EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:30:58.249 04/22/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:30:58.521 04/22/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:30:58.521 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:31:06.657 04/22/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 2292 for TCP connection. 5 21:31:06.667 04/22/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:31:06.667 04/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:31:06.667 04/22/06 Sev=Info/6 IPSEC/0x6370002B Sent 25738 packets, 0 were fragmented. 8 21:31:06.667 04/22/06 Sev=Info/4 IPSEC/0x6370000D Key(s) deleted by Interface (10.13.32.148) 9 21:31:06.667 04/22/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2292, dst port 4005 10 21:31:07.393 04/22/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 2292 11 21:31:07.393 04/22/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 2292, dst port 4005 12 21:31:07.393 04/22/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 13 21:31:07.897 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 14 21:31:07.917 04/22/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 15 21:31:07.957 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 16 21:31:08.250 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 17 21:31:08.250 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 18 21:31:08.250 04/22/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 19 21:31:08.250 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 20 21:31:08.250 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 21 21:31:08.250 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 22 21:31:08.260 04/22/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 23 21:31:08.260 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 24 21:31:08.260 04/22/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 25 21:31:08.260 04/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 26 21:31:08.391 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 27 21:31:08.391 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 28 21:31:08.391 04/22/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 29 21:31:08.391 04/22/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8C71CCA0C0FE9880 R_Cookie=64F9B24AF651B839) reason = DEL_REASON_LOAD_BALANCING 30 21:31:08.391 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 31 21:31:08.905 04/22/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8C71CCA0C0FE9880 R_Cookie=64F9B24AF651B839) reason = DEL_REASON_LOAD_BALANCING 32 21:31:08.905 04/22/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 33 21:31:08.905 04/22/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 34 21:31:08.905 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 35 21:31:08.905 04/22/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 36 21:31:09.409 04/22/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 2292, dst port 4005 37 21:31:09.409 04/22/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 2292, dst port 4005 38 21:31:09.409 04/22/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 2292 39 21:31:09.409 04/22/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 2292, dst port 4005 40 21:31:09.409 04/22/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 41 21:31:09.913 04/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 42 21:31:09.913 04/22/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 43 21:31:09.923 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 44 21:31:10.205 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 45 21:31:10.205 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 46 21:31:10.205 04/22/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 47 21:31:10.205 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 48 21:31:10.205 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 49 21:31:10.205 04/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 50 21:31:10.216 04/22/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 51 21:31:10.216 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 52 21:31:10.216 04/22/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 53 21:31:10.216 04/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 54 21:31:10.337 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 55 21:31:10.337 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 56 21:31:10.337 04/22/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 57 21:31:22.646 04/22/06 Sev=Info/4 CM/0x63100017 xAuth application returned 58 21:31:22.646 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 59 21:31:25.126 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 60 21:31:25.126 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 61 21:31:25.126 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 62 21:31:25.136 04/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 63 21:31:25.247 04/22/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 64 21:31:25.247 04/22/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 65 21:31:25.247 04/22/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 66 21:31:25.247 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 67 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 68 21:31:26.205 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 69 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.40 70 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 71 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 72 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 73 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 74 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 75 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 76 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 77 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 78 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 79 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 80 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 81 21:31:26.205 04/22/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 82 21:31:26.225 04/22/06 Sev=Info/4 CM/0x63100019 Mode Config data received 83 21:31:26.225 04/22/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.40, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 84 21:31:26.225 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 85 21:31:26.225 04/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 86 21:31:26.225 04/22/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 87 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 21:31:26.376 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 90 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 91 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 92 21:31:26.376 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 93 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 94 21:31:26.376 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 95 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=FE43E90F OUTBOUND SPI = 0x01EB649E INBOUND SPI = 0x1D54E885) 96 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x01EB649E 97 21:31:26.376 04/22/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1D54E885 98 21:31:29.229 04/22/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.40/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 99 21:31:29.380 04/22/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 100 21:31:29.894 04/22/06 Sev=Info/4 CM/0x6310001A One secure connection established 101 21:31:30.024 04/22/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.1.22.194. Current address(es): 10.1.22.194, 169.254.209.145, 10.13.32.40. 102 21:31:30.024 04/22/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.40. Current address(es): 10.1.22.194, 169.254.209.145, 10.13.32.40. 103 21:31:30.715 04/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:31:30.715 04/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9e64eb01 into key list 105 21:31:30.715 04/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 106 21:31:30.715 04/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x85e8541d into key list 107 21:31:30.715 04/22/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.40 108 21:31:32.077 04/22/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x9e64eb01 for inbound key with SPI=0x85e8541d 109 21:32:22.649 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=31808) 110 21:32:27.657 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=60737) 111 21:32:33.165 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=56740) 112 21:32:39.183 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=28582) 113 21:32:44.691 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=14760) 114 21:32:49.698 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=40105) 115 21:36:10.697 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 116 21:41:10.929 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 117 21:46:11.341 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 118 21:51:12.073 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 119 21:56:12.535 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 120 21:57:33.662 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=36266) 121 21:57:38.649 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=41643) 122 21:57:44.147 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=55364) 123 21:57:50.176 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=4167) 124 21:57:55.674 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=3656) 125 21:58:01.172 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=31817) 126 22:01:12.957 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 127 22:06:13.399 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 128 22:08:39.630 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197136 129 22:08:39.750 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 130 22:08:39.900 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 131 22:08:39.900 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 132 22:08:39.900 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197137, seq# expected = 1293197137 133 22:11:13.321 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 134 22:16:14.314 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 135 22:21:14.195 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 136 22:22:42.392 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197137 137 22:22:42.392 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 138 22:22:42.962 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 139 22:22:42.962 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 140 22:22:42.962 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197138, seq# expected = 1293197138 141 22:26:14.136 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 142 22:31:14.582 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 143 22:33:29.709 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197138 144 22:33:29.709 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 145 22:33:29.839 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 146 22:33:29.839 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 147 22:33:29.839 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197139, seq# expected = 1293197139 148 22:36:14.625 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 149 22:41:11.064 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197139 150 22:41:11.064 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 151 22:41:11.184 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 152 22:41:11.184 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 153 22:41:11.184 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197140, seq# expected = 1293197140 154 22:41:14.569 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 155 22:41:21.580 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197140 156 22:41:21.580 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 157 22:41:21.700 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 158 22:41:21.700 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 159 22:41:21.700 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197141, seq# expected = 1293197141 160 22:41:57.141 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197141 161 22:41:57.141 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 162 22:41:57.261 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 163 22:41:57.261 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 164 22:41:57.271 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197142, seq# expected = 1293197142 165 22:42:07.656 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197142 166 22:42:07.656 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 167 22:42:07.786 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 168 22:42:07.786 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 169 22:42:07.786 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197143, seq# expected = 1293197143 170 22:42:18.171 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197143 171 22:42:18.171 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 172 22:42:18.292 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 173 22:42:18.292 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 174 22:42:18.292 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197144, seq# expected = 1293197144 175 22:42:28.687 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197144 176 22:42:28.687 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 177 22:42:28.817 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 178 22:42:28.817 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 179 22:42:28.817 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197145, seq# expected = 1293197145 180 22:43:19.260 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197145 181 22:43:19.260 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 182 22:43:19.380 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 183 22:43:19.380 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 184 22:43:19.380 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197146, seq# expected = 1293197146 185 22:43:29.775 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197146 186 22:43:29.775 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 187 22:43:29.915 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 188 22:43:29.915 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 189 22:43:29.915 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197147, seq# expected = 1293197147 190 22:43:40.290 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197147 191 22:43:40.290 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 192 22:43:40.411 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 193 22:43:40.411 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 194 22:43:40.411 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197148, seq# expected = 1293197148 195 22:44:10.835 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197148 196 22:44:10.835 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 197 22:44:10.955 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 198 22:44:10.955 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 199 22:44:10.955 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197149, seq# expected = 1293197149 200 22:44:52.895 04/22/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 2292, flags 10h 201 22:46:17.047 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 202 22:46:46.971 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197149 203 22:46:47.411 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 204 22:46:47.722 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 205 22:46:47.722 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 206 22:46:47.722 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197150, seq# expected = 1293197150 207 22:51:17.863 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 208 22:56:17.507 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 209 22:58:44.920 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197150 210 22:58:46.512 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 211 22:58:46.803 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 212 22:58:46.803 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 213 22:58:46.803 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197151, seq# expected = 1293197151 214 22:59:59.178 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197151 215 22:59:59.178 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 216 22:59:59.308 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 217 22:59:59.308 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 218 22:59:59.308 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197152, seq# expected = 1293197152 219 23:01:17.822 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 220 23:06:18.797 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 221 23:10:43.761 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197152 222 23:10:43.941 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 223 23:10:44.091 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 224 23:10:44.091 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 225 23:10:44.091 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197153, seq# expected = 1293197153 226 23:11:18.792 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 227 23:11:59.491 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=31562) 228 23:12:04.358 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=29515) 229 23:12:09.365 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=23290) 230 23:12:15.364 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=31483) 231 23:12:20.381 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=43516) 232 23:12:25.889 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=54781) 233 23:16:19.727 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 234 23:21:20.172 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 235 23:22:48.781 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197153 236 23:22:48.781 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 23:22:48.901 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 23:22:48.901 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 23:22:48.901 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197154, seq# expected = 1293197154 240 23:26:20.597 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 241 23:31:21.028 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 242 23:36:21.481 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 243 23:41:21.926 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 244 23:46:29.122 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 245 23:46:49.151 04/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197154 246 23:46:49.212 04/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 23:46:49.332 04/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 23:46:49.332 04/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 23:46:49.332 04/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197155, seq# expected = 1293197155 250 23:49:13.668 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=39934) 251 23:49:19.186 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=29951) 252 23:49:25.496 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=51508) 253 23:49:40.328 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=18998) 254 23:49:45.646 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=10551) 255 23:49:51.745 04/22/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=5176) 256 23:51:29.231 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 257 23:56:30.219 04/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 258 00:00:17.076 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197155 259 00:00:17.257 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 260 00:00:17.417 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 261 00:00:17.427 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 262 00:00:17.427 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197156, seq# expected = 1293197156 263 00:01:29.654 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 264 00:06:30.602 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 265 00:10:39.973 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197156 266 00:10:39.973 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 267 00:10:40.103 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 268 00:10:40.103 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 269 00:10:40.103 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197157, seq# expected = 1293197157 270 00:11:30.548 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 271 00:16:31.356 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 272 00:21:31.953 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 273 00:22:37.591 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197157 274 00:22:37.781 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 275 00:22:37.941 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 00:22:37.941 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 277 00:22:37.941 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197158, seq# expected = 1293197158 278 00:26:31.689 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 279 00:31:32.467 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 280 00:34:36.410 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197158 281 00:34:36.410 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 282 00:34:36.530 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 283 00:34:36.530 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 284 00:34:36.530 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197159, seq# expected = 1293197159 285 00:36:31.732 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 286 00:41:32.489 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 287 00:44:35.421 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=313) 288 00:44:40.429 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=8250) 289 00:44:45.937 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=11324) 290 00:44:52.447 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=40508) 291 00:44:57.454 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=21309) 292 00:45:02.982 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=50237) 293 00:46:32.814 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 294 00:48:42.776 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197159 295 00:48:42.776 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 00:48:42.906 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 297 00:48:42.906 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 298 00:48:42.906 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197160, seq# expected = 1293197160 299 00:51:33.544 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 300 00:56:33.221 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 301 00:58:39.597 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197160 302 00:58:39.627 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 303 00:58:39.747 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 304 00:58:39.747 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 305 00:58:39.747 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197161, seq# expected = 1293197161 306 01:01:34.161 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 307 01:06:33.843 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 308 01:10:41.581 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197161 309 01:10:41.680 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 01:10:41.810 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 311 01:10:41.810 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 312 01:10:41.810 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197162, seq# expected = 1293197162 313 01:11:34.025 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 314 01:16:34.706 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 315 01:21:34.708 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 316 01:26:34.400 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 317 01:31:34.631 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 318 01:34:28.986 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197162 319 01:34:29.016 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 320 01:34:29.186 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 321 01:34:29.206 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 322 01:34:29.206 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197163, seq# expected = 1293197163 323 01:36:35.312 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 324 01:41:35.503 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 325 01:45:00.776 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=12606) 326 01:45:06.270 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=39230) 327 01:45:11.764 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=60360) 328 01:45:17.758 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=43721) 329 01:45:23.252 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=31946) 330 01:45:28.746 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=18635) 331 01:46:25.186 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197163 332 01:46:25.186 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 333 01:46:25.316 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 334 01:46:25.316 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 335 01:46:25.316 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197164, seq# expected = 1293197164 336 01:46:35.675 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 337 01:51:35.357 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 338 01:56:35.598 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 339 01:58:27.919 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197164 340 01:58:27.919 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 341 01:58:28.049 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 342 01:58:28.049 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 343 01:58:28.049 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197165, seq# expected = 1293197165 344 02:01:35.720 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 345 02:06:36.281 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 346 02:10:27.535 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197165 347 02:10:27.565 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 348 02:10:27.695 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 349 02:10:27.695 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 350 02:10:27.695 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197166, seq# expected = 1293197166 351 02:11:35.963 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 352 02:15:57.156 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=37579) 353 02:16:02.630 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=2252) 354 02:16:07.625 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=13480) 355 02:16:14.118 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=45992) 356 02:16:19.112 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=5802) 357 02:16:24.607 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=60842) 358 02:16:36.594 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 359 02:21:36.885 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 360 02:22:25.464 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197166 361 02:22:26.123 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 362 02:22:26.542 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 363 02:22:26.542 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 364 02:22:26.542 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197167, seq# expected = 1293197167 365 02:26:36.597 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 366 02:31:36.769 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 367 02:34:24.581 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197167 368 02:34:24.581 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 369 02:34:24.720 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 370 02:34:24.720 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 371 02:34:24.720 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197168, seq# expected = 1293197168 372 02:36:37.440 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 373 02:41:37.122 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 374 02:46:20.821 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197168 375 02:46:20.821 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 376 02:46:20.940 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 02:46:20.940 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 378 02:46:20.940 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197169, seq# expected = 1293197169 379 02:46:37.020 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 380 02:51:37.917 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 381 02:56:38.746 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 382 02:58:54.281 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197169 383 02:58:54.371 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 384 02:58:54.562 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 385 02:58:54.562 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 386 02:58:54.562 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197170, seq# expected = 1293197170 387 03:01:38.545 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 388 03:05:37.865 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197170 389 03:05:37.865 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 390 03:05:37.995 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 391 03:05:37.995 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 392 03:05:37.995 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197171, seq# expected = 1293197171 393 03:05:48.406 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197171 394 03:05:48.406 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 395 03:05:48.526 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 396 03:05:48.526 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 397 03:05:48.526 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197172, seq# expected = 1293197172 398 03:06:38.231 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 399 03:10:00.515 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197172 400 03:10:00.515 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 401 03:10:00.646 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 402 03:10:00.646 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 403 03:10:00.646 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197173, seq# expected = 1293197173 404 03:11:38.400 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 405 03:16:39.090 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 406 03:21:39.268 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 407 03:26:39.295 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 408 03:31:39.483 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 409 03:34:55.753 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197173 410 03:34:55.753 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 411 03:34:55.884 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 412 03:34:55.884 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 413 03:34:55.884 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197174, seq# expected = 1293197174 414 03:36:39.169 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 415 03:41:39.839 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 416 03:42:00.420 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=53163) 417 03:42:05.942 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=30892) 418 03:42:11.463 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=43617) 419 03:42:17.487 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=10850) 420 03:42:22.507 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=44130) 421 03:42:28.038 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=18531) 422 03:46:40.017 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 423 03:46:59.092 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197174 424 03:46:59.092 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 425 03:46:59.213 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 426 03:46:59.213 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 427 03:46:59.213 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197175, seq# expected = 1293197175 428 03:51:40.195 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 429 03:55:31.614 04/23/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x9e64eb01 is about to expire, requesting a new one 430 03:55:31.634 04/23/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.40, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 431 03:55:31.744 04/23/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=CE83E2DB) Initiator = ID=10.13.32.40 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 432 03:55:31.774 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 433 03:55:31.925 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 434 03:55:31.925 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 435 03:55:31.925 04/23/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 436 03:55:31.925 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 437 03:55:31.925 04/23/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=CE83E2DB OUTBOUND SPI = 0x4A4EDF4E INBOUND SPI = 0x4C3ABD67) 438 03:55:31.925 04/23/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4A4EDF4E 439 03:55:31.925 04/23/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4C3ABD67 440 03:55:31.925 04/23/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 441 03:55:32.618 04/23/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 442 03:55:32.618 04/23/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4edf4e4a into key list 443 03:55:32.618 04/23/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 444 03:55:32.618 04/23/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x67bd3a4c into key list 445 03:56:02.013 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 446 03:56:02.013 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 447 03:56:02.013 04/23/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1EB649E INBOUND SPI = 1D54E885) 448 03:56:02.013 04/23/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=FE43E90F 449 03:56:02.234 04/23/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x85e8541d 450 03:56:02.234 04/23/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x85e8541d 451 03:56:02.234 04/23/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9e64eb01 452 03:56:02.234 04/23/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9e64eb01 453 03:56:32.352 04/23/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4edf4e4a for inbound key with SPI=0x67bd3a4c 454 03:56:39.882 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 455 03:58:57.421 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197175 456 03:58:57.421 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 457 03:58:57.542 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 458 03:58:57.552 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 459 03:58:57.552 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197176, seq# expected = 1293197176 460 04:01:40.562 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 461 04:06:40.750 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 462 04:11:00.770 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197176 463 04:11:00.770 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 464 04:11:00.931 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 465 04:11:00.931 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 466 04:11:00.931 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197177, seq# expected = 1293197177 467 04:11:40.928 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 468 04:13:09.285 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=59235) 469 04:13:14.304 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=42340) 470 04:13:19.836 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=53078) 471 04:13:25.850 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=1367) 472 04:13:30.869 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=34391) 473 04:13:36.391 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=15449) 474 04:16:41.116 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 475 04:21:41.294 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 476 04:22:59.601 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197177 477 04:22:59.601 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 478 04:22:59.722 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 479 04:22:59.722 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 480 04:22:59.722 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197178, seq# expected = 1293197178 481 04:26:41.472 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 482 04:31:41.650 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 483 04:35:02.950 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197178 484 04:35:02.950 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 485 04:35:03.081 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 486 04:35:03.081 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 487 04:35:03.081 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197179, seq# expected = 1293197179 488 04:36:41.336 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 489 04:41:42.016 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 490 04:46:42.194 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 491 04:51:42.594 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 492 04:56:43.300 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 493 04:58:31.184 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197179 494 04:58:31.184 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 495 04:58:31.303 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 496 04:58:31.303 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 497 04:58:31.303 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197180, seq# expected = 1293197180 498 05:01:42.980 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 499 05:06:02.724 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197180 500 05:06:02.724 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 501 05:06:02.914 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 502 05:06:02.914 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 503 05:06:02.914 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197181, seq# expected = 1293197181 504 05:06:43.172 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 505 05:10:30.430 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197181 506 05:10:30.430 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 507 05:10:30.550 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 508 05:10:30.550 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 509 05:10:30.550 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197182, seq# expected = 1293197182 510 05:11:43.363 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 511 05:16:43.544 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 512 05:21:43.726 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 513 05:22:26.181 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197182 514 05:22:26.181 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 515 05:22:26.301 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 516 05:22:26.301 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 517 05:22:26.301 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197183, seq# expected = 1293197183 518 05:26:44.407 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 519 05:31:44.089 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 520 05:33:09.998 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=21338) 521 05:33:15.492 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=42074) 522 05:33:20.487 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=17665) 523 05:33:25.981 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=43522) 524 05:33:31.974 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=42243) 525 05:33:37.469 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=5381) 526 05:34:24.419 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197183 527 05:34:24.419 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 528 05:34:24.549 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 529 05:34:24.549 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 530 05:34:24.549 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197184, seq# expected = 1293197184 531 05:36:44.770 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 532 05:41:44.452 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 533 05:45:11.742 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=29446) 534 05:45:17.735 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=52743) 535 05:45:23.230 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=58127) 536 05:45:28.724 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=4625) 537 05:45:33.719 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=3858) 538 05:45:39.213 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=61714) 539 05:46:26.163 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197184 540 05:46:26.163 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 541 05:46:26.293 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 542 05:46:26.293 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 543 05:46:26.293 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197185, seq# expected = 1293197185 544 05:46:45.143 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 545 05:51:44.741 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 546 05:56:44.820 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 547 05:58:32.343 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197185 548 05:58:32.343 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 549 05:58:32.463 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 550 05:58:32.463 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 551 05:58:32.463 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197186, seq# expected = 1293197186 552 06:01:28.877 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197186 553 06:01:28.877 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 554 06:01:28.997 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 555 06:01:28.997 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 556 06:01:28.997 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197187, seq# expected = 1293197187 557 06:01:44.379 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 558 06:06:45.447 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 559 06:11:45.004 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 560 06:16:45.061 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 561 06:21:45.118 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 562 06:26:45.175 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 563 06:31:45.232 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 564 06:36:45.289 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 565 06:41:45.346 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 566 06:46:45.403 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 567 06:51:45.898 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 568 06:56:45.894 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 569 07:01:46.651 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 570 07:06:46.897 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 571 07:09:39.539 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197187 572 07:09:39.539 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 573 07:09:39.659 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 574 07:09:39.659 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 575 07:09:39.659 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197188, seq# expected = 1293197188 576 07:11:46.643 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 577 07:13:40.236 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197188 578 07:13:40.236 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 579 07:13:40.356 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 580 07:13:40.356 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 581 07:13:40.356 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197189, seq# expected = 1293197189 582 07:16:46.889 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 583 07:18:48.488 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=52755) 584 07:18:53.993 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=31252) 585 07:18:59.497 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=21006) 586 07:19:05.002 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=39694) 587 07:19:10.506 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=54798) 588 07:19:16.011 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=22799) 589 07:21:47.135 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 590 07:22:29.169 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197189 591 07:22:29.169 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 592 07:22:29.289 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 593 07:22:29.289 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 594 07:22:29.289 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197190, seq# expected = 1293197190 595 07:23:41.729 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197190 596 07:23:41.729 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 597 07:23:41.849 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 598 07:23:41.849 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 599 07:23:41.849 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197191, seq# expected = 1293197191 600 07:26:47.381 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 601 07:31:47.627 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 602 07:32:52.680 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=57871) 603 07:32:57.184 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=19984) 604 07:33:02.688 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=38078) 605 07:33:08.693 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=6335) 606 07:33:14.198 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=36543) 607 07:33:19.202 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=60607) 608 07:36:47.873 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 609 07:41:48.129 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 610 07:46:29.349 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197191 611 07:46:29.349 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 612 07:46:29.479 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 613 07:46:29.479 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 614 07:46:29.479 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197192, seq# expected = 1293197192 615 07:46:47.864 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 616 07:51:49.094 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 617 07:56:48.789 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 618 07:58:28.402 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197192 619 07:58:28.402 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 620 07:58:28.522 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 621 07:58:28.522 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 622 07:58:28.522 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197193, seq# expected = 1293197193 623 08:01:49.128 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 624 08:02:50.698 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197193 625 08:02:50.698 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 626 08:02:50.818 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 627 08:02:50.818 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 628 08:02:50.818 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197194, seq# expected = 1293197194 629 08:06:49.467 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 630 08:11:49.806 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 631 08:16:50.155 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 632 08:21:50.504 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 633 08:26:50.833 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 634 08:31:51.172 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 635 08:36:51.511 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 636 08:40:57.499 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197194 637 08:40:57.499 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 638 08:40:57.619 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 639 08:40:57.619 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 640 08:40:57.619 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197195, seq# expected = 1293197195 641 08:41:52.070 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 642 08:46:23.867 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197195 643 08:46:23.867 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 644 08:46:23.997 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 645 08:46:23.997 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 646 08:46:23.997 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197196, seq# expected = 1293197196 647 08:46:52.409 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 2292, dst port 4005 648 08:51:00.981 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1293197196 649 08:51:00.981 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 650 08:51:01.112 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 651 08:51:01.112 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 652 08:51:01.112 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1293197197, seq# expected = 1293197197 653 08:51:03.986 04/23/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 654 08:51:04.026 04/23/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 655 08:51:04.106 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 656 08:51:04.116 04/23/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4A4EDF4E INBOUND SPI = 4C3ABD67) 657 08:51:04.116 04/23/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=CE83E2DB 658 08:51:04.116 04/23/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=FD134F08931C8C0D R_Cookie=6DB7B4EE68EBA7EE) reason = DEL_REASON_RESET_SADB 659 08:51:04.116 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 660 08:51:04.116 04/23/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=FD134F08931C8C0D R_Cookie=6DB7B4EE68EBA7EE) reason = DEL_REASON_RESET_SADB 661 08:51:04.116 04/23/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 662 08:51:04.146 04/23/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 663 08:51:04.177 04/23/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 664 08:51:04.177 04/23/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 2292 for TCP connection. 665 08:51:04.177 04/23/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 11:19:35 666 08:51:04.448 04/23/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 667 08:51:13.741 04/23/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 668 08:51:13.741 04/23/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 669 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x67bd3a4c 670 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x67bd3a4c 671 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4edf4e4a 672 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4edf4e4a 673 08:51:13.741 04/23/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 2292, dst port 4005 674 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 675 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 676 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 677 08:51:13.741 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys