EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 01:59:59.207 03/24/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 01:59:59.308 03/24/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 01:59:59.308 03/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 01:59:59.328 03/24/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1090 for TCP connection. 5 01:59:59.338 03/24/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 01:59:59.338 03/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 01:59:59.338 03/24/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1090, dst port 4005 8 02:00:00.289 03/24/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1090 9 02:00:00.289 03/24/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1090, dst port 4005 10 02:00:00.289 03/24/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 02:00:00.789 03/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 02:00:00.830 03/24/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 02:00:00.860 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 02:00:01.020 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 02:00:01.020 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 02:00:01.020 03/24/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 02:00:01.020 03/24/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 02:00:01.020 03/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 02:00:01.020 03/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 02:00:01.030 03/24/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 02:00:01.030 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 02:00:01.030 03/24/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 02:00:01.030 03/24/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 02:00:01.060 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 02:00:01.060 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 02:00:01.060 03/24/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 02:00:01.060 03/24/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=76321C8836CDC18F R_Cookie=CFC2F1E9A5118BAB) reason = DEL_REASON_LOAD_BALANCING 28 02:00:01.060 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 02:00:01.791 03/24/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=76321C8836CDC18F R_Cookie=CFC2F1E9A5118BAB) reason = DEL_REASON_LOAD_BALANCING 30 02:00:01.791 03/24/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 02:00:01.791 03/24/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 02:00:01.791 03/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 02:00:01.801 03/24/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 02:00:02.291 03/24/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1090, dst port 4005 35 02:00:02.291 03/24/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1090, dst port 4005 36 02:00:02.291 03/24/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1090 37 02:00:02.291 03/24/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1090, dst port 4005 38 02:00:02.291 03/24/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 02:00:02.792 03/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 02:00:02.812 03/24/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 02:00:02.832 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 02:00:02.992 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 02:00:02.992 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 02:00:02.992 03/24/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 02:00:02.992 03/24/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 02:00:02.992 03/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 02:00:02.992 03/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 02:00:03.022 03/24/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 02:00:03.022 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 02:00:03.022 03/24/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 02:00:03.022 03/24/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 02:00:03.052 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 02:00:03.052 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 02:00:03.052 03/24/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 02:00:11.132 03/24/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 02:00:11.132 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 02:00:13.746 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 02:00:13.746 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 02:00:13.746 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 02:00:13.746 03/24/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 02:00:14.036 03/24/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 02:00:14.036 03/24/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 02:00:14.036 03/24/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 02:00:14.036 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 02:00:14.957 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.40 68 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 02:00:14.957 03/24/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 02:00:14.977 03/24/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 02:00:14.987 03/24/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.40, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 02:00:14.997 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 02:00:15.027 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 13 seconds, setting expiry to 86387 seconds from now 87 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 02:00:15.027 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 02:00:15.027 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B6DDBB29 OUTBOUND SPI = 0x0384337B INBOUND SPI = 0x81553831) 92 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0384337B 93 02:00:15.027 03/24/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x81553831 94 02:00:17.040 03/24/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.40/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 02:00:17.070 03/24/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 02:00:17.100 03/24/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 02:00:17.250 03/24/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.32.40. 98 02:00:17.250 03/24/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.40. Current address(es): 192.168.1.4, 10.13.32.40. 99 02:00:17.470 03/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 02:00:17.470 03/24/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 02:00:17.470 03/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 02:00:17.470 03/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7b338403 into key list 103 02:00:17.470 03/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 02:00:17.470 03/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x31385581 into key list 105 02:00:17.470 03/24/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.40 106 02:00:20.815 03/24/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7b338403 for inbound key with SPI=0x31385581 107 02:05:03.722 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 108 02:08:17.010 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059094 109 02:08:17.010 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 110 02:08:17.030 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 111 02:08:17.030 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 112 02:08:17.030 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059095, seq# expected = 2244059095 113 02:10:04.665 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 114 02:15:05.036 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 115 02:20:04.958 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 116 02:20:15.473 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059095 117 02:20:15.473 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 118 02:20:15.513 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 119 02:20:15.513 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 120 02:20:15.513 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059096, seq# expected = 2244059096 121 02:25:04.889 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 122 02:30:05.832 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 123 02:35:06.774 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 124 02:40:07.237 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 125 02:44:18.107 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059096 126 02:44:18.107 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 127 02:44:18.147 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 128 02:44:18.147 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 129 02:44:18.147 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059097, seq# expected = 2244059097 130 02:45:06.687 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 131 02:50:08.121 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 132 02:55:08.052 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 133 02:56:20.156 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059097 134 02:56:20.156 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 135 02:56:20.176 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 136 02:56:20.176 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 137 02:56:20.176 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059098, seq# expected = 2244059098 138 03:00:08.484 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 139 03:04:14.317 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059098 140 03:04:14.317 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 03:04:14.588 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 03:04:14.588 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 03:04:14.588 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059099, seq# expected = 2244059099 144 03:05:08.946 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 145 03:05:10.458 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059099 146 03:05:10.458 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 147 03:05:10.478 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 148 03:05:10.478 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 149 03:05:10.478 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059100, seq# expected = 2244059100 150 03:08:21.272 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059100 151 03:08:21.272 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 152 03:08:21.302 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 153 03:08:21.302 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 154 03:08:21.302 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059101, seq# expected = 2244059101 155 03:10:08.837 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 156 03:15:09.780 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 157 03:18:50.647 03/24/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 158 03:19:54.730 03/24/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 159 03:19:54.730 03/24/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 160 03:19:54.730 03/24/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 161 03:19:58.235 03/24/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 162 03:19:58.235 03/24/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 163 03:19:58.235 03/24/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 164 03:20:09.761 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 165 03:25:10.293 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 166 03:30:10.755 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 167 03:32:17.998 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059101 168 03:32:17.998 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 169 03:32:18.018 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 170 03:32:18.018 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 171 03:32:18.018 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059102, seq# expected = 2244059102 172 03:35:10.777 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 173 03:40:11.039 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 174 03:42:35.787 03/24/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 175 03:42:35.787 03/24/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 176 03:42:35.787 03/24/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 177 03:45:11.040 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 178 03:50:11.051 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 179 03:55:11.493 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 180 04:00:11.565 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 181 04:05:11.665 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 182 04:10:12.263 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 183 04:15:11.849 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 184 04:20:11.946 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 185 04:20:18.459 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059102 186 04:20:18.459 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 187 04:20:18.479 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 188 04:20:18.479 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 189 04:20:18.479 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059103, seq# expected = 2244059103 190 04:25:12.314 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 191 04:30:12.431 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 192 04:35:12.488 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 193 04:40:12.645 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 194 04:44:16.622 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059103 195 04:44:16.622 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 196 04:44:16.643 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 197 04:44:16.643 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 198 04:44:16.643 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059104, seq# expected = 2244059104 199 04:45:12.732 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 200 04:50:12.819 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 201 04:55:12.906 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 202 05:00:13.449 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 203 05:01:11.172 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059104 204 05:01:11.172 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 205 05:01:11.202 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 206 05:01:11.202 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 207 05:01:11.202 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059105, seq# expected = 2244059105 208 05:05:13.903 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 209 05:08:13.091 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059105 210 05:08:13.091 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 211 05:08:13.121 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 212 05:08:13.121 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 213 05:08:13.121 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059106, seq# expected = 2244059106 214 05:10:13.721 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 215 05:15:14.021 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 216 05:20:07.314 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059106 217 05:20:07.314 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 218 05:20:07.345 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 219 05:20:07.345 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 220 05:20:07.345 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059107, seq# expected = 2244059107 221 05:20:13.821 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 222 05:21:35.402 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059107 223 05:21:35.402 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 224 05:21:35.423 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 225 05:21:35.423 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 226 05:21:35.423 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059108, seq# expected = 2244059108 227 05:25:14.631 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 228 05:30:14.931 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 229 05:35:15.231 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 230 05:40:15.542 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 231 05:44:10.276 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059108 232 05:44:10.276 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 233 05:44:10.316 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 234 05:44:10.316 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 235 05:44:10.316 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059109, seq# expected = 2244059109 236 05:45:15.341 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 237 05:50:16.642 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 238 05:55:16.962 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 239 06:00:16.684 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 240 06:05:16.931 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 241 06:08:07.669 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059109 242 06:08:07.669 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 243 06:08:07.699 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 244 06:08:07.699 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 245 06:08:07.699 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059110, seq# expected = 2244059110 246 06:10:17.367 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 247 06:15:17.792 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 248 06:20:14.231 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059110 249 06:20:14.231 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 250 06:20:14.261 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 251 06:20:14.261 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 252 06:20:14.261 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059111, seq# expected = 2244059111 253 06:20:17.726 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 254 06:20:40.759 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059111 255 06:20:40.759 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 256 06:20:40.869 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 257 06:20:40.869 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 258 06:20:40.869 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059112, seq# expected = 2244059112 259 06:25:18.672 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 260 06:30:19.607 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 261 06:32:09.777 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059112 262 06:32:09.777 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 263 06:32:09.807 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 264 06:32:09.807 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 265 06:32:09.807 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059113, seq# expected = 2244059113 266 06:35:19.552 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 267 06:40:19.997 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 268 06:44:10.831 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059113 269 06:44:10.831 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 270 06:44:10.871 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 271 06:44:10.871 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 272 06:44:10.871 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059114, seq# expected = 2244059114 273 06:45:20.432 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 274 06:50:20.877 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 275 06:55:21.812 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 276 06:56:12.396 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059114 277 06:56:12.396 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 06:56:12.416 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 06:56:12.416 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 06:56:12.416 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059115, seq# expected = 2244059115 281 06:56:23.412 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059115 282 06:56:23.412 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 283 06:56:23.432 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 284 06:56:23.432 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 285 06:56:23.432 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059116, seq# expected = 2244059116 286 07:00:21.757 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 287 07:05:22.202 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 288 07:08:09.945 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059116 289 07:08:09.945 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 290 07:08:09.965 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 291 07:08:09.965 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 292 07:08:09.965 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059117, seq# expected = 2244059117 293 07:10:22.647 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 294 07:15:23.072 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 295 07:17:15.234 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059117 296 07:17:15.234 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 297 07:17:15.254 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 298 07:17:15.254 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 299 07:17:15.264 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059118, seq# expected = 2244059118 300 07:17:26.250 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059118 301 07:17:26.260 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 302 07:17:26.280 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 303 07:17:26.280 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 304 07:17:26.280 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059119, seq# expected = 2244059119 305 07:17:36.765 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059119 306 07:17:36.765 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 307 07:17:36.805 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 308 07:17:36.805 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 309 07:17:36.805 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059120, seq# expected = 2244059120 310 07:17:57.806 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059120 311 07:17:57.806 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 312 07:17:57.836 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 313 07:17:57.836 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 314 07:17:57.836 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059121, seq# expected = 2244059121 315 07:20:11.489 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059121 316 07:20:11.489 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 317 07:20:11.519 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 318 07:20:11.519 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 319 07:20:11.519 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059122, seq# expected = 2244059122 320 07:20:23.016 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 321 07:21:53.137 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059122 322 07:21:53.137 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 323 07:21:53.167 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 324 07:21:53.167 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 325 07:21:53.167 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059123, seq# expected = 2244059123 326 07:25:23.942 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 327 07:30:23.876 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 328 07:32:14.536 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059123 329 07:32:14.536 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 330 07:32:14.556 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 331 07:32:14.556 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 332 07:32:14.556 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059124, seq# expected = 2244059124 333 07:35:25.312 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 334 07:40:25.247 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 335 07:44:15.580 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059124 336 07:44:15.580 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 337 07:44:15.610 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 338 07:44:15.610 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 339 07:44:15.610 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059125, seq# expected = 2244059125 340 07:45:25.692 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 341 07:50:26.117 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 342 07:55:26.572 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 343 08:00:26.994 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 344 08:05:27.432 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 345 08:08:15.184 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059125 346 08:08:15.184 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 347 08:08:15.204 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 348 08:08:15.204 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 349 08:08:15.204 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059126, seq# expected = 2244059126 350 08:10:27.864 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 351 08:15:28.797 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 352 08:20:16.220 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059126 353 08:20:16.220 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 354 08:20:16.250 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 355 08:20:16.250 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 356 08:20:16.250 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059127, seq# expected = 2244059127 357 08:20:28.238 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 358 08:24:39.108 03/24/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x7b338403 is about to expire, requesting a new one 359 08:24:39.108 03/24/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.40, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 360 08:24:39.108 03/24/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=24C8F891) Initiator = ID=10.13.32.40 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 361 08:24:39.108 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 362 08:24:39.138 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 363 08:24:39.138 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 364 08:24:39.138 03/24/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 365 08:24:39.138 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 366 08:24:39.138 03/24/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=24C8F891 OUTBOUND SPI = 0x5CB3C07A INBOUND SPI = 0x85F69509) 367 08:24:39.138 03/24/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x5CB3C07A 368 08:24:39.138 03/24/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x85F69509 369 08:24:39.138 03/24/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 370 08:24:40.100 03/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 371 08:24:40.100 03/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7ac0b35c into key list 372 08:24:40.100 03/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 373 08:24:40.100 03/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0995f685 into key list 374 08:25:09.132 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 375 08:25:09.132 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 376 08:25:09.132 03/24/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 384337B INBOUND SPI = 81553831) 377 08:25:09.132 03/24/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B6DDBB29 378 08:25:09.152 03/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x31385581 379 08:25:09.152 03/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x31385581 380 08:25:09.152 03/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7b338403 381 08:25:09.152 03/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7b338403 382 08:25:28.680 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 383 08:25:39.195 03/24/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7ac0b35c for inbound key with SPI=0x0995f685 384 08:30:29.612 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 385 08:32:15.755 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059127 386 08:32:15.755 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 387 08:32:15.825 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 388 08:32:15.825 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 389 08:32:15.825 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059128, seq# expected = 2244059128 390 08:35:30.535 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 391 08:40:30.486 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 392 08:44:15.670 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059128 393 08:44:15.670 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 394 08:44:15.700 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 395 08:44:15.700 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 396 08:44:15.700 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059129, seq# expected = 2244059129 397 08:45:30.277 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 398 08:47:35.457 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059129 399 08:47:35.457 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 400 08:47:35.487 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 401 08:47:35.487 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 402 08:47:35.487 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059130, seq# expected = 2244059130 403 08:50:31.210 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 404 08:54:32.056 03/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2244059130 405 08:54:32.056 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 406 08:54:32.077 03/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 407 08:54:32.077 03/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 408 08:54:32.087 03/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2244059131, seq# expected = 2244059131 409 08:55:31.141 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 410 09:00:32.118 03/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 411 09:02:42.441 03/24/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 412 09:02:42.441 03/24/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 413 09:02:42.441 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 414 09:02:42.441 03/24/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5CB3C07A INBOUND SPI = 85F69509) 415 09:02:42.441 03/24/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=24C8F891 416 09:02:42.441 03/24/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7A1FED97BC6B9E19 R_Cookie=43EB89E6D6560BBD) reason = DEL_REASON_RESET_SADB 417 09:02:42.441 03/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 418 09:02:42.441 03/24/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7A1FED97BC6B9E19 R_Cookie=43EB89E6D6560BBD) reason = DEL_REASON_RESET_SADB 419 09:02:42.441 03/24/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 420 09:02:42.441 03/24/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 421 09:02:42.461 03/24/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 422 09:02:42.461 03/24/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1090 for TCP connection. 423 09:02:42.461 03/24/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 7:2:25 424 09:02:42.691 03/24/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 425 09:02:45.224 03/24/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 426 09:02:45.244 03/24/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 427 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0995f685 428 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0995f685 429 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7ac0b35c 430 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7ac0b35c 431 09:02:45.254 03/24/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1090, dst port 4005 432 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 433 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 434 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 435 09:02:45.254 03/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys