EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 07:01:56.979 03/31/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 07:01:57.050 03/31/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 07:01:57.050 03/31/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 07:01:57.090 03/31/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3047 for TCP connection. 5 07:01:57.100 03/31/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 07:01:57.100 03/31/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 07:01:57.100 03/31/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3047, dst port 4005 8 07:01:58.024 03/31/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3047 9 07:01:58.024 03/31/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3047, dst port 4005 10 07:01:58.024 03/31/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 07:01:58.526 03/31/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 07:01:58.546 03/31/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 07:01:58.596 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 07:01:58.756 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 07:01:58.756 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 07:01:58.756 03/31/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 07:01:58.756 03/31/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 07:01:58.756 03/31/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 07:01:58.756 03/31/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 07:01:58.787 03/31/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 07:01:58.787 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 07:01:58.787 03/31/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 07:01:58.787 03/31/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 07:01:58.817 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 07:01:58.817 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 07:01:58.817 03/31/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 07:01:58.817 03/31/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3ED96DA7E9D2D4DE R_Cookie=CDCC8F39F641224E) reason = DEL_REASON_LOAD_BALANCING 28 07:01:58.817 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 07:01:59.529 03/31/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3ED96DA7E9D2D4DE R_Cookie=CDCC8F39F641224E) reason = DEL_REASON_LOAD_BALANCING 30 07:01:59.529 03/31/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 07:01:59.529 03/31/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 07:01:59.529 03/31/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 07:01:59.550 03/31/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 07:02:00.041 03/31/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3047, dst port 4005 35 07:02:00.041 03/31/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3047, dst port 4005 36 07:02:00.041 03/31/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3047 37 07:02:00.041 03/31/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3047, dst port 4005 38 07:02:00.041 03/31/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 07:02:00.533 03/31/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 07:02:00.553 03/31/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 07:02:00.574 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 07:02:00.744 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 07:02:00.744 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 07:02:00.744 03/31/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 07:02:00.744 03/31/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 07:02:00.744 03/31/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 07:02:00.744 03/31/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 07:02:00.754 03/31/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 07:02:00.754 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 07:02:00.754 03/31/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 07:02:00.754 03/31/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 07:02:00.774 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 07:02:00.774 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 07:02:00.774 03/31/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 07:02:13.193 03/31/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 07:02:13.193 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 07:02:18.313 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 07:02:18.323 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 07:02:18.323 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 07:02:18.323 03/31/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 07:02:18.404 03/31/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 07:02:18.404 03/31/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 07:02:18.404 03/31/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 07:02:18.404 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 07:02:19.438 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.33.20 68 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 07:02:19.438 03/31/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 07:02:19.448 03/31/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 07:02:19.458 03/31/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.33.20, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 07:02:19.458 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 07:02:19.458 03/31/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 07:02:19.458 03/31/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 07:02:19.488 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 07:02:19.488 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 07:02:19.488 03/31/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 07:02:19.488 03/31/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 19 seconds, setting expiry to 86381 seconds from now 89 07:02:19.488 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 07:02:19.488 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 07:02:19.488 03/31/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 07:02:19.488 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 07:02:19.498 03/31/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=DC518DA0 OUTBOUND SPI = 0x39E80EFA INBOUND SPI = 0xD5D63126) 94 07:02:19.498 03/31/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x39E80EFA 95 07:02:19.498 03/31/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xD5D63126 96 07:02:21.365 03/31/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.33.20/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 07:02:21.495 03/31/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 07:02:21.525 03/31/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 07:02:21.535 03/31/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 10.13.33.20. 100 07:02:21.535 03/31/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.33.20. Current address(es): 192.168.1.3, 10.13.33.20. 101 07:02:21.795 03/31/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 07:02:21.795 03/31/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfa0ee839 into key list 103 07:02:21.795 03/31/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 07:02:21.795 03/31/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x2631d6d5 into key list 105 07:02:21.795 03/31/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.33.20 106 07:02:24.118 03/31/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xfa0ee839 for inbound key with SPI=0x2631d6d5 107 07:02:44.147 03/31/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 108 07:07:01.517 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 109 07:09:15.740 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229331 110 07:09:15.740 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 111 07:09:15.770 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 112 07:09:15.770 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 113 07:09:15.770 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229332, seq# expected = 3859229332 114 07:12:02.285 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 115 07:13:52.479 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229332 116 07:13:52.479 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 117 07:13:52.498 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 118 07:13:52.508 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 119 07:13:52.508 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229333, seq# expected = 3859229333 120 07:17:02.214 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 121 07:22:02.889 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 122 07:27:02.575 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 123 07:32:03.245 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 124 07:33:16.040 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229333 125 07:33:16.040 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 126 07:33:16.071 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 127 07:33:16.071 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 128 07:33:16.071 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229334, seq# expected = 3859229334 129 07:37:03.071 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 130 07:42:03.109 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 131 07:45:24.901 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229334 132 07:45:24.901 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 133 07:45:24.931 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 134 07:45:24.931 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 135 07:45:24.931 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229335, seq# expected = 3859229335 136 07:47:03.287 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 137 07:52:03.967 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 138 07:57:03.754 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 139 07:57:28.350 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229335 140 07:57:28.350 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 07:57:28.380 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 07:57:28.380 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 07:57:28.380 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229336, seq# expected = 3859229336 144 08:02:03.420 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 145 08:03:55.359 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229336 146 08:03:55.359 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 147 08:03:55.399 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 148 08:03:55.399 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 149 08:03:55.399 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229337, seq# expected = 3859229337 150 08:07:04.100 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 151 08:12:04.217 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 152 08:17:04.484 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 153 08:21:17.495 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229337 154 08:21:17.495 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 155 08:21:17.555 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 156 08:21:17.555 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 157 08:21:17.555 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229338, seq# expected = 3859229338 158 08:22:05.008 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 159 08:27:06.370 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 160 08:32:06.209 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 161 08:33:54.455 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229338 162 08:33:54.455 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 163 08:33:54.485 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 164 08:33:54.485 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 165 08:33:54.485 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229339, seq# expected = 3859229339 166 08:36:23.267 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229339 167 08:36:23.297 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 168 08:36:23.367 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 169 08:36:23.367 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 170 08:36:23.367 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229340, seq# expected = 3859229340 171 08:37:06.940 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 172 08:42:07.541 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 173 08:45:23.023 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229340 174 08:45:23.023 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 175 08:45:23.053 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 176 08:45:23.053 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 177 08:45:23.053 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229341, seq# expected = 3859229341 178 08:47:06.768 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 179 08:52:06.978 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 180 08:57:07.188 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 181 08:57:24.228 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229341 182 08:57:24.228 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 183 08:57:24.268 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 184 08:57:24.268 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 185 08:57:24.268 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229342, seq# expected = 3859229342 186 09:02:07.398 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 187 09:02:50.510 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229342 188 09:02:50.510 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 189 09:02:50.530 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 190 09:02:50.530 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 191 09:02:50.530 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229343, seq# expected = 3859229343 192 09:03:21.072 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229343 193 09:03:21.072 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 194 09:03:21.102 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 195 09:03:21.102 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 196 09:03:21.102 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229344, seq# expected = 3859229344 197 09:07:07.608 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 198 09:09:28.731 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229344 199 09:09:28.731 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 200 09:09:28.761 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 201 09:09:28.761 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 202 09:09:28.761 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229345, seq# expected = 3859229345 203 09:12:07.892 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 204 09:17:08.050 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 205 09:21:24.286 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229345 206 09:21:24.286 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 207 09:21:24.326 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 208 09:21:24.326 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 209 09:21:24.326 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229346, seq# expected = 3859229346 210 09:22:08.239 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 211 09:23:41.131 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229346 212 09:23:41.131 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 213 09:23:41.161 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 214 09:23:41.161 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 215 09:23:41.161 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229347, seq# expected = 3859229347 216 09:27:08.401 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 217 09:32:08.592 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 218 09:37:09.283 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 219 09:42:08.965 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 220 09:47:09.636 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 221 09:52:09.318 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 222 09:53:37.714 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229347 223 09:53:37.714 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 224 09:53:37.744 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 225 09:53:37.744 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 226 09:53:37.744 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229348, seq# expected = 3859229348 227 09:57:09.499 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 228 09:57:17.491 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229348 229 09:57:17.491 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 230 09:57:17.511 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 231 09:57:17.511 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 232 09:57:17.511 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229349, seq# expected = 3859229349 233 10:02:09.691 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 234 10:07:10.362 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 235 10:09:13.241 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229349 236 10:09:13.241 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 10:09:13.271 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 10:09:13.271 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 10:09:13.271 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229350, seq# expected = 3859229350 240 10:12:10.241 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 241 10:13:39.186 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229350 242 10:13:39.186 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 243 10:13:39.237 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 244 10:13:39.237 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 245 10:13:39.237 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229351, seq# expected = 3859229351 246 10:17:10.842 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 247 10:22:10.526 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 248 10:27:11.206 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 249 10:32:10.882 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 250 10:33:45.242 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229351 251 10:33:45.242 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 252 10:33:45.273 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 253 10:33:45.273 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 254 10:33:45.273 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229352, seq# expected = 3859229352 255 10:33:55.794 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229352 256 10:33:55.794 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 257 10:33:55.824 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 258 10:33:55.824 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 259 10:33:55.824 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229353, seq# expected = 3859229353 260 10:37:11.562 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 261 10:42:11.238 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 262 10:45:18.975 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229353 263 10:45:18.975 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 264 10:45:18.995 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 265 10:45:18.995 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 266 10:45:18.995 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229354, seq# expected = 3859229354 267 10:47:10.914 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 268 10:52:11.594 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 269 10:53:48.475 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229354 270 10:53:48.475 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 271 10:53:48.505 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 272 10:53:48.505 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 273 10:53:48.505 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229355, seq# expected = 3859229355 274 10:57:12.274 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 275 11:02:11.951 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 276 11:02:51.606 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229355 277 11:02:51.606 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 11:02:51.636 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 11:02:51.636 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 11:02:51.636 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229356, seq# expected = 3859229356 281 11:04:22.453 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229356 282 11:04:22.453 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 283 11:04:22.483 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 284 11:04:22.483 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 285 11:04:22.483 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229357, seq# expected = 3859229357 286 11:07:12.620 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 287 11:09:34.678 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229357 288 11:09:34.678 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 11:09:34.708 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 11:09:34.708 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 11:09:34.708 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229358, seq# expected = 3859229358 292 11:12:13.091 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 293 11:17:13.003 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 294 11:21:22.730 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229358 295 11:21:22.730 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 11:21:22.760 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 297 11:21:22.770 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 298 11:21:22.770 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229359, seq# expected = 3859229359 299 11:22:13.666 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 300 11:27:13.378 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 301 11:32:13.560 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 302 11:37:13.751 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 303 11:42:14.432 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 304 11:47:14.104 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 305 11:52:14.295 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 306 11:57:14.976 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 307 11:57:17.474 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229359 308 11:57:17.474 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 309 11:57:17.504 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 310 11:57:17.504 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 311 11:57:17.504 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229360, seq# expected = 3859229360 312 12:02:14.668 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 313 12:02:44.647 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229360 314 12:02:44.647 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 315 12:02:44.677 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 316 12:02:44.677 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 317 12:02:44.677 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229361, seq# expected = 3859229361 318 12:03:39.029 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229361 319 12:03:39.029 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 320 12:03:39.069 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 321 12:03:39.069 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 322 12:03:39.069 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229362, seq# expected = 3859229362 323 12:07:14.790 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 324 12:09:16.661 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229362 325 12:09:16.661 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 326 12:09:16.691 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 327 12:09:16.691 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 328 12:09:16.691 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229363, seq# expected = 3859229363 329 12:12:15.219 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 330 12:17:15.713 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 331 12:21:25.200 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229363 332 12:21:25.200 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 333 12:21:25.240 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 334 12:21:25.240 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 335 12:21:25.240 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229364, seq# expected = 3859229364 336 12:22:15.397 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 337 12:27:16.589 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 338 12:32:16.757 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 339 12:33:28.539 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229364 340 12:33:28.539 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 341 12:33:28.569 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 342 12:33:28.569 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 343 12:33:28.569 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229365, seq# expected = 3859229365 344 12:37:16.433 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 345 12:41:47.005 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229365 346 12:41:47.005 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 347 12:41:47.035 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 348 12:41:47.035 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 349 12:41:47.035 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229366, seq# expected = 3859229366 350 12:41:57.547 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229366 351 12:41:57.547 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 352 12:41:57.577 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 353 12:41:57.577 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 354 12:41:57.577 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229367, seq# expected = 3859229367 355 12:42:13.108 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229367 356 12:42:13.108 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 357 12:42:13.138 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 358 12:42:13.138 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 359 12:42:13.138 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229368, seq# expected = 3859229368 360 12:42:16.120 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 361 12:45:24.358 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229368 362 12:45:24.358 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 363 12:45:24.449 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 364 12:45:24.449 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 365 12:45:24.449 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229369, seq# expected = 3859229369 366 12:47:16.298 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 367 12:52:16.978 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 368 12:57:16.664 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 369 13:02:17.344 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 370 13:07:17.512 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 371 13:12:18.456 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 372 13:13:54.497 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229369 373 13:13:54.497 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 374 13:13:54.526 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 375 13:13:54.526 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 376 13:13:54.526 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229370, seq# expected = 3859229370 377 13:17:18.007 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 378 13:22:18.240 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 379 13:23:49.134 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229370 380 13:23:49.134 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 381 13:23:49.164 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 382 13:23:49.164 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 383 13:23:49.164 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229371, seq# expected = 3859229371 384 13:26:20.983 03/31/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xfa0ee839 is about to expire, requesting a new one 385 13:26:20.983 03/31/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.33.20, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 386 13:26:20.983 03/31/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=4BD92919) Initiator = ID=10.13.33.20 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 387 13:26:20.983 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 388 13:26:21.013 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 389 13:26:21.013 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 390 13:26:21.013 03/31/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 391 13:26:21.013 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 392 13:26:21.013 03/31/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=4BD92919 OUTBOUND SPI = 0x18B99324 INBOUND SPI = 0x502D8961) 393 13:26:21.013 03/31/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x18B99324 394 13:26:21.013 03/31/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x502D8961 395 13:26:21.013 03/31/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 396 13:26:21.562 03/31/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 397 13:26:21.562 03/31/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x2493b918 into key list 398 13:26:21.562 03/31/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 399 13:26:21.562 03/31/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x61892d50 into key list 400 13:26:50.971 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 401 13:26:50.971 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 402 13:26:50.971 03/31/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 39E80EFA INBOUND SPI = D5D63126) 403 13:26:50.971 03/31/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=DC518DA0 404 13:26:50.971 03/31/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x2631d6d5 405 13:26:50.971 03/31/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x2631d6d5 406 13:26:50.971 03/31/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xfa0ee839 407 13:26:50.971 03/31/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xfa0ee839 408 13:26:56.955 03/31/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x2493b918 for inbound key with SPI=0x61892d50 409 13:27:22.797 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 410 13:28:04.563 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229371 411 13:28:04.573 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 412 13:28:04.593 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 413 13:28:04.593 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 414 13:28:04.593 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229372, seq# expected = 3859229372 415 13:32:23.788 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 416 13:37:23.989 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 417 13:41:13.795 03/31/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 418 13:42:24.171 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 419 13:43:30.161 03/31/06 Sev=Info/4 IPSEC/0x63700005 Packet size greater than ip header 420 13:43:30.161 03/31/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 421 13:43:30.161 03/31/06 Sev=Warning/3 IPSEC/0xA370001C Bad cTCP trailer, Rsvd 25016, Magic# 17899adah, trailer len 195, MajorVer 167, MinorVer 123 422 13:47:24.542 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 423 13:52:24.674 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 424 13:57:14.356 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229372 425 13:57:14.356 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 426 13:57:14.396 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 427 13:57:14.396 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 428 13:57:14.396 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229373, seq# expected = 3859229373 429 13:57:25.345 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 430 14:01:36.078 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229373 431 14:01:36.078 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 432 14:01:36.108 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 433 14:01:36.108 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 434 14:01:36.108 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229374, seq# expected = 3859229374 435 14:02:25.027 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 436 14:07:25.717 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 437 14:09:11.116 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229374 438 14:09:11.116 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 439 14:09:11.136 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 440 14:09:11.146 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 441 14:09:11.146 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229375, seq# expected = 3859229375 442 14:12:25.280 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 443 14:17:25.616 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 444 14:21:23.056 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229375 445 14:21:23.056 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 446 14:21:23.097 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 447 14:21:23.097 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 448 14:21:23.097 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229376, seq# expected = 3859229376 449 14:22:25.301 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 450 14:27:26.001 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 451 14:32:26.691 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 452 14:33:22.911 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229376 453 14:33:22.911 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 454 14:33:22.952 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 455 14:33:22.952 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 456 14:33:22.952 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229377, seq# expected = 3859229377 457 14:37:26.387 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 458 14:42:26.555 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 459 14:47:26.743 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 460 14:50:41.016 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229377 461 14:50:41.016 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 462 14:50:41.036 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 463 14:50:41.036 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 464 14:50:41.036 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229378, seq# expected = 3859229378 465 14:51:11.636 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229378 466 14:51:11.636 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 467 14:51:11.656 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 468 14:51:11.656 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 469 14:51:11.656 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229379, seq# expected = 3859229379 470 14:51:57.325 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229379 471 14:51:57.325 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 472 14:51:57.345 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 473 14:51:57.345 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 474 14:51:57.345 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229380, seq# expected = 3859229380 475 14:52:26.429 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 476 14:54:49.491 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229380 477 14:54:49.491 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 478 14:54:49.511 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 479 14:54:49.511 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 480 14:54:49.511 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229381, seq# expected = 3859229381 481 14:57:26.607 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229381 482 14:57:26.607 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 483 14:57:26.637 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 484 14:57:26.637 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 485 14:57:26.637 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229382, seq# expected = 3859229382 486 14:58:52.444 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229382 487 14:58:52.444 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 488 14:58:52.474 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 489 14:58:52.474 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 490 14:58:52.474 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229383, seq# expected = 3859229383 491 15:01:19.541 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229383 492 15:01:19.541 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 493 15:01:19.572 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 494 15:01:19.572 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 495 15:01:19.572 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229384, seq# expected = 3859229384 496 15:01:30.063 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229384 497 15:01:30.063 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 498 15:01:30.103 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 499 15:01:30.103 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 500 15:01:30.103 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229385, seq# expected = 3859229385 501 15:02:27.317 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 502 15:04:22.238 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229385 503 15:04:22.238 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 504 15:04:22.269 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 505 15:04:22.269 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 506 15:04:22.269 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229386, seq# expected = 3859229386 507 15:07:27.716 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 508 15:12:28.066 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 509 15:17:27.945 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 510 15:21:23.282 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229386 511 15:21:23.282 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 512 15:21:27.368 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 513 15:21:27.368 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 514 15:21:27.368 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229387, seq# expected = 3859229387 515 15:22:28.637 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 516 15:27:28.332 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 517 15:32:28.490 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 518 15:33:26.728 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229387 519 15:33:26.728 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 520 15:33:26.758 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 521 15:33:26.758 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 522 15:33:26.758 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229388, seq# expected = 3859229388 523 15:37:29.230 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 524 15:42:29.860 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 525 15:45:30.599 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229388 526 15:45:30.599 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 527 15:45:30.629 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 528 15:45:30.629 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 529 15:45:30.629 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229389, seq# expected = 3859229389 530 15:47:29.586 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 531 15:52:29.764 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 532 15:57:29.962 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 533 15:57:33.486 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229389 534 15:57:33.486 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 535 15:57:33.526 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 536 15:57:33.526 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 537 15:57:33.526 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229390, seq# expected = 3859229390 538 16:02:30.120 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 539 16:07:30.800 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 540 16:09:30.771 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229390 541 16:09:30.771 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 542 16:09:30.811 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 543 16:09:30.811 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 544 16:09:30.811 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229391, seq# expected = 3859229391 545 16:12:30.386 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 546 16:17:30.701 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 547 16:21:26.440 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229391 548 16:21:26.440 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 549 16:21:26.470 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 550 16:21:26.470 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 551 16:21:26.470 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229392, seq# expected = 3859229392 552 16:22:30.871 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 553 16:27:31.053 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 554 16:32:31.344 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 555 16:33:23.789 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229392 556 16:33:23.789 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 557 16:33:23.819 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 558 16:33:23.819 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 559 16:33:23.819 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229393, seq# expected = 3859229393 560 16:37:31.526 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 561 16:42:31.717 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 562 16:47:31.889 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 563 16:52:32.070 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 564 16:57:16.279 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229393 565 16:57:16.279 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 566 16:57:16.319 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 567 16:57:16.319 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 568 16:57:16.319 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229394, seq# expected = 3859229394 569 16:57:32.262 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 570 17:02:32.453 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 571 17:07:33.114 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 572 17:09:14.027 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229394 573 17:09:14.027 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 574 17:09:14.047 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 575 17:09:14.047 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 576 17:09:14.047 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229395, seq# expected = 3859229395 577 17:12:33.443 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 578 17:17:32.965 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 579 17:21:24.873 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229395 580 17:21:24.883 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 581 17:21:24.903 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 582 17:21:24.903 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 583 17:21:24.903 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229396, seq# expected = 3859229396 584 17:22:33.153 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 585 17:27:33.835 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 586 17:32:33.511 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 587 17:33:27.734 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229396 588 17:33:27.734 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 589 17:33:27.754 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 590 17:33:27.754 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 591 17:33:27.754 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229397, seq# expected = 3859229397 592 17:37:34.181 03/31/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3047, dst port 4005 593 17:40:24.349 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229397 594 17:40:24.349 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 595 17:40:24.379 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 596 17:40:24.379 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 597 17:40:24.379 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229398, seq# expected = 3859229398 598 17:40:40.412 03/31/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3859229398 599 17:40:40.412 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 600 17:40:40.442 03/31/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 601 17:40:40.442 03/31/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 602 17:40:40.442 03/31/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3859229399, seq# expected = 3859229399 603 17:41:18.562 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 604 17:41:18.562 03/31/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 18B99324 INBOUND SPI = 502D8961) 605 17:41:18.562 03/31/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=4BD92919 606 17:41:18.562 03/31/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=51996AC8C0A13B68 R_Cookie=B4C56E53E968910F) reason = DEL_REASON_RESET_SADB 607 17:41:18.562 03/31/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 608 17:41:18.562 03/31/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=51996AC8C0A13B68 R_Cookie=B4C56E53E968910F) reason = DEL_REASON_RESET_SADB 609 17:41:18.562 03/31/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 610 17:41:18.562 03/31/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 611 17:41:18.602 03/31/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 612 17:41:18.602 03/31/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 3047 for TCP connection. 613 17:41:18.602 03/31/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 10:38:57 614 17:41:18.612 03/31/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 615 17:41:18.833 03/31/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter