EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 22:18:42.243 03/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 22:18:42.343 03/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 22:18:42.343 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 22:18:42.363 03/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1376 for TCP connection. 5 22:18:42.373 03/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 22:18:42.373 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 22:18:42.373 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1376, dst port 4005 8 22:18:43.334 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1376 9 22:18:43.334 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1376, dst port 4005 10 22:18:43.334 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 22:18:43.845 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 22:18:43.865 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 22:18:43.895 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 22:18:44.065 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 22:18:44.065 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 22:18:44.065 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 22:18:44.065 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 22:18:44.065 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 22:18:44.065 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 22:18:44.065 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 22:18:44.065 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 22:18:44.065 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 22:18:44.065 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 22:18:44.095 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 22:18:44.095 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 22:18:44.095 03/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 22:18:44.095 03/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3032A129097CFB6B R_Cookie=D35E86DD42296264) reason = DEL_REASON_LOAD_BALANCING 28 22:18:44.095 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 22:18:44.837 03/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3032A129097CFB6B R_Cookie=D35E86DD42296264) reason = DEL_REASON_LOAD_BALANCING 30 22:18:44.837 03/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 22:18:44.837 03/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 22:18:44.837 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 22:18:44.857 03/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 22:18:45.337 03/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1376, dst port 4005 35 22:18:45.337 03/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1376, dst port 4005 36 22:18:45.337 03/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1376 37 22:18:45.337 03/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1376, dst port 4005 38 22:18:45.337 03/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 22:18:45.838 03/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 22:18:45.858 03/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 22:18:45.888 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 22:18:46.048 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 22:18:46.048 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 22:18:46.048 03/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 22:18:46.048 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 22:18:46.048 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 22:18:46.048 03/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 22:18:46.058 03/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 22:18:46.058 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 22:18:46.058 03/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 22:18:46.058 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 22:18:46.078 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 22:18:46.078 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 22:18:46.078 03/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 22:18:54.591 03/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 22:18:54.591 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 22:18:57.985 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 22:18:57.985 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 22:18:57.985 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 22:18:57.985 03/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 22:18:58.096 03/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 22:18:58.096 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 22:18:58.096 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 22:18:58.096 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 22:18:59.117 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 22:18:59.127 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.76 68 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300005E Client received a firewall reply from concentrator 79 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 80 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 81 22:18:59.127 03/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 82 22:18:59.127 03/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 83 22:18:59.147 03/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.76, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 84 22:18:59.147 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 85 22:18:59.177 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 22:18:59.177 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 22:18:59.177 03/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 22:18:59.177 03/08/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 14 seconds, setting expiry to 86386 seconds from now 89 22:18:59.187 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 22:18:59.187 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 22:18:59.187 03/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 22:18:59.187 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 22:18:59.187 03/08/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=10D73BA8 OUTBOUND SPI = 0x02E7AD9F INBOUND SPI = 0x29824EB0) 94 22:18:59.187 03/08/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x02E7AD9F 95 22:18:59.187 03/08/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x29824EB0 96 22:19:01.380 03/08/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.76/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 22:19:01.440 03/08/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 22:19:01.470 03/08/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 22:19:01.610 03/08/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 192.168.1.2, 10.13.32.76. 100 22:19:01.610 03/08/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.76. Current address(es): 192.168.1.3, 192.168.1.2, 10.13.32.76. 101 22:19:01.890 03/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 102 22:19:01.890 03/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 103 22:19:01.890 03/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 22:19:01.890 03/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9fade702 into key list 105 22:19:01.890 03/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 106 22:19:01.890 03/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb04e8229 into key list 107 22:19:01.890 03/08/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.76 108 22:19:05.866 03/08/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x9fade702 for inbound key with SPI=0xb04e8229 109 22:22:00.738 03/08/06 Sev=Info/4 IPSEC/0x63700005 Packet size greater than ip header 110 22:22:00.738 03/08/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 111 22:22:00.738 03/08/06 Sev=Warning/3 IPSEC/0xA370001C Bad cTCP trailer, Rsvd 29120, Magic# 6951aecbh, trailer len 208, MajorVer 7, MinorVer 167 112 22:22:31.782 03/08/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 113 22:22:31.782 03/08/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 114 22:22:31.782 03/08/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 115 22:22:37.791 03/08/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 116 22:22:39.303 03/08/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 117 22:23:46.590 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 118 22:28:46.611 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 119 22:31:19.030 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622448 120 22:31:19.030 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 121 22:31:19.060 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 122 22:31:19.060 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 123 22:31:19.060 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622449, seq# expected = 2872622449 124 22:33:46.743 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 125 22:38:47.255 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 126 22:43:17.133 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622449 127 22:43:17.133 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 128 22:43:17.153 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 129 22:43:17.153 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 130 22:43:17.153 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622450, seq# expected = 2872622450 131 22:43:47.176 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 132 22:48:48.109 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 133 22:53:48.060 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 134 22:55:14.184 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622450 135 22:55:14.184 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 136 22:55:14.204 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 137 22:55:14.204 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 138 22:55:14.204 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622451, seq# expected = 2872622451 139 22:58:49.003 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 140 23:03:48.924 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 141 23:07:15.251 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622451 142 23:07:15.251 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 143 23:07:15.281 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 144 23:07:15.281 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 145 23:07:15.281 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622452, seq# expected = 2872622452 146 23:08:11.392 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622452 147 23:08:11.392 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 148 23:08:11.422 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 149 23:08:11.422 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 150 23:08:11.422 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622453, seq# expected = 2872622453 151 23:08:21.907 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622453 152 23:08:21.907 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 153 23:08:21.927 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 154 23:08:21.937 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 155 23:08:21.937 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622454, seq# expected = 2872622454 156 23:08:32.422 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622454 157 23:08:32.422 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 158 23:08:32.442 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 159 23:08:32.442 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 160 23:08:32.442 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622455, seq# expected = 2872622455 161 23:08:42.937 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622455 162 23:08:42.937 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 163 23:08:43.237 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 164 23:08:43.237 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 165 23:08:43.237 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622456, seq# expected = 2872622456 166 23:08:48.445 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 167 23:09:13.491 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622456 168 23:09:13.491 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 169 23:09:13.511 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 170 23:09:13.511 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 171 23:09:13.511 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622457, seq# expected = 2872622457 172 23:09:23.996 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622457 173 23:09:23.996 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 174 23:09:24.026 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 175 23:09:24.026 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 176 23:09:24.026 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622458, seq# expected = 2872622458 177 23:13:49.388 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 178 23:18:49.810 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 179 23:19:14.846 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622458 180 23:19:14.846 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 181 23:19:14.866 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 182 23:19:14.866 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 183 23:19:14.866 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622459, seq# expected = 2872622459 184 23:23:49.751 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 185 23:28:50.684 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 186 23:31:19.397 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622459 187 23:31:19.397 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 188 23:31:19.427 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 189 23:31:19.427 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 190 23:31:19.427 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622460, seq# expected = 2872622460 191 23:33:51.116 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 192 23:38:51.548 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 193 23:43:16.929 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622460 194 23:43:16.929 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 195 23:43:16.959 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 196 23:43:16.959 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 197 23:43:16.959 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622461, seq# expected = 2872622461 198 23:43:51.479 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 199 23:48:52.422 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 200 23:53:52.844 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 201 23:55:16.965 03/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622461 202 23:55:16.965 03/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 23:55:16.995 03/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 23:55:16.995 03/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 23:55:16.995 03/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622462, seq# expected = 2872622462 206 23:58:53.306 03/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 207 00:03:53.738 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 208 00:08:53.835 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 209 00:13:54.099 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 210 00:18:54.531 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 211 00:19:21.070 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622462 212 00:19:21.070 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 213 00:19:21.090 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 214 00:19:21.090 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 215 00:19:21.090 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622463, seq# expected = 2872622463 216 00:23:54.603 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 217 00:28:54.715 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 218 00:31:20.424 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622463 219 00:31:20.424 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 220 00:31:20.454 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 221 00:31:20.454 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 222 00:31:20.454 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622464, seq# expected = 2872622464 223 00:33:55.157 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 224 00:38:55.589 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 225 00:43:17.195 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622464 226 00:43:17.195 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 227 00:43:17.215 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 228 00:43:17.215 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 229 00:43:17.215 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622465, seq# expected = 2872622465 230 00:43:55.249 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 231 00:48:56.182 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 232 00:53:56.614 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 233 00:58:57.557 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 234 01:03:57.528 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 235 01:08:57.623 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 236 01:13:57.623 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 237 01:18:57.827 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 238 01:19:20.877 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622465 239 01:19:20.877 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 240 01:19:20.897 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 241 01:19:20.897 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 242 01:19:20.897 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622466, seq# expected = 2872622466 243 01:23:58.040 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 244 01:28:58.293 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 245 01:31:18.678 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622466 246 01:31:18.678 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 01:31:18.708 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 01:31:18.708 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 01:31:18.708 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622467, seq# expected = 2872622467 250 01:33:58.566 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 251 01:38:58.889 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 252 01:43:21.009 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622467 253 01:43:21.009 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 254 01:43:21.029 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 255 01:43:21.029 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 256 01:43:21.029 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622468, seq# expected = 2872622468 257 01:43:58.591 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 258 01:48:59.906 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 259 01:53:59.649 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 260 01:55:23.381 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622468 261 01:55:23.381 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 262 01:55:23.411 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 263 01:55:23.411 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 264 01:55:23.411 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622469, seq# expected = 2872622469 265 01:58:59.992 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 266 02:03:59.734 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 267 02:09:00.403 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 268 02:14:00.612 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 269 02:19:00.530 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 270 02:19:15.542 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622469 271 02:19:15.542 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 272 02:19:15.562 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 273 02:19:15.562 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 274 02:19:15.562 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622470, seq# expected = 2872622470 275 02:24:01.200 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 276 02:24:33.766 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622470 277 02:24:33.766 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 02:24:33.786 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 02:24:33.786 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 02:24:33.786 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622471, seq# expected = 2872622471 281 02:29:01.450 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 282 02:31:18.630 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622471 283 02:31:18.630 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 284 02:31:18.680 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 285 02:31:18.680 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 286 02:31:18.680 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622472, seq# expected = 2872622472 287 02:34:01.820 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 288 02:39:02.261 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 289 02:44:02.621 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 290 02:49:02.450 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 291 02:49:08.455 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622472 292 02:49:08.455 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 293 02:49:08.485 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 294 02:49:08.485 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 295 02:49:08.485 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622473, seq# expected = 2872622473 296 02:54:03.281 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 297 02:59:03.671 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 298 02:59:20.674 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622473 299 02:59:20.674 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 300 02:59:20.694 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 301 02:59:20.694 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 302 02:59:20.694 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622474, seq# expected = 2872622474 303 03:04:04.421 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 304 03:07:21.579 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622474 305 03:07:21.579 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 306 03:07:21.619 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 307 03:07:21.619 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 308 03:07:21.619 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622475, seq# expected = 2872622475 309 03:09:03.660 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 310 03:14:04.401 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 311 03:19:04.691 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 312 03:19:23.706 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622475 313 03:19:23.706 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 314 03:19:23.736 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 315 03:19:23.736 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 316 03:19:23.736 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622476, seq# expected = 2872622476 317 03:24:04.941 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 318 03:29:05.211 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 319 03:31:20.809 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622476 320 03:31:20.809 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 321 03:31:20.829 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 322 03:31:20.829 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 323 03:31:20.829 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622477, seq# expected = 2872622477 324 03:34:05.451 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 325 03:39:05.701 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 326 03:43:17.913 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622477 327 03:43:17.913 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 328 03:43:17.943 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 329 03:43:17.943 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 330 03:43:17.943 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622478, seq# expected = 2872622478 331 03:44:05.471 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 332 03:49:06.741 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 333 03:53:22.476 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622478 334 03:53:22.476 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 335 03:53:22.516 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 336 03:53:22.516 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 337 03:53:22.516 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622479, seq# expected = 2872622479 338 03:54:07.041 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 339 03:59:06.801 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 340 04:04:07.061 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 341 04:09:07.409 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 342 04:14:07.152 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 343 04:19:08.124 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 344 04:24:08.200 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 345 04:24:24.757 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622479 346 04:24:24.757 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 347 04:24:24.777 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 348 04:24:24.777 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 349 04:24:24.777 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622480, seq# expected = 2872622480 350 04:29:08.586 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 351 04:30:48.451 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622480 352 04:30:48.451 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 353 04:30:48.471 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 354 04:30:48.471 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 355 04:30:48.471 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622481, seq# expected = 2872622481 356 04:31:18.597 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622481 357 04:31:18.597 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 358 04:31:18.617 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 359 04:31:18.617 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 360 04:31:18.617 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622482, seq# expected = 2872622482 361 04:34:09.184 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 362 04:39:09.029 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 363 04:43:15.281 03/09/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x9fade702 is about to expire, requesting a new one 364 04:43:15.281 03/09/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.76, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 365 04:43:15.281 03/09/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=D8583DB6) Initiator = ID=10.13.32.76 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 366 04:43:15.281 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 367 04:43:15.311 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 368 04:43:15.311 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 369 04:43:15.311 03/09/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 370 04:43:15.311 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 371 04:43:15.311 03/09/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=D8583DB6 OUTBOUND SPI = 0x646615EC INBOUND SPI = 0xA03700F6) 372 04:43:15.311 03/09/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x646615EC 373 04:43:15.311 03/09/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xA03700F6 374 04:43:15.311 03/09/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 375 04:43:15.782 03/09/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 376 04:43:15.782 03/09/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xec156664 into key list 377 04:43:15.782 03/09/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 378 04:43:15.782 03/09/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf60037a0 into key list 379 04:43:23.314 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622482 380 04:43:23.314 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 381 04:43:23.334 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 382 04:43:23.334 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 383 04:43:23.334 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622483, seq# expected = 2872622483 384 04:43:45.357 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 385 04:43:45.357 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 386 04:43:45.357 03/09/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2E7AD9F INBOUND SPI = 29824EB0) 387 04:43:45.357 03/09/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=10D73BA8 388 04:43:45.387 03/09/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb04e8229 389 04:43:45.387 03/09/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb04e8229 390 04:43:45.387 03/09/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9fade702 391 04:43:45.387 03/09/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9fade702 392 04:43:58.414 03/09/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xec156664 for inbound key with SPI=0xf60037a0 393 04:44:08.944 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 394 04:44:13.958 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622483 395 04:44:13.958 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 396 04:44:13.978 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 397 04:44:13.978 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 398 04:44:13.978 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622484, seq# expected = 2872622484 399 04:49:09.862 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 400 04:54:10.179 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 401 04:59:09.723 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 402 05:04:10.581 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 403 05:07:25.627 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622484 404 05:07:25.627 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 405 05:07:25.647 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 406 05:07:25.647 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 407 05:07:25.647 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622485, seq# expected = 2872622485 408 05:07:36.157 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622485 409 05:07:36.157 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 410 05:07:36.177 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 411 05:07:36.177 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 412 05:07:36.177 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622486, seq# expected = 2872622486 413 05:09:10.426 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 414 05:14:11.003 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 415 05:19:11.360 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 416 05:19:28.910 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622486 417 05:19:28.910 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 418 05:19:28.930 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 419 05:19:28.930 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 420 05:19:28.930 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622487, seq# expected = 2872622487 421 05:24:11.716 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 422 05:29:12.574 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 423 05:31:31.480 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622487 424 05:31:31.480 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 425 05:31:31.511 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 426 05:31:31.511 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 427 05:31:31.511 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622488, seq# expected = 2872622488 428 05:34:12.440 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 429 05:39:12.786 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 430 05:43:39.045 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622488 431 05:43:39.045 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 432 05:43:39.065 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 433 05:43:39.065 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 434 05:43:39.065 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622489, seq# expected = 2872622489 435 05:44:12.641 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 436 05:49:14.001 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 437 05:54:13.856 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 438 05:55:41.606 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622489 439 05:55:41.606 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 440 05:55:41.626 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 441 05:55:41.636 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 442 05:55:41.636 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622490, seq# expected = 2872622490 443 05:59:14.212 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 444 06:04:14.569 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 445 06:07:39.152 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622490 446 06:07:39.152 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 447 06:07:39.192 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 448 06:07:39.192 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 449 06:07:39.192 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622491, seq# expected = 2872622491 450 06:09:14.434 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 451 06:14:15.292 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 452 06:19:15.639 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 453 06:19:46.727 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622491 454 06:19:46.727 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 455 06:19:46.757 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 456 06:19:46.757 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 457 06:19:46.757 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622492, seq# expected = 2872622492 458 06:24:15.995 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 459 06:29:16.853 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 460 06:31:19.202 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622492 461 06:31:19.202 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 462 06:31:19.232 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 463 06:31:19.232 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 464 06:31:19.232 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622493, seq# expected = 2872622493 465 06:31:29.732 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622493 466 06:31:29.732 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 467 06:31:29.762 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 468 06:31:29.762 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 469 06:31:29.762 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622494, seq# expected = 2872622494 470 06:31:45.276 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622494 471 06:31:45.276 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 472 06:31:45.307 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 473 06:31:45.307 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 474 06:31:45.307 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622495, seq# expected = 2872622495 475 06:34:16.708 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 476 06:39:17.065 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 477 06:41:22.422 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622495 478 06:41:22.422 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 479 06:41:22.523 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 480 06:41:22.523 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 481 06:41:22.523 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622496, seq# expected = 2872622496 482 06:43:48.339 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622496 483 06:43:48.339 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 484 06:43:48.369 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 485 06:43:48.369 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 486 06:43:48.369 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622497, seq# expected = 2872622497 487 06:44:16.920 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 488 06:49:17.287 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 489 06:54:18.135 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 490 06:55:50.899 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622497 491 06:55:50.899 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 492 06:55:50.929 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 493 06:55:50.929 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 494 06:55:50.929 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622498, seq# expected = 2872622498 495 06:59:18.993 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 496 07:04:18.848 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 497 07:07:53.470 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622498 498 07:07:53.470 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 499 07:07:53.500 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 500 07:07:53.500 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 501 07:07:53.500 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622499, seq# expected = 2872622499 502 07:09:19.669 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 503 07:14:19.714 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 504 07:19:20.206 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 505 07:19:37.206 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622499 506 07:19:37.206 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 507 07:19:37.236 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 508 07:19:37.236 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 509 07:19:37.236 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622500, seq# expected = 2872622500 510 07:24:20.212 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 511 07:29:20.218 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 512 07:31:39.220 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622500 513 07:31:39.220 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 514 07:31:39.250 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 515 07:31:39.250 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 516 07:31:39.250 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622501, seq# expected = 2872622501 517 07:34:20.224 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 518 07:39:20.240 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 519 07:43:37.255 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622501 520 07:43:37.255 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 521 07:43:37.275 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 522 07:43:37.275 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 523 07:43:37.275 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622502, seq# expected = 2872622502 524 07:44:19.776 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 525 07:49:20.272 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 526 07:51:04.274 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622502 527 07:51:04.274 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 528 07:51:04.294 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 529 07:51:04.294 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 530 07:51:04.294 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622503, seq# expected = 2872622503 531 07:51:14.774 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622503 532 07:51:14.774 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 533 07:51:14.804 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 534 07:51:14.804 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 535 07:51:14.804 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622504, seq# expected = 2872622504 536 07:54:20.778 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 537 07:55:36.279 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622504 538 07:55:36.279 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 539 07:55:36.299 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 540 07:55:36.299 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 541 07:55:36.299 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622505, seq# expected = 2872622505 542 07:59:20.784 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 543 08:01:03.286 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622505 544 08:01:03.286 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 545 08:01:03.306 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 546 08:01:03.306 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 547 08:01:03.306 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622506, seq# expected = 2872622506 548 08:04:20.790 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 549 08:07:35.294 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622506 550 08:07:35.294 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 551 08:07:35.314 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 552 08:07:35.314 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 553 08:07:35.314 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622507, seq# expected = 2872622507 554 08:08:21.508 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622507 555 08:08:21.508 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 556 08:08:21.528 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 557 08:08:21.528 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 558 08:08:21.528 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622508, seq# expected = 2872622508 559 08:08:46.952 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622508 560 08:08:46.952 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 561 08:08:46.982 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 562 08:08:46.982 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 563 08:08:46.982 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622509, seq# expected = 2872622509 564 08:09:20.537 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 565 08:14:21.677 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 566 08:14:47.182 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622509 567 08:14:47.182 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 568 08:14:47.462 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 569 08:14:47.462 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 570 08:14:47.462 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622510, seq# expected = 2872622510 571 08:19:21.439 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 572 08:19:38.979 03/09/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2872622510 573 08:19:38.979 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 574 08:19:39.249 03/09/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 575 08:19:39.249 03/09/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 576 08:19:39.249 03/09/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2872622511, seq# expected = 2872622511 577 08:24:21.627 03/09/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1376, dst port 4005 578 08:27:03.057 03/09/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 579 08:27:03.057 03/09/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 580 08:27:03.057 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 581 08:27:03.057 03/09/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 646615EC INBOUND SPI = A03700F6) 582 08:27:03.067 03/09/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=D8583DB6 583 08:27:03.067 03/09/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=DEDA400A725764E2 R_Cookie=0387230806D8CEE6) reason = DEL_REASON_RESET_SADB 584 08:27:03.067 03/09/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 585 08:27:03.067 03/09/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=DEDA400A725764E2 R_Cookie=0387230806D8CEE6) reason = DEL_REASON_RESET_SADB 586 08:27:03.067 03/09/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 587 08:27:03.067 03/09/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 588 08:27:03.067 03/09/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 589 08:27:03.067 03/09/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1376 for TCP connection. 590 08:27:03.067 03/09/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 10:8:2 591 08:27:03.067 03/09/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 592 08:27:05.078 03/09/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 593 08:27:05.088 03/09/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 594 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf60037a0 595 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf60037a0 596 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xec156664 597 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xec156664 598 08:27:05.088 03/09/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1376, dst port 4005 599 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 600 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 601 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 602 08:27:05.088 03/09/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys