EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 12:28:10.661 04/22/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 12:28:10.771 04/22/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 12:28:10.771 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 12:28:12.834 04/22/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1188 for TCP connection. 5 12:28:12.834 04/22/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 12:28:12.834 04/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 12:28:12.834 04/22/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1188, dst port 4005 8 12:28:13.795 04/22/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1188 9 12:28:13.795 04/22/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1188, dst port 4005 10 12:28:13.795 04/22/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 12:28:14.296 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 12:28:14.296 04/22/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 12:28:14.326 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 12:28:14.607 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 12:28:14.607 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 12:28:14.607 04/22/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 12:28:14.607 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 12:28:14.607 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 12:28:14.607 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 12:28:14.617 04/22/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 12:28:14.617 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 12:28:14.617 04/22/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 12:28:14.617 04/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 12:28:14.737 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 12:28:14.737 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 12:28:14.737 04/22/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 12:28:14.737 04/22/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=4C64EAC0EC581E29 R_Cookie=336F61037CEA1826) reason = DEL_REASON_LOAD_BALANCING 28 12:28:14.737 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 12:28:15.298 04/22/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=4C64EAC0EC581E29 R_Cookie=336F61037CEA1826) reason = DEL_REASON_LOAD_BALANCING 30 12:28:15.298 04/22/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 12:28:15.298 04/22/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 12:28:15.298 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 12:28:15.298 04/22/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 12:28:15.798 04/22/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1188, dst port 4005 35 12:28:15.798 04/22/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1188, dst port 4005 36 12:28:15.798 04/22/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1188 37 12:28:15.798 04/22/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1188, dst port 4005 38 12:28:15.798 04/22/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 12:28:16.299 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 12:28:16.299 04/22/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 12:28:16.309 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 12:28:16.600 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 12:28:16.600 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 12:28:16.600 04/22/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 12:28:16.600 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 12:28:16.600 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 12:28:16.600 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 12:28:16.600 04/22/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 12:28:16.600 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 12:28:16.600 04/22/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 12:28:16.600 04/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 12:28:16.730 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 12:28:16.730 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 12:28:16.730 04/22/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 12:28:34.846 04/22/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 12:28:34.846 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 12:28:37.379 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 12:28:37.379 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 12:28:37.379 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 12:28:37.379 04/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 12:28:37.429 04/22/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 12:28:37.429 04/22/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 12:28:37.429 04/22/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 12:28:37.429 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 12:28:38.531 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.148 68 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 12:28:38.531 04/22/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 12:28:38.551 04/22/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 12:28:38.551 04/22/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.148, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 12:28:38.551 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 12:28:38.701 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 22 seconds, setting expiry to 86378 seconds from now 87 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 12:28:38.701 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 12:28:38.701 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=7E681D2E OUTBOUND SPI = 0x557AECB8 INBOUND SPI = 0x9A65D40B) 92 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x557AECB8 93 12:28:38.701 04/22/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x9A65D40B 94 12:28:40.874 04/22/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.148/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 12:28:40.894 04/22/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 12:28:40.925 04/22/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 12:28:40.955 04/22/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.1.22.194. Current address(es): 10.1.22.194, 169.254.209.145, 10.13.32.148. 98 12:28:40.955 04/22/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.148. Current address(es): 10.1.22.194, 169.254.209.145, 10.13.32.148. 99 12:28:41.125 04/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 12:28:41.125 04/22/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 12:28:41.125 04/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 12:28:41.125 04/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb8ec7a55 into key list 103 12:28:41.125 04/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 12:28:41.125 04/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0bd4659a into key list 105 12:28:41.125 04/22/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.148 106 12:28:43.839 04/22/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xb8ec7a55 for inbound key with SPI=0x0bd4659a 107 12:33:17.296 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 108 12:34:28.908 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458131 109 12:34:28.908 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 110 12:34:29.028 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 111 12:34:29.028 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 112 12:34:29.028 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458132, seq# expected = 3958458132 113 12:38:17.737 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 114 12:43:18.169 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 115 12:46:21.933 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458132 116 12:46:21.933 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 117 12:46:22.073 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 118 12:46:22.073 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 119 12:46:22.073 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458133, seq# expected = 3958458133 120 12:48:18.100 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 121 12:53:19.033 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 122 12:58:19.465 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 123 13:03:19.897 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 124 13:08:20.158 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 125 13:10:25.349 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458133 126 13:10:25.349 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 127 13:10:25.479 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 128 13:10:25.479 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 129 13:10:25.479 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458134, seq# expected = 3958458134 130 13:13:20.601 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 131 13:18:21.533 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 132 13:22:28.388 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458134 133 13:22:28.388 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 134 13:22:28.518 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 135 13:22:28.518 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 136 13:22:28.518 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458135, seq# expected = 3958458135 137 13:23:20.964 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 138 13:28:21.897 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 139 13:33:21.950 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 140 13:38:22.831 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 141 13:43:24.732 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 142 13:46:34.068 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458135 143 13:46:35.501 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 144 13:46:35.871 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 145 13:46:35.951 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 146 13:46:35.951 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458136, seq# expected = 3958458136 147 13:48:24.780 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 148 13:53:26.051 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 149 13:58:26.590 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 150 13:58:30.116 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458136 151 13:58:30.286 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 152 13:58:30.437 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 153 13:58:30.447 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 154 13:58:30.447 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458137, seq# expected = 3958458137 155 14:03:27.139 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 156 14:08:27.337 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 157 14:10:33.077 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458137 158 14:10:33.197 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 159 14:10:33.317 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 160 14:10:33.337 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 161 14:10:33.337 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458138, seq# expected = 3958458138 162 14:13:27.385 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 163 14:18:27.223 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 164 14:22:35.677 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458138 165 14:22:35.677 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 166 14:22:35.807 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 167 14:22:35.807 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 168 14:22:35.807 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458139, seq# expected = 3958458139 169 14:23:27.772 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 170 14:28:27.649 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 171 14:33:27.647 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 172 14:34:29.139 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458139 173 14:34:29.210 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 174 14:34:29.340 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 175 14:34:29.340 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 176 14:34:29.340 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458140, seq# expected = 3958458140 177 14:38:27.857 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 178 14:43:28.383 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 179 14:46:30.550 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458140 180 14:46:30.550 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 181 14:46:30.680 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 182 14:46:30.680 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 183 14:46:30.680 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458141, seq# expected = 3958458141 184 14:48:27.658 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 185 14:53:28.444 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 186 14:58:28.710 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 187 15:03:28.986 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 188 15:08:29.262 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 189 15:10:26.370 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458141 190 15:10:26.370 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 191 15:10:26.490 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 192 15:10:26.490 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 193 15:10:26.490 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458142, seq# expected = 3958458142 194 15:11:42.940 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458142 195 15:11:42.940 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 196 15:11:43.060 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 197 15:11:43.060 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 198 15:11:43.060 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458143, seq# expected = 3958458143 199 15:13:29.048 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 200 15:18:29.824 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 201 15:23:29.600 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 202 15:28:30.376 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 203 15:33:31.017 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 204 15:38:30.643 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 205 15:43:31.389 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 206 15:46:29.146 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458143 207 15:46:29.407 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 208 15:46:29.567 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 209 15:46:29.587 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 210 15:46:29.587 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458144, seq# expected = 3958458144 211 15:48:31.303 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 212 15:51:20.058 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458144 213 15:51:20.058 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 214 15:51:20.178 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 215 15:51:20.178 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 216 15:51:20.178 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458145, seq# expected = 3958458145 217 15:58:32.093 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 218 16:03:32.528 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 219 16:08:32.613 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 220 16:13:33.058 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 221 16:18:33.993 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 222 16:23:33.928 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 223 16:28:34.373 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 224 16:33:34.805 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 225 16:38:35.059 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 226 16:43:35.494 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 227 16:46:22.226 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458145 228 16:46:22.226 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 229 16:46:22.356 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 230 16:46:22.356 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 231 16:46:22.356 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458146, seq# expected = 3958458146 232 16:48:35.929 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 233 16:53:36.384 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 234 16:58:24.802 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458146 235 16:58:24.802 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 236 16:58:25.323 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 237 16:58:25.323 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 238 16:58:25.323 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458147, seq# expected = 3958458147 239 16:58:36.819 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 240 17:03:37.254 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 241 17:08:37.699 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 242 17:10:18.836 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458147 243 17:10:18.836 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 244 17:10:18.956 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 245 17:10:18.956 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 246 17:10:18.956 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458148, seq# expected = 3958458148 247 17:13:38.124 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 248 17:18:38.609 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 249 17:23:39.064 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 250 17:28:39.580 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 251 17:33:39.997 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 252 17:34:24.080 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458148 253 17:34:24.080 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 254 17:34:24.201 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 255 17:34:24.201 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 256 17:34:24.201 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458149, seq# expected = 3958458149 257 17:38:40.442 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 258 17:42:23.765 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=36294) 259 17:42:29.774 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=43719) 260 17:42:34.781 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=48584) 261 17:42:40.790 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=2506) 262 17:43:40.877 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 263 17:48:40.811 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 264 17:53:41.747 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 265 17:58:23.675 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458149 266 17:58:23.675 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 267 17:58:23.795 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 268 17:58:23.795 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 269 17:58:23.795 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458150, seq# expected = 3958458150 270 17:58:41.190 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 271 18:03:42.126 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 272 18:08:43.062 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 273 18:10:24.238 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458150 274 18:10:24.328 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 275 18:10:24.458 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 18:10:24.468 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 277 18:10:24.468 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458151, seq# expected = 3958458151 278 18:13:43.056 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 279 18:18:43.491 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 280 18:23:43.926 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 281 18:28:44.862 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 282 18:33:44.812 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 283 18:38:45.224 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 284 18:43:45.388 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 285 18:44:24.445 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=203) 286 18:44:29.953 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=716) 287 18:44:35.461 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=15309) 288 18:44:41.470 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=22222) 289 18:44:46.978 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=29135) 290 18:44:51.985 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=38608) 291 18:46:19.111 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458151 292 18:46:19.111 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 293 18:46:19.241 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 294 18:46:19.241 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 295 18:46:19.241 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458152, seq# expected = 3958458152 296 18:48:45.823 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 297 18:53:02.205 04/22/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xb8ec7a55 is about to expire, requesting a new one 298 18:53:02.235 04/22/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.148, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 299 18:53:02.235 04/22/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=06F86FC8) Initiator = ID=10.13.32.148 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 300 18:53:02.275 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 301 18:53:02.485 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 302 18:53:02.495 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 303 18:53:02.495 04/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 304 18:53:02.495 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 305 18:53:02.495 04/22/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=06F86FC8 OUTBOUND SPI = 0x377806DF INBOUND SPI = 0xE2A21DC0) 306 18:53:02.495 04/22/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x377806DF 307 18:53:02.495 04/22/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xE2A21DC0 308 18:53:02.495 04/22/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 309 18:53:03.206 04/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 310 18:53:03.206 04/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xdf067837 into key list 311 18:53:03.206 04/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 312 18:53:03.206 04/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc01da2e2 into key list 313 18:53:32.408 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 314 18:53:32.428 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 315 18:53:32.428 04/22/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 557AECB8 INBOUND SPI = 9A65D40B) 316 18:53:32.428 04/22/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=7E681D2E 317 18:53:32.749 04/22/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0bd4659a 318 18:53:32.749 04/22/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0bd4659a 319 18:53:32.749 04/22/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb8ec7a55 320 18:53:32.749 04/22/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb8ec7a55 321 18:53:45.768 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 322 18:53:52.778 04/22/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xdf067837 for inbound key with SPI=0xc01da2e2 323 18:58:46.723 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 324 19:03:47.158 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 325 19:08:47.674 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 326 19:13:48.088 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 327 19:18:48.984 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 328 19:23:49.439 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 329 19:28:49.374 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 330 19:33:46.336 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=32210) 331 19:33:49.841 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 332 19:33:52.345 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=3797) 333 19:33:57.352 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=63704) 334 19:34:03.361 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=50906) 335 19:34:08.368 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=32220) 336 19:34:13.876 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=41438) 337 19:38:50.276 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 338 19:43:50.711 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 339 19:45:38.387 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458152 340 19:45:38.497 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 341 19:45:38.618 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 342 19:45:38.618 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 343 19:45:38.618 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458153, seq# expected = 3958458153 344 19:46:24.444 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458153 345 19:46:24.444 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 346 19:46:24.564 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 347 19:46:24.564 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 348 19:46:24.564 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458154, seq# expected = 3958458154 349 19:48:51.156 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 350 19:53:51.601 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 351 19:58:25.999 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458154 352 19:58:25.999 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 353 19:58:26.119 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 354 19:58:26.119 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 355 19:58:26.119 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458155, seq# expected = 3958458155 356 19:58:51.536 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 357 20:03:52.471 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 358 20:08:52.906 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 359 20:13:53.341 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 360 20:18:54.277 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 361 20:21:58.544 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=28128) 362 20:22:04.052 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=41442) 363 20:22:09.059 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=27450) 364 20:22:15.068 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=54075) 365 20:22:20.576 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=17725) 366 20:22:26.084 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=2367) 367 20:23:54.211 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 368 20:28:55.147 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 369 20:30:13.758 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458155 370 20:30:13.758 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 371 20:30:13.879 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 372 20:30:13.879 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 373 20:30:13.879 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458156, seq# expected = 3958458156 374 20:30:24.774 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458156 375 20:30:24.774 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 376 20:30:24.894 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 20:30:24.894 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 378 20:30:24.894 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458157, seq# expected = 3958458157 379 20:33:55.022 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 380 20:38:55.457 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 381 20:43:56.012 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 382 20:46:19.219 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458157 383 20:46:19.219 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 384 20:46:19.340 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 385 20:46:19.340 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 386 20:46:19.350 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458158, seq# expected = 3958458158 387 20:48:55.946 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 388 20:53:56.431 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 389 20:58:18.331 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458158 390 20:58:18.331 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 391 20:58:18.721 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 392 20:58:18.721 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 393 20:58:18.721 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3958458159, seq# expected = 3958458159 394 20:58:56.386 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 395 21:03:57.321 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 396 21:08:58.317 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1188, dst port 4005 397 21:13:40.716 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 398 21:13:41.077 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 399 21:13:41.077 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 400 21:13:41.077 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 401 21:13:41.077 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 402 21:13:49.449 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 403 21:14:32.160 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3958458159 404 21:15:08.272 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 405 21:16:17.311 04/22/06 Sev=Warning/3 CM/0xA310002C Adapter address changed from 10.1.22.194. Current address(es): 169.254.209.145, 10.13.32.148. 406 21:16:17.351 04/22/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 407 21:16:23.290 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 408 21:16:23.290 04/22/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 377806DF INBOUND SPI = E2A21DC0) 409 21:16:23.290 04/22/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=06F86FC8 410 21:16:23.290 04/22/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F49C3C8EB0B0D8E7 R_Cookie=9E8CF3CD92B7C2F9) reason = DEL_REASON_ADDRESS_CHANGE 411 21:16:23.300 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 412 21:16:23.300 04/22/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F49C3C8EB0B0D8E7 R_Cookie=9E8CF3CD92B7C2F9) reason = DEL_REASON_ADDRESS_CHANGE 413 21:16:23.320 04/22/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 414 21:16:44.260 04/22/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 415 21:16:49.347 04/22/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 416 21:17:53.620 04/22/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1188 for TCP connection. 417 21:17:53.620 04/22/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 8:49:13 418 21:19:21.056 04/22/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 419 21:19:21.056 04/22/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 420 21:19:21.056 04/22/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 421 21:19:21.056 04/22/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 422 21:19:21.056 04/22/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 423 21:19:55.896 04/22/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 424 21:19:56.376 04/22/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 425 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 426 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 427 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 428 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 429 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 430 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 431 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 432 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 433 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 434 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 435 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 436 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 437 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 438 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 439 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 440 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 441 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 442 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 443 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 444 21:19:56.376 04/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 445 21:19:56.376 04/22/06 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511) 446 21:19:57.388 04/22/06 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511) 447 21:19:58.389 04/22/06 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511)