01.315 03/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 107 00:47:01.315 03/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa89a549f into key list 108 00:47:01.315 03/08/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.6 109 00:47:02.186 03/08/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x3097af13 for inbound key with SPI=0xa89a549f 110 00:51:41.147 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 111 00:56:41.229 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 112 01:01:41.393 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 113 01:06:41.630 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 114 01:11:42.084 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 115 01:13:00.197 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815788 116 01:13:00.197 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 117 01:13:00.217 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 118 01:13:00.217 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 119 01:13:00.217 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815789, seq# expected = 132815789 120 01:16:42.516 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 121 01:21:42.948 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 122 01:25:02.736 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815789 123 01:25:02.736 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 124 01:25:02.756 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 125 01:25:02.756 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 126 01:25:02.756 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815790, seq# expected = 132815790 127 01:26:43.380 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 128 01:31:44.413 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 129 01:36:44.244 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 130 01:37:04.774 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815790 131 01:37:04.774 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 132 01:37:04.794 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 133 01:37:04.794 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 134 01:37:04.794 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815791, seq# expected = 132815791 135 01:41:45.197 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 136 01:46:45.189 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 137 01:49:03.918 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815791 138 01:49:03.918 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 139 01:49:03.978 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 140 01:49:03.978 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 141 01:49:03.978 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815792, seq# expected = 132815792 142 01:51:45.631 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 143 01:56:46.093 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 144 02:01:06.521 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815792 145 02:01:06.521 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 146 02:01:11.543 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815793 147 02:01:11.543 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 148 02:01:11.563 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 149 02:01:11.563 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 150 02:01:11.563 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815794, seq# expected = 132815794 151 02:01:45.611 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 152 02:06:46.336 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 153 02:11:46.498 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 154 02:13:09.190 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815794 155 02:13:09.190 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 156 02:13:09.210 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 157 02:13:09.210 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 158 02:13:09.210 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815795, seq# expected = 132815795 159 02:16:46.670 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 160 02:21:46.842 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 161 02:25:07.795 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815795 162 02:25:07.795 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 163 02:25:07.885 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 164 02:25:07.885 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 165 02:25:07.885 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815796, seq# expected = 132815796 166 02:26:46.512 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 167 02:31:47.175 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 168 02:36:47.357 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 169 02:37:09.416 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815796 170 02:37:09.416 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 171 02:37:09.436 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 172 02:37:09.436 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 173 02:37:09.436 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815797, seq# expected = 132815797 174 02:41:48.020 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 175 02:46:47.681 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 176 02:49:08.482 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815797 177 02:49:08.482 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 178 02:49:08.502 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 179 02:49:08.502 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 180 02:49:08.502 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815798, seq# expected = 132815798 181 02:51:48.354 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 182 02:56:48.005 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 183 03:01:08.913 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815798 184 03:01:08.913 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 185 03:01:08.953 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 186 03:01:08.953 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 187 03:01:08.953 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815799, seq# expected = 132815799 188 03:01:48.090 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 189 03:06:48.155 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 190 03:07:18.183 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815799 191 03:07:18.203 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 192 03:07:18.223 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 193 03:07:18.233 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 194 03:07:18.233 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815800, seq# expected = 132815800 195 03:10:26.886 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815800 196 03:10:26.886 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 197 03:10:26.906 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 198 03:10:26.906 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 199 03:10:26.906 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815801, seq# expected = 132815801 200 03:11:47.961 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 201 03:13:05.533 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815801 202 03:13:05.533 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 03:13:05.553 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 03:13:05.553 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 03:13:05.553 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815802, seq# expected = 132815802 206 03:16:48.731 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 207 03:21:49.020 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 208 03:24:02.644 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815802 209 03:24:02.644 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 210 03:24:02.674 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 211 03:24:02.674 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 212 03:24:02.674 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815803, seq# expected = 132815803 213 03:25:04.701 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815803 214 03:25:04.701 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 215 03:25:04.722 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 216 03:25:04.722 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 217 03:25:04.722 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815804, seq# expected = 132815804 218 03:26:49.319 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 219 03:31:49.598 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 220 03:36:49.887 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 221 03:41:50.186 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 222 03:43:13.263 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815804 223 03:43:13.263 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 224 03:43:13.283 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 225 03:43:13.283 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 226 03:43:13.283 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815805, seq# expected = 132815805 227 03:46:50.975 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 228 03:48:02.041 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815805 229 03:48:02.041 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 230 03:48:02.061 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 231 03:48:02.061 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 232 03:48:02.061 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815806, seq# expected = 132815806 233 03:49:04.599 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815806 234 03:49:04.599 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 235 03:49:04.619 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 236 03:49:04.619 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 237 03:49:04.619 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815807, seq# expected = 132815807 238 03:51:51.254 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 239 03:56:51.043 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 240 04:01:04.353 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815807 241 04:01:04.353 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 242 04:01:04.374 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 243 04:01:04.374 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 244 04:01:04.374 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815808, seq# expected = 132815808 245 04:01:50.713 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 246 04:06:51.636 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 247 04:11:52.067 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 248 04:13:08.687 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815808 249 04:13:08.687 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 250 04:13:08.707 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 251 04:13:08.707 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 252 04:13:08.707 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815809, seq# expected = 132815809 253 04:16:52.496 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 254 04:21:53.256 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 255 04:25:12.010 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815809 256 04:25:12.010 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 257 04:25:12.040 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 258 04:25:12.040 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 259 04:25:12.040 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815810, seq# expected = 132815810 260 04:26:53.655 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 261 04:31:54.094 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 262 04:36:54.543 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 263 04:37:15.052 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815810 264 04:37:15.052 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 265 04:37:15.072 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 266 04:37:15.072 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 267 04:37:15.072 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815811, seq# expected = 132815811 268 04:39:55.802 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815811 269 04:39:55.802 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 270 04:39:55.832 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 271 04:39:55.832 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 272 04:39:55.832 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815812, seq# expected = 132815812 273 04:40:27.317 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815812 274 04:40:27.317 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 275 04:40:27.337 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 04:40:27.337 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 277 04:40:27.347 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815813, seq# expected = 132815813 278 04:41:54.972 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 279 04:46:55.401 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 280 04:49:15.601 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815813 281 04:49:15.601 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 282 04:49:15.621 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 283 04:49:15.621 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 284 04:49:15.621 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815814, seq# expected = 132815814 285 04:51:55.830 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 286 04:56:56.249 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 287 05:01:16.645 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815814 288 05:01:16.645 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 05:01:16.685 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 05:01:16.685 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 05:01:16.685 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815815, seq# expected = 132815815 292 05:01:56.200 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 293 05:06:57.190 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 294 05:11:57.612 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 295 05:13:13.732 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815815 296 05:13:13.732 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 297 05:13:13.772 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 298 05:13:13.772 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 299 05:13:13.772 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815816, seq# expected = 132815816 300 05:17:01.279 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 301 05:21:57.996 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 302 05:25:12.275 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815816 303 05:25:12.275 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 304 05:25:12.295 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 305 05:25:12.295 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 306 05:25:12.295 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815817, seq# expected = 132815817 307 05:26:58.428 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 308 05:31:58.860 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 309 05:35:07.631 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815817 310 05:35:07.631 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 311 05:35:07.651 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 312 05:35:07.651 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 313 05:35:07.651 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815818, seq# expected = 132815818 314 05:36:58.831 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 315 05:37:11.319 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815818 316 05:37:11.319 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 317 05:37:11.349 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 318 05:37:11.349 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 319 05:37:11.349 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815819, seq# expected = 132815819 320 05:41:59.734 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 321 05:43:21.351 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815819 322 05:43:21.351 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 323 05:43:21.371 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 324 05:43:21.371 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 325 05:43:21.371 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815820, seq# expected = 132815820 326 05:47:00.176 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 327 05:49:09.361 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815820 328 05:49:09.361 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 329 05:49:09.382 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 330 05:49:09.382 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 331 05:49:09.382 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815821, seq# expected = 132815821 332 05:52:00.618 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 333 05:57:01.060 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 334 06:01:11.922 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815821 335 06:01:11.922 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 336 06:01:11.942 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 337 06:01:11.942 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 338 06:01:11.942 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815822, seq# expected = 132815822 339 06:02:01.006 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 340 06:07:01.454 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 341 06:12:02.377 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 342 06:13:10.485 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815822 343 06:13:10.485 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 344 06:13:10.505 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 345 06:13:10.505 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 346 06:13:10.505 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815823, seq# expected = 132815823 347 06:17:02.809 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 348 06:18:28.091 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815823 349 06:18:28.091 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 350 06:18:28.111 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 351 06:18:28.111 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 352 06:18:28.111 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815824, seq# expected = 132815824 353 06:22:02.940 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 354 06:25:12.683 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815824 355 06:25:12.683 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 356 06:25:12.713 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 357 06:25:12.713 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 358 06:25:12.713 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815825, seq# expected = 132815825 359 06:27:03.352 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 360 06:27:59.934 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815825 361 06:27:59.934 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 362 06:27:59.974 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 363 06:27:59.974 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 364 06:27:59.974 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815826, seq# expected = 132815826 365 06:32:03.784 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 366 06:37:04.216 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 367 06:41:13.074 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815826 368 06:41:13.074 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 369 06:41:13.114 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 370 06:41:13.114 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 371 06:41:13.114 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815827, seq# expected = 132815827 372 06:42:04.668 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 373 06:47:05.150 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 374 06:49:16.780 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815827 375 06:49:16.780 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 376 06:49:16.800 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 06:49:16.800 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 378 06:49:16.800 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815828, seq# expected = 132815828 379 06:52:05.532 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 380 06:57:05.964 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 381 07:01:16.827 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815828 382 07:01:16.827 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 383 07:01:16.847 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 384 07:01:16.857 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 385 07:01:16.857 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815829, seq# expected = 132815829 386 07:02:05.911 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 387 07:07:06.899 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 388 07:07:57.933 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815829 389 07:07:57.933 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 390 07:07:57.963 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 391 07:07:57.963 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 392 07:07:57.963 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815830, seq# expected = 132815830 393 07:08:08.448 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815830 394 07:08:08.448 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 395 07:08:08.468 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 396 07:08:08.468 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 397 07:08:08.468 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815831, seq# expected = 132815831 398 07:11:08.647 03/08/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x3097af13 is about to expire, requesting a new one 399 07:11:08.647 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.6, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 400 07:11:08.647 03/08/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=156292C0) Initiator = ID=10.13.32.6 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 401 07:11:08.647 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 402 07:11:09.678 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 403 07:11:09.678 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 404 07:11:09.678 03/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 405 07:11:09.678 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 406 07:11:09.678 03/08/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=156292C0 OUTBOUND SPI = 0x05DE4C63 INBOUND SPI = 0x8E2C65EF) 407 07:11:09.678 03/08/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x05DE4C63 408 07:11:09.678 03/08/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x8E2C65EF 409 07:11:09.678 03/08/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 410 07:11:09.678 03/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 411 07:11:09.678 03/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x634cde05 into key list 412 07:11:09.678 03/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 413 07:11:09.678 03/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xef652c8e into key list 414 07:11:38.660 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 415 07:11:38.660 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 416 07:11:38.660 03/08/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 13AF9730 INBOUND SPI = 9F549AA8) 417 07:11:38.660 03/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=66B4B68D 418 07:11:38.760 03/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa89a549f 419 07:11:38.760 03/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa89a549f 420 07:11:38.760 03/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3097af13 421 07:11:38.760 03/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3097af13 422 07:11:40.252 03/08/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x634cde05 for inbound key with SPI=0xef652c8e 423 07:12:06.801 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 424 07:13:15.399 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815831 425 07:13:15.399 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 426 07:13:15.419 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 427 07:13:15.419 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 428 07:13:15.419 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815832, seq# expected = 132815832 429 07:17:08.224 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 430 07:18:04.315 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815832 431 07:18:04.315 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 432 07:18:04.335 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 433 07:18:04.335 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 434 07:18:04.335 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815833, seq# expected = 132815833 435 07:22:08.175 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 436 07:25:15.455 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815833 437 07:25:15.455 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 438 07:25:15.475 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 439 07:25:15.475 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 440 07:25:15.475 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815834, seq# expected = 132815834 441 07:27:08.117 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 442 07:32:09.059 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 443 07:37:09.491 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 444 07:37:18.004 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815834 445 07:37:18.004 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 446 07:37:18.024 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 447 07:37:18.024 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 448 07:37:18.024 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815835, seq# expected = 132815835 449 07:38:19.091 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815835 450 07:38:19.091 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 451 07:38:19.111 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 452 07:38:19.111 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 453 07:38:19.111 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815836, seq# expected = 132815836 454 07:42:09.933 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 455 07:42:53.496 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815836 456 07:42:53.496 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 457 07:42:53.516 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 458 07:42:53.516 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 459 07:42:53.516 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815837, seq# expected = 132815837 460 07:43:04.011 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815837 461 07:43:04.011 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 462 07:43:04.031 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 463 07:43:04.031 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 464 07:43:04.031 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815838, seq# expected = 132815838 465 07:43:14.526 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815838 466 07:43:14.526 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 467 07:43:14.546 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 468 07:43:14.556 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 469 07:43:14.556 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815839, seq# expected = 132815839 470 07:43:35.056 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815839 471 07:43:35.056 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 472 07:43:35.086 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 473 07:43:35.086 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 474 07:43:35.086 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815840, seq# expected = 132815840 475 07:47:10.115 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 476 07:49:18.309 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815840 477 07:49:18.309 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 478 07:49:18.339 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 479 07:49:18.339 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 480 07:49:18.339 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815841, seq# expected = 132815841 481 07:52:10.557 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 482 07:57:10.999 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 483 07:59:34.716 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 132815841 484 07:59:34.716 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 485 07:59:34.746 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 486 07:59:34.746 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 487 07:59:34.746 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 132815842, seq# expected = 132815842 488 08:02:11.450 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 489 08:07:11.939 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1437, dst port 4005 490 08:09:21.445 03/08/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 491 08:09:21.445 03/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 492 08:09:21.445 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 493 08:09:21.445 03/08/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5DE4C63 INBOUND SPI = 8E2C65EF) 494 08:09:21.445 03/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=156292C0 495 08:09:21.445 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0CCA61B354D5A183 R_Cookie=516018364E5E116E) reason = DEL_REASON_RESET_SADB 496 08:09:21.445 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 497 08:09:21.445 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0CCA61B354D5A183 R_Cookie=516018364E5E116E) reason = DEL_REASON_RESET_SADB 498 08:09:21.445 03/08/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 499 08:09:21.445 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 500 08:09:21.475 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 501 08:09:21.475 03/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1437 for TCP connection. 502 08:09:21.475 03/08/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 7:22:20 503 08:09:21.896 03/08/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 504 08:09:26.072 03/08/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 505 08:09:26.512 03/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 506 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xef652c8e 507 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xef652c8e 508 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x634cde05 509 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x634cde05 510 08:09:26.522 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1437, dst port 4005 511 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 512 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 513 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 514 08:09:26.522 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys