EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 22:20:39.433 04/15/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 22:20:39.553 04/15/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 22:20:39.553 04/15/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 22:20:39.573 04/15/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3409 for TCP connection. 5 22:20:39.583 04/15/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 22:20:39.583 04/15/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 22:20:39.583 04/15/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3409, dst port 4005 8 22:20:40.535 04/15/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3409 9 22:20:40.535 04/15/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3409, dst port 4005 10 22:20:40.535 04/15/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 22:20:41.045 04/15/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 22:20:41.055 04/15/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 22:20:41.095 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 22:20:41.266 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 22:20:41.266 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 22:20:41.266 04/15/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 22:20:41.266 04/15/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 22:20:41.266 04/15/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 22:20:41.266 04/15/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 22:20:41.286 04/15/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 22:20:41.286 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 22:20:41.286 04/15/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 22:20:41.286 04/15/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 22:20:41.306 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 22:20:41.306 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 22:20:41.306 04/15/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 22:20:41.306 04/15/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=902528107674B920 R_Cookie=C50285808CF9F315) reason = DEL_REASON_LOAD_BALANCING 28 22:20:41.306 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 22:20:42.037 04/15/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=902528107674B920 R_Cookie=C50285808CF9F315) reason = DEL_REASON_LOAD_BALANCING 30 22:20:42.037 04/15/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 22:20:42.037 04/15/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 22:20:42.037 04/15/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 22:20:42.057 04/15/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 22:20:42.537 04/15/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3409, dst port 4005 35 22:20:42.537 04/15/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3409, dst port 4005 36 22:20:42.537 04/15/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3409 37 22:20:42.537 04/15/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3409, dst port 4005 38 22:20:42.537 04/15/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 22:20:43.048 04/15/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 22:20:43.058 04/15/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 22:20:43.088 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 22:20:43.269 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 22:20:43.269 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 22:20:43.269 04/15/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 22:20:43.269 04/15/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 22:20:43.269 04/15/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 22:20:43.269 04/15/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 22:20:43.279 04/15/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 22:20:43.279 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 22:20:43.279 04/15/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 22:20:43.279 04/15/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 22:20:43.299 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 22:20:43.299 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 22:20:43.299 04/15/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 22:20:49.928 04/15/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 22:20:49.928 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 22:20:52.312 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 22:20:52.312 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 22:20:52.312 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 22:20:52.312 04/15/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 22:20:52.392 04/15/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 22:20:52.392 04/15/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 22:20:52.392 04/15/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 22:20:52.392 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 22:20:53.283 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.75 68 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 22:20:53.283 04/15/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 22:20:53.293 04/15/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 22:20:53.293 04/15/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 22:20:53.293 04/15/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 22:20:53.293 04/15/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 22:20:53.303 04/15/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.75, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 22:20:53.303 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 22:20:53.303 04/15/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 22:20:53.303 04/15/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 22:20:53.333 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 22:20:53.333 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 22:20:53.333 04/15/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 22:20:53.333 04/15/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 10 seconds, setting expiry to 86390 seconds from now 89 22:20:53.333 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 22:20:53.333 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 22:20:53.333 04/15/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 22:20:53.333 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 22:20:53.333 04/15/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=FE155155 OUTBOUND SPI = 0x4BE8A206 INBOUND SPI = 0x61E59E79) 94 22:20:53.343 04/15/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4BE8A206 95 22:20:53.343 04/15/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x61E59E79 96 22:20:55.897 04/15/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.75/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 22:20:56.147 04/15/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 22:20:56.177 04/15/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 22:20:56.197 04/15/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 10.13.32.75. 100 22:20:56.197 04/15/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.75. Current address(es): 192.168.1.3, 10.13.32.75. 101 22:20:56.607 04/15/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 22:20:56.607 04/15/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x06a2e84b into key list 103 22:20:56.607 04/15/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 22:20:56.607 04/15/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x799ee561 into key list 105 22:20:56.607 04/15/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.75 106 22:21:08.074 04/15/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x06a2e84b for inbound key with SPI=0x799ee561 107 22:25:43.991 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 108 22:30:44.423 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 109 22:35:44.875 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 110 22:38:07.089 04/15/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 111 22:38:07.089 04/15/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 112 22:38:07.089 04/15/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 113 22:38:07.089 04/15/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 114 22:38:07.089 04/15/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 115 22:38:07.089 04/15/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 116 22:40:23.350 04/15/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039899 117 22:40:23.350 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 118 22:40:23.380 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 119 22:40:23.380 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 120 22:40:23.380 04/15/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039900, seq# expected = 1669039900 121 22:40:44.797 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 122 22:45:45.711 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 123 22:50:46.652 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 124 22:53:50.422 04/15/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039900 125 22:53:50.422 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 126 22:53:50.452 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 127 22:53:50.452 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 128 22:53:50.452 04/15/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039901, seq# expected = 1669039901 129 22:55:46.092 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 130 23:00:47.034 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 131 23:05:47.475 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 132 23:10:47.926 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 133 23:15:48.357 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 134 23:20:48.678 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 135 23:21:53.393 04/15/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039901 136 23:21:53.393 04/15/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 137 23:21:53.423 04/15/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 138 23:21:53.423 04/15/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 139 23:21:53.443 04/15/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039902, seq# expected = 1669039902 140 23:25:48.738 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 141 23:30:49.179 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 142 23:35:49.630 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 143 23:40:49.706 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 144 23:45:49.909 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 145 23:50:50.656 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 146 23:55:50.414 04/15/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 147 00:00:50.662 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 148 00:05:51.429 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 149 00:10:52.166 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 150 00:15:51.914 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 151 00:20:52.661 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 152 00:25:52.919 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 153 00:30:52.677 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 154 00:35:53.424 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 155 00:40:53.172 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 156 00:45:53.929 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 157 00:50:53.677 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 158 00:55:54.434 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 159 01:00:54.212 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 160 01:05:55.069 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 161 01:10:54.917 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 162 01:15:55.185 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 163 01:20:55.932 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 164 01:25:45.688 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039902 165 01:25:45.688 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 166 01:25:45.718 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 167 01:25:45.718 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 168 01:25:45.718 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039903, seq# expected = 1669039903 169 01:25:55.680 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 170 01:30:56.467 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 171 01:35:56.265 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 172 01:40:56.713 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 173 01:45:56.759 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 174 01:50:57.721 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 175 01:55:57.690 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 176 02:00:57.648 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 177 02:05:58.589 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 178 02:10:58.507 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 179 02:13:59.059 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039903 180 02:13:59.059 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 181 02:13:59.089 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 182 02:13:59.089 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 183 02:13:59.089 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039904, seq# expected = 1669039904 184 02:15:58.926 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 185 02:20:59.356 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 186 02:25:59.775 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 187 02:31:00.194 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 188 02:33:29.662 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039904 189 02:33:29.662 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 190 02:33:29.692 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 191 02:33:29.692 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 192 02:33:29.692 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039905, seq# expected = 1669039905 193 02:36:00.624 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 194 02:41:01.219 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 195 02:46:01.551 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 196 02:49:14.857 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039905 197 02:49:14.857 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 198 02:49:14.887 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 199 02:49:14.887 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 200 02:49:14.887 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039906, seq# expected = 1669039906 201 02:51:01.763 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 202 02:56:02.005 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 203 03:01:01.707 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 204 03:06:02.397 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 205 03:11:02.109 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 206 03:16:02.311 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 207 03:21:02.992 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 208 03:21:46.446 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039906 209 03:21:46.446 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 210 03:21:46.466 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 211 03:21:46.466 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 212 03:21:46.466 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039907, seq# expected = 1669039907 213 03:26:02.674 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 214 03:31:03.375 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 215 03:36:03.037 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 216 03:37:45.428 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039907 217 03:37:45.428 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 218 03:37:45.458 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 219 03:37:45.458 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 220 03:37:45.458 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039908, seq# expected = 1669039908 221 03:41:03.408 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 222 03:46:03.591 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 223 03:49:59.033 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039908 224 03:49:59.033 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 225 03:49:59.073 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 226 03:49:59.073 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 227 03:49:59.073 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039909, seq# expected = 1669039909 228 03:51:03.295 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 229 03:56:04.005 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 230 04:01:04.685 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 231 04:06:04.371 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 232 04:11:04.570 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 233 04:14:00.299 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039909 234 04:14:00.299 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 235 04:14:00.329 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 236 04:14:00.329 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 237 04:14:00.329 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039910, seq# expected = 1669039910 238 04:16:04.808 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 239 04:21:05.026 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 240 04:26:06.007 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 241 04:31:06.195 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 242 04:33:42.288 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039910 243 04:33:42.298 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 244 04:33:42.318 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 245 04:33:42.318 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 246 04:33:42.318 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039911, seq# expected = 1669039911 247 04:36:06.383 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 248 04:41:06.752 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 249 04:45:00.458 04/16/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x06a2e84b is about to expire, requesting a new one 250 04:45:00.458 04/16/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.75, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 251 04:45:00.458 04/16/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=6629FB47) Initiator = ID=10.13.32.75 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 252 04:45:00.458 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 253 04:45:00.487 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 04:45:00.487 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 255 04:45:00.487 04/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 256 04:45:00.487 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 257 04:45:00.487 04/16/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=6629FB47 OUTBOUND SPI = 0x5EDCB5B1 INBOUND SPI = 0x0C0E54AC) 258 04:45:00.487 04/16/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x5EDCB5B1 259 04:45:00.487 04/16/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x0C0E54AC 260 04:45:00.487 04/16/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 261 04:45:00.987 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 262 04:45:00.987 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb1b5dc5e into key list 263 04:45:00.987 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 264 04:45:00.987 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xac540e0c into key list 265 04:45:30.405 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 266 04:45:30.405 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 267 04:45:30.405 04/16/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4BE8A206 INBOUND SPI = 61E59E79) 268 04:45:30.405 04/16/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=FE155155 269 04:45:30.405 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x799ee561 270 04:45:30.405 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x799ee561 271 04:45:30.405 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x06a2e84b 272 04:45:30.405 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x06a2e84b 273 04:45:40.414 04/16/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xb1b5dc5e for inbound key with SPI=0xac540e0c 274 04:46:06.385 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 275 04:49:47.193 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039911 276 04:49:47.193 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 277 04:49:47.223 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 278 04:49:47.223 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 279 04:49:47.223 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039912, seq# expected = 1669039912 280 04:51:06.619 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 281 04:56:07.339 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 282 05:01:07.521 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 283 05:06:07.712 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 284 05:11:07.904 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 285 05:13:45.736 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039912 286 05:13:45.736 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 287 05:13:45.766 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 288 05:13:45.766 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 289 05:13:45.766 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039913, seq# expected = 1669039913 290 05:16:07.516 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 291 05:21:07.637 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 292 05:26:07.679 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 293 05:31:08.350 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 294 05:36:08.042 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 295 05:37:41.952 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039913 296 05:37:41.952 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 297 05:37:41.972 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 298 05:37:41.972 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 299 05:37:41.972 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039914, seq# expected = 1669039914 300 05:41:08.077 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 301 05:46:08.472 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 302 05:49:54.356 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039914 303 05:49:54.356 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 304 05:49:54.387 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 305 05:49:54.387 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 306 05:49:54.387 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039915, seq# expected = 1669039915 307 05:51:08.658 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 308 05:56:15.693 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 309 06:01:15.680 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 310 06:01:54.834 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039915 311 06:01:54.834 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 312 06:01:54.854 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 313 06:01:54.854 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 314 06:01:54.854 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039916, seq# expected = 1669039916 315 06:06:25.245 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 316 06:11:33.063 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 317 06:13:55.733 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039916 318 06:13:55.733 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 319 06:13:55.763 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 320 06:13:55.763 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 321 06:13:55.763 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039917, seq# expected = 1669039917 322 06:14:41.412 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039917 323 06:14:41.412 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 324 06:14:41.433 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 325 06:14:41.433 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 326 06:14:41.433 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039918, seq# expected = 1669039918 327 06:16:27.328 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 328 06:21:27.044 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 329 06:26:27.403 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 330 06:31:27.601 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 331 06:36:28.311 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 332 06:37:59.168 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039918 333 06:37:59.168 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 334 06:37:59.188 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 335 06:37:59.188 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 336 06:37:59.188 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039919, seq# expected = 1669039919 337 06:41:28.590 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 338 06:42:42.828 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039919 339 06:42:42.828 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 340 06:42:42.848 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 341 06:42:42.848 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 342 06:42:42.848 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039920, seq# expected = 1669039920 343 06:46:28.736 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 344 06:51:28.409 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 345 06:56:28.590 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 346 07:01:28.932 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 347 07:06:29.623 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 348 07:11:29.305 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 349 07:16:29.976 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 350 07:21:29.658 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 351 07:22:13.611 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039920 352 07:22:13.611 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 353 07:22:13.641 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 354 07:22:13.641 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 355 07:22:13.641 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039921, seq# expected = 1669039921 356 07:25:43.388 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039921 357 07:25:43.388 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 358 07:25:43.418 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 359 07:25:43.418 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 360 07:25:43.418 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039922, seq# expected = 1669039922 361 07:26:30.359 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 362 07:31:30.031 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 363 07:36:30.512 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 364 07:41:30.049 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 365 07:46:30.475 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 366 07:49:58.798 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039922 367 07:49:58.798 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 368 07:49:58.828 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 369 07:49:58.828 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 370 07:49:58.828 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039923, seq# expected = 1669039923 371 07:51:30.158 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 372 07:56:30.840 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 373 08:01:30.526 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 374 08:02:00.634 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039923 375 08:02:00.634 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 376 08:02:00.665 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 08:02:00.665 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 378 08:02:00.665 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039924, seq# expected = 1669039924 379 08:06:31.698 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 380 08:11:31.374 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 381 08:14:03.983 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039924 382 08:14:03.983 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 383 08:14:04.023 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 384 08:14:04.023 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 385 08:14:04.023 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039925, seq# expected = 1669039925 386 08:14:54.672 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039925 387 08:14:54.672 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 388 08:14:54.702 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 389 08:14:54.702 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 390 08:14:54.702 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039926, seq# expected = 1669039926 391 08:16:31.050 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 392 08:21:31.730 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 393 08:26:31.919 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 394 08:31:32.087 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 395 08:36:32.767 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 396 08:38:05.631 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039926 397 08:38:05.631 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 398 08:38:05.651 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 399 08:38:05.651 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 400 08:38:05.651 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039927, seq# expected = 1669039927 401 08:41:32.431 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 402 08:46:32.642 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 403 08:49:53.420 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039927 404 08:49:53.420 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 405 08:49:53.440 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 406 08:49:53.440 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 407 08:49:53.440 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039928, seq# expected = 1669039928 408 08:51:32.815 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 409 08:56:33.496 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 410 09:01:33.178 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 411 09:01:52.657 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039928 412 09:01:52.657 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 413 09:01:52.677 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 414 09:01:52.677 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 415 09:01:52.677 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039929, seq# expected = 1669039929 416 09:06:33.859 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 417 09:11:33.541 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 418 09:13:50.396 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039929 419 09:13:50.396 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 420 09:13:50.425 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 421 09:13:50.425 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 422 09:13:50.425 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039930, seq# expected = 1669039930 423 09:16:34.222 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 424 09:21:33.904 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 425 09:26:34.595 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 426 09:31:34.277 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 427 09:36:34.958 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 428 09:41:34.669 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 429 09:46:34.856 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 430 09:50:02.677 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039930 431 09:50:02.677 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 432 09:50:02.708 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 433 09:50:02.708 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 434 09:50:02.708 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039931, seq# expected = 1669039931 435 09:51:34.550 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 436 09:56:35.222 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 437 10:01:35.410 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 438 10:02:06.020 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039931 439 10:02:06.020 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 440 10:02:06.040 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 441 10:02:06.040 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 442 10:02:06.040 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039932, seq# expected = 1669039932 443 10:06:35.588 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 444 10:11:35.756 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 445 10:14:08.857 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039932 446 10:14:08.857 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 447 10:14:08.887 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 448 10:14:08.887 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 449 10:14:08.887 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039933, seq# expected = 1669039933 450 10:16:35.934 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 451 10:21:36.112 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 452 10:26:35.788 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 453 10:31:36.468 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 454 10:36:36.646 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 455 10:41:36.665 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 456 10:46:37.104 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 457 10:51:37.777 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 458 10:56:37.459 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 459 11:01:38.140 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 460 11:06:37.832 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 461 11:08:05.229 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039933 462 11:08:05.229 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 463 11:08:05.249 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 464 11:08:05.249 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 465 11:08:05.249 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039934, seq# expected = 1669039934 466 11:09:15.654 04/16/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xb1b5dc5e is about to expire, requesting a new one 467 11:09:15.654 04/16/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.75, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 468 11:09:15.654 04/16/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=00ED52D4) Initiator = ID=10.13.32.75 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 469 11:09:15.654 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 470 11:09:15.684 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 471 11:09:15.684 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 472 11:09:15.694 04/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 473 11:09:15.694 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 474 11:09:15.694 04/16/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=00ED52D4 OUTBOUND SPI = 0x2862B8BB INBOUND SPI = 0xFC9B159A) 475 11:09:15.694 04/16/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x2862B8BB 476 11:09:15.694 04/16/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xFC9B159A 477 11:09:15.694 04/16/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 478 11:09:16.184 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 479 11:09:16.184 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xbbb86228 into key list 480 11:09:16.184 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 481 11:09:16.184 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9a159bfc into key list 482 11:09:45.602 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 483 11:09:45.612 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 484 11:09:45.612 04/16/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5EDCB5B1 INBOUND SPI = C0E54AC) 485 11:09:45.612 04/16/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=6629FB47 486 11:09:45.612 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xac540e0c 487 11:09:45.612 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xac540e0c 488 11:09:45.612 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb1b5dc5e 489 11:09:45.612 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb1b5dc5e 490 11:09:54.613 04/16/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xbbb86228 for inbound key with SPI=0x9a159bfc 491 11:10:05.102 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039934 492 11:10:05.102 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 493 11:10:05.122 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 494 11:10:05.122 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 495 11:10:05.122 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039935, seq# expected = 1669039935 496 11:11:38.503 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 497 11:16:38.185 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 498 11:19:41.490 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039935 499 11:19:41.490 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 500 11:19:41.510 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 501 11:19:41.510 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 502 11:19:41.510 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039936, seq# expected = 1669039936 503 11:21:38.866 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 504 11:22:47.802 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039936 505 11:22:47.802 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 506 11:22:47.822 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 507 11:22:47.822 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 508 11:22:47.822 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039937, seq# expected = 1669039937 509 11:26:38.548 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 510 11:31:39.229 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 511 11:32:46.158 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039937 512 11:32:46.158 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 513 11:32:46.188 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 514 11:32:46.188 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 515 11:32:46.188 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039938, seq# expected = 1669039938 516 11:36:38.911 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 517 11:41:39.183 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 518 11:46:39.242 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 519 11:50:01.542 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039938 520 11:50:01.552 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 521 11:50:01.573 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 522 11:50:01.573 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 523 11:50:01.573 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039939, seq# expected = 1669039939 524 11:51:38.937 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 525 11:56:39.609 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 526 12:01:39.787 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 527 12:02:04.885 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039939 528 12:02:04.885 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 529 12:02:04.916 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 530 12:02:04.916 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 531 12:02:04.916 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039940, seq# expected = 1669039940 532 12:06:39.975 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 533 12:11:40.143 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 534 12:14:08.224 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039940 535 12:14:08.224 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 536 12:14:08.244 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 537 12:14:08.244 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 538 12:14:08.244 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039941, seq# expected = 1669039941 539 12:16:40.321 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 540 12:21:40.499 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 541 12:26:40.195 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 542 12:31:40.865 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 543 12:36:41.094 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 544 12:38:10.434 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039941 545 12:38:10.434 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 546 12:38:10.454 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 547 12:38:10.454 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 548 12:38:10.454 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039942, seq# expected = 1669039942 549 12:41:41.680 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 550 12:46:41.206 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 551 12:51:41.458 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 552 12:56:41.879 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 553 13:01:42.560 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 554 13:01:59.042 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039942 555 13:01:59.042 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 556 13:01:59.062 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 557 13:01:59.062 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 558 13:01:59.062 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039943, seq# expected = 1669039943 559 13:06:42.432 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 560 13:11:43.053 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 561 13:16:42.755 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 562 13:21:43.436 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 563 13:22:59.855 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039943 564 13:22:59.855 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 565 13:22:59.874 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 566 13:22:59.874 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 567 13:22:59.874 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039944, seq# expected = 1669039944 568 13:26:43.118 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 569 13:31:43.579 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 570 13:36:44.250 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 571 13:41:43.889 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 572 13:46:44.102 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 573 13:51:44.546 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 574 13:56:44.982 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 575 14:01:45.417 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 576 14:02:05.446 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039944 577 14:02:05.446 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 578 14:02:05.466 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 579 14:02:05.466 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 580 14:02:05.466 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039945, seq# expected = 1669039945 581 14:06:45.852 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 582 14:11:46.788 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 583 14:16:46.722 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 584 14:21:47.658 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 585 14:26:47.592 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 586 14:31:48.027 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 587 14:34:44.783 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039945 588 14:34:44.783 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 589 14:34:44.823 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 590 14:34:44.823 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 591 14:34:44.823 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039946, seq# expected = 1669039946 592 14:36:48.963 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 593 14:38:03.070 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039946 594 14:38:03.070 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 595 14:38:03.090 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 596 14:38:03.090 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 597 14:38:03.090 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039947, seq# expected = 1669039947 598 14:41:48.897 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 599 14:46:49.342 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 600 14:50:05.116 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039947 601 14:50:05.116 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 602 14:50:05.136 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 603 14:50:05.136 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 604 14:50:05.136 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039948, seq# expected = 1669039948 605 14:51:49.767 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 606 14:56:50.202 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 607 15:01:50.637 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 608 15:02:01.152 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039948 609 15:02:01.152 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 610 15:02:01.172 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 611 15:02:01.182 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 612 15:02:01.182 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039949, seq# expected = 1669039949 613 15:06:51.072 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 614 15:11:51.507 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 615 15:14:03.198 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039949 616 15:14:03.198 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 617 15:14:03.228 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 618 15:14:03.228 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 619 15:14:03.228 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039950, seq# expected = 1669039950 620 15:16:51.942 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 621 15:21:52.377 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 622 15:23:19.002 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039950 623 15:23:19.002 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 624 15:23:19.022 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 625 15:23:19.032 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 626 15:23:19.032 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039951, seq# expected = 1669039951 627 15:26:53.313 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 628 15:31:53.247 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 629 15:36:53.682 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 630 15:38:02.281 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039951 631 15:38:02.281 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 632 15:38:02.311 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 633 15:38:02.311 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 634 15:38:02.311 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039952, seq# expected = 1669039952 635 15:41:54.114 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 636 15:46:55.050 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 637 15:47:03.062 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039952 638 15:47:03.062 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 639 15:47:03.092 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 640 15:47:03.092 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 641 15:47:03.092 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039953, seq# expected = 1669039953 642 15:48:14.665 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039953 643 15:48:14.665 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 644 15:48:14.695 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 645 15:48:14.695 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 646 15:48:14.695 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039954, seq# expected = 1669039954 647 15:50:01.320 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039954 648 15:50:01.320 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 649 15:50:01.350 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 650 15:50:01.350 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 651 15:50:01.350 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039955, seq# expected = 1669039955 652 15:51:54.984 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 653 15:56:55.419 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 654 16:01:55.854 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 655 16:02:00.361 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039955 656 16:02:00.361 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 657 16:02:00.381 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 658 16:02:00.391 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 659 16:02:00.391 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039956, seq# expected = 1669039956 660 16:06:56.289 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 661 16:11:56.724 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 662 16:14:03.418 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039956 663 16:14:03.418 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 664 16:14:03.448 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 665 16:14:03.448 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 666 16:14:03.448 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039957, seq# expected = 1669039957 667 16:16:57.169 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 668 16:18:41.831 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039957 669 16:18:41.831 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 670 16:18:41.851 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 671 16:18:41.861 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 672 16:18:41.861 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039958, seq# expected = 1669039958 673 16:21:57.624 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 674 16:26:57.629 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 675 16:31:58.064 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 676 16:34:57.834 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039958 677 16:34:57.834 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 678 16:34:57.874 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 679 16:34:57.874 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 680 16:34:57.874 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039959, seq# expected = 1669039959 681 16:36:58.509 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 682 16:37:58.596 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039959 683 16:37:58.596 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 684 16:37:58.636 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 685 16:37:58.636 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 686 16:37:58.636 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039960, seq# expected = 1669039960 687 16:41:58.949 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 688 16:46:59.862 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 689 16:50:00.633 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039960 690 16:50:00.633 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 691 16:50:00.653 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 692 16:50:00.653 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 693 16:50:00.653 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039961, seq# expected = 1669039961 694 16:52:01.328 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 695 16:57:00.742 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 696 17:02:00.706 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 697 17:02:01.217 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039961 698 17:02:01.217 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 699 17:02:01.247 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 700 17:02:01.247 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 701 17:02:01.247 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039962, seq# expected = 1669039962 702 17:07:01.131 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 703 17:12:02.137 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 704 17:17:02.542 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 705 17:17:07.048 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039962 706 17:17:07.048 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 707 17:17:07.098 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 708 17:17:07.098 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 709 17:17:07.098 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039963, seq# expected = 1669039963 710 17:22:03.027 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 711 17:25:56.855 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1669039963 712 17:25:56.855 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 713 17:25:56.885 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 714 17:25:56.885 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 715 17:25:56.885 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1669039964, seq# expected = 1669039964 716 17:27:03.462 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 717 17:32:03.907 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 718 17:32:45.457 04/16/06 Sev=Info/4 IKE/0x6300007C Initiating IKE SA rekey: I_Cookie=A89113076D429FC4 R_Cookie=0000000000000000 719 17:32:45.477 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 720 17:32:45.647 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 721 17:32:45.647 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 722 17:32:45.647 04/16/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 723 17:32:45.647 04/16/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 724 17:32:45.647 04/16/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 725 17:32:45.647 04/16/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 726 17:32:45.667 04/16/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 727 17:32:45.667 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, VID(?), VID(Unity)) to 137.69.115.17 728 17:32:45.667 04/16/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 2 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 729 17:32:45.697 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 730 17:32:45.697 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 731 17:32:45.697 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 732 17:32:45.697 04/16/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 2 Crypto Active IKE SA, 2 User Authenticated IKE SA in the system 733 17:32:45.717 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 734 17:32:45.717 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 735 17:32:45.717 04/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 736 17:32:45.717 04/16/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 0 seconds, setting expiry to 86400 seconds from now 737 17:33:26.016 04/16/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xbbb86228 is about to expire, requesting a new one 738 17:33:26.016 04/16/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.75, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 739 17:33:26.016 04/16/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=72612A50) Initiator = ID=10.13.32.75 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 740 17:33:26.026 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 741 17:33:26.056 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 742 17:33:26.056 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 743 17:33:26.056 04/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 744 17:33:26.056 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 745 17:33:26.056 04/16/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=72612A50 OUTBOUND SPI = 0x42D36068 INBOUND SPI = 0x6903843E) 746 17:33:26.056 04/16/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x42D36068 747 17:33:26.056 04/16/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x6903843E 748 17:33:26.056 04/16/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 749 17:33:27.007 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 750 17:33:27.007 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x6860d342 into key list 751 17:33:27.007 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 752 17:33:27.007 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3e840369 into key list 753 17:33:56.069 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 754 17:33:56.069 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 755 17:33:56.069 04/16/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2862B8BB INBOUND SPI = FC9B159A) 756 17:33:56.079 04/16/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=00ED52D4 757 17:33:56.079 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 758 17:33:56.079 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 137.69.115.17 759 17:33:56.079 04/16/06 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 3 --> PEER_DELETE-IKE_DELETE_BY_EXPIRED_LIFETIME. 760 17:33:56.079 04/16/06 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=7B6DB96279FAB816 R_Cookie=ECCFCE1BDA7CC725 761 17:33:56.089 04/16/06 Sev=Info/4 IKE/0x6300007E Transferring QM centry MsgID=00ED52D4 to SA(I_Cookie=A89113076D429FC4 R_Cookie=6EC2B0D419EC4389) 762 17:33:56.089 04/16/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7B6DB96279FAB816 R_Cookie=ECCFCE1BDA7CC725) reason = PEER_DELETE-IKE_DELETE_BY_EXPIRED_LIFETIME 763 17:33:57.071 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9a159bfc 764 17:33:57.071 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9a159bfc 765 17:33:57.071 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xbbb86228 766 17:33:57.071 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xbbb86228 767 17:33:57.071 04/16/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7B6DB96279FAB816 R_Cookie=ECCFCE1BDA7CC725) reason = PEER_DELETE-IKE_DELETE_BY_EXPIRED_LIFETIME 768 17:33:57.071 04/16/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by PEER_DELETE-IKE_DELETE_BY_EXPIRED_LIFETIME. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 769 17:33:59.554 04/16/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x6860d342 for inbound key with SPI=0x3e840369 770 17:37:04.352 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 771 17:37:58.901 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2715808422 772 17:37:58.901 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 773 17:37:58.921 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 774 17:37:58.921 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 775 17:37:58.921 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2715808423, seq# expected = 2715808423 776 17:42:04.289 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 777 17:47:05.261 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 778 17:50:01.526 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2715808423 779 17:50:01.526 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 780 17:50:01.556 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 781 17:50:01.556 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 782 17:50:01.556 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2715808424, seq# expected = 2715808424 783 17:52:05.706 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 784 17:57:06.141 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 785 18:01:57.052 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2715808424 786 18:01:57.052 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 787 18:01:57.102 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 788 18:01:57.102 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 789 18:01:57.102 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2715808425, seq# expected = 2715808425 790 18:02:06.586 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 791 18:07:06.320 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 792 18:12:06.755 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 793 18:17:07.190 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 794 18:19:50.927 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2715808425 795 18:19:50.937 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 796 18:19:50.957 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 797 18:19:50.957 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 798 18:19:50.957 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2715808426, seq# expected = 2715808426 799 18:22:07.134 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 800 18:25:59.461 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2715808426 801 18:25:59.461 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 802 18:25:59.491 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 803 18:25:59.491 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 804 18:25:59.491 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2715808427, seq# expected = 2715808427 805 18:27:07.559 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 806 18:32:08.505 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 807 18:37:08.930 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 808 18:37:57.009 04/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2715808427 809 18:37:57.009 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 810 18:37:57.040 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 811 18:37:57.040 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 812 18:37:57.040 04/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2715808428, seq# expected = 2715808428 813 18:42:09.362 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 814 18:47:10.291 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 815 18:52:10.235 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 816 18:57:10.710 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 817 19:02:11.676 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 818 19:07:11.641 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 819 19:12:12.106 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 820 19:17:12.551 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 821 19:22:13.016 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 822 19:27:13.180 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 823 19:32:13.555 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 824 19:37:27.690 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 825 19:42:24.294 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 826 19:47:24.730 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 827 19:52:27.698 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 828 19:57:28.133 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 829 20:02:38.983 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 830 20:07:36.544 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 831 20:12:36.558 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 832 20:17:36.913 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 833 20:22:37.368 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 834 20:27:37.803 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 835 20:32:38.739 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 836 20:37:39.184 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 837 20:42:39.121 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 838 20:47:40.036 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 839 20:52:40.481 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 840 20:57:40.906 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 841 21:02:40.840 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 842 21:07:40.865 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 843 21:12:41.801 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 844 21:17:41.755 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 845 21:22:42.691 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 846 21:27:43.126 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 847 21:32:43.571 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 848 21:37:44.016 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 849 21:42:43.991 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 850 21:47:43.967 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 851 21:52:44.402 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 852 21:57:44.837 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 853 21:58:53.447 04/16/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 854 22:02:45.783 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 855 22:07:45.757 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 856 22:12:46.202 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 857 22:17:46.647 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 858 22:22:47.112 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 859 22:27:47.037 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 860 22:32:47.522 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 861 22:37:48.457 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 862 22:42:48.919 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 863 22:47:49.399 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 864 22:52:49.854 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 865 22:57:50.319 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 866 23:02:51.244 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 867 23:07:51.189 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 868 23:12:52.124 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 869 23:17:52.059 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 870 23:22:52.013 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 871 23:23:58.159 04/16/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 872 23:23:58.159 04/16/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 873 23:23:58.159 04/16/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 874 23:27:52.588 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 875 23:32:53.073 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 876 23:37:53.088 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 877 23:42:53.534 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 878 23:47:53.448 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 879 23:52:53.953 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 880 23:57:28.421 04/16/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x6860d342 is about to expire, requesting a new one 881 23:57:28.421 04/16/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.75, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 882 23:57:28.421 04/16/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=9AFB3C72) Initiator = ID=10.13.32.75 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 883 23:57:28.421 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 884 23:57:28.501 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 885 23:57:28.501 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 886 23:57:28.501 04/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 887 23:57:28.501 04/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 888 23:57:28.501 04/16/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=9AFB3C72 OUTBOUND SPI = 0x519125BC INBOUND SPI = 0x543E87FD) 889 23:57:28.501 04/16/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x519125BC 890 23:57:28.501 04/16/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x543E87FD 891 23:57:28.501 04/16/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 892 23:57:29.061 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 893 23:57:29.061 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xbc259151 into key list 894 23:57:29.061 04/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 895 23:57:29.061 04/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfd873e54 into key list 896 23:57:53.937 04/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 897 23:57:58.444 04/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 898 23:57:58.444 04/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 899 23:57:58.444 04/16/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 42D36068 INBOUND SPI = 6903843E) 900 23:57:58.444 04/16/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=72612A50 901 23:57:58.965 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3e840369 902 23:57:58.965 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3e840369 903 23:57:58.965 04/16/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x6860d342 904 23:57:58.965 04/16/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x6860d342 905 23:58:02.951 04/16/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xbc259151 for inbound key with SPI=0xfd873e54 906 00:02:54.392 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 907 00:07:56.850 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 908 00:12:56.785 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 909 00:17:57.220 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 910 00:22:58.155 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 911 00:27:08.648 04/17/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 912 00:27:08.648 04/17/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 913 00:27:08.648 04/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 914 00:27:08.648 04/17/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 915 00:27:08.648 04/17/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 916 00:27:08.648 04/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 917 00:27:57.799 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 918 00:32:57.954 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 919 00:33:23.491 04/17/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 920 00:33:23.491 04/17/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 921 00:33:23.491 04/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 922 00:37:58.439 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 923 00:42:58.453 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 924 00:47:58.898 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 925 00:52:59.323 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 926 00:57:59.798 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 927 01:03:00.243 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 928 01:08:00.278 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 929 01:13:00.783 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 930 01:18:01.218 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 931 01:23:01.162 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 932 01:28:01.637 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 933 01:33:02.052 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 934 01:38:02.547 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 935 01:43:02.486 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 936 01:48:02.453 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 937 01:53:03.890 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 938 01:58:03.433 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 939 02:03:03.888 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 940 02:08:04.343 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005 941 02:13:04.818 04/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3409, dst port 4005