EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 14:09:23.206 04/23/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 14:09:23.286 04/23/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 14:09:23.286 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 14:09:23.376 04/23/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1175 for TCP connection. 5 14:09:23.396 04/23/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 14:09:23.396 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 14:09:23.396 04/23/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1175, dst port 4005 8 14:09:24.257 04/23/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1175 9 14:09:24.257 04/23/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1175, dst port 4005 10 14:09:24.257 04/23/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 14:09:24.758 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 14:09:24.768 04/23/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 14:09:24.778 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 14:09:25.068 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 14:09:25.068 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 14:09:25.068 04/23/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 14:09:25.068 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 14:09:25.068 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 14:09:25.068 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 14:09:25.078 04/23/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 14:09:25.078 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 14:09:25.078 04/23/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 14:09:25.078 04/23/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 14:09:25.198 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 14:09:25.198 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 14:09:25.198 04/23/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 14:09:25.198 04/23/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=312D025CBC687964 R_Cookie=DC52EB3D5B8E2ECA) reason = DEL_REASON_LOAD_BALANCING 28 14:09:25.198 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 14:09:25.759 04/23/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=312D025CBC687964 R_Cookie=DC52EB3D5B8E2ECA) reason = DEL_REASON_LOAD_BALANCING 30 14:09:25.759 04/23/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 14:09:25.759 04/23/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 14:09:25.759 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 14:09:25.769 04/23/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 14:09:26.260 04/23/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1175, dst port 4005 35 14:09:26.260 04/23/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1175, dst port 4005 36 14:09:26.260 04/23/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1175 37 14:09:26.260 04/23/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1175, dst port 4005 38 14:09:26.260 04/23/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 14:09:26.761 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 14:09:26.761 04/23/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 14:09:26.771 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 14:09:27.051 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 14:09:27.051 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 14:09:27.051 04/23/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 14:09:27.051 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 14:09:27.051 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 14:09:27.051 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 14:09:27.061 04/23/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 14:09:27.061 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 14:09:27.061 04/23/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 14:09:27.061 04/23/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 14:09:27.181 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 14:09:27.181 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 14:09:27.181 04/23/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 14:09:38.077 04/23/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 14:09:38.077 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 14:09:40.561 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 14:09:40.561 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 14:09:40.561 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 14:09:40.561 04/23/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 14:09:40.621 04/23/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 14:09:40.621 04/23/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 14:09:40.621 04/23/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 14:09:40.621 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 14:09:41.602 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.6.47 68 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 14:09:41.602 04/23/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 14:09:41.622 04/23/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 14:09:41.622 04/23/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.47, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 14:09:41.622 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 14:09:41.772 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 15 seconds, setting expiry to 86385 seconds from now 87 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 14:09:41.772 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 14:09:41.772 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=EC8D380E OUTBOUND SPI = 0x67BEF87F INBOUND SPI = 0xE02D4D22) 92 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x67BEF87F 93 14:09:41.772 04/23/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xE02D4D22 94 14:09:44.376 04/23/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.6.47/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 14:09:44.466 04/23/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 14:09:44.496 04/23/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 14:09:44.506 04/23/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.1.22.42. Current address(es): 10.1.22.42, 10.13.6.47. 98 14:09:44.506 04/23/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.6.47. Current address(es): 10.1.22.42, 10.13.6.47. 99 14:09:44.646 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 14:09:44.646 04/23/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 14:09:44.646 04/23/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 14:09:44.646 04/23/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7ff8be67 into key list 103 14:09:44.646 04/23/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 14:09:44.646 04/23/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x224d2de0 into key list 105 14:09:44.646 04/23/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.6.47 106 14:09:52.297 04/23/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7ff8be67 for inbound key with SPI=0x224d2de0 107 14:14:27.486 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 108 14:16:07.669 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941584 109 14:16:07.669 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 110 14:16:07.789 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 111 14:16:07.799 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 112 14:16:07.799 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941585, seq# expected = 3360941585 113 14:19:27.957 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 114 14:20:20.533 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941585 115 14:20:20.533 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 116 14:20:20.653 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 117 14:20:20.653 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 118 14:20:20.653 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941586, seq# expected = 3360941586 119 14:21:21.120 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941586 120 14:21:21.120 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 121 14:21:21.240 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 122 14:21:21.240 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 123 14:21:21.240 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941587, seq# expected = 3360941587 124 14:24:28.389 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 125 14:29:28.827 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 126 14:34:29.268 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 127 14:39:29.706 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 128 14:44:30.143 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 129 14:49:30.561 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 130 14:54:30.993 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 131 14:59:31.425 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 132 15:04:31.857 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 133 15:09:32.830 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 134 15:14:32.701 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 135 15:19:33.141 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 136 15:24:33.597 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 137 15:27:13.352 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941587 138 15:27:13.522 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 139 15:27:13.692 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 140 15:27:13.702 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 141 15:27:13.712 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941588, seq# expected = 3360941588 142 15:29:34.739 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 143 15:34:38.675 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 144 15:39:13.378 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941588 145 15:39:13.589 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 146 15:39:13.739 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 147 15:39:13.759 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 148 15:39:13.759 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941589, seq# expected = 3360941589 149 15:39:38.906 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 150 15:44:39.357 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 151 15:49:39.788 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 152 15:51:12.925 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941589 153 15:51:12.925 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 154 15:51:13.045 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 155 15:51:13.045 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 156 15:51:13.045 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941590, seq# expected = 3360941590 157 15:54:39.466 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 158 15:59:40.362 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 159 16:04:40.435 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 160 16:09:39.978 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 161 16:11:02.103 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941590 162 16:11:02.103 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 163 16:11:02.223 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 164 16:11:02.223 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 165 16:11:02.223 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941591, seq# expected = 3360941591 166 16:14:40.943 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 167 16:15:14.491 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941591 168 16:15:14.491 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 169 16:15:14.611 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 170 16:15:14.611 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 171 16:15:14.611 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941592, seq# expected = 3360941592 172 16:17:26.678 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941592 173 16:17:26.678 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 174 16:17:26.819 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 175 16:17:26.819 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 176 16:17:26.819 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941593, seq# expected = 3360941593 177 16:19:41.369 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 178 16:24:41.846 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 179 16:27:17.957 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941593 180 16:27:19.779 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 181 16:27:20.360 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 182 16:27:20.470 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 183 16:27:20.470 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941594, seq# expected = 3360941594 184 16:29:42.322 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 185 16:34:51.971 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 186 16:39:54.179 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 187 16:44:37.541 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941594 188 16:44:38.222 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 189 16:44:38.412 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 190 16:44:38.422 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 191 16:44:38.422 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941595, seq# expected = 3360941595 192 16:44:52.723 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 193 16:49:53.409 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 194 16:51:14.524 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941595 195 16:51:14.524 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 196 16:51:14.644 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 197 16:51:14.644 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 198 16:51:14.644 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941596, seq# expected = 3360941596 199 16:54:53.865 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 200 16:59:54.812 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 201 17:03:15.096 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941596 202 17:03:15.096 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 203 17:03:15.226 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 204 17:03:15.226 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 205 17:03:15.226 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941597, seq# expected = 3360941597 206 17:04:54.256 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 207 17:07:53.130 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941597 208 17:07:53.130 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 209 17:07:53.430 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 210 17:07:53.430 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 211 17:07:53.430 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941598, seq# expected = 3360941598 212 17:09:54.843 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 213 17:14:55.729 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 214 17:15:15.247 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941598 215 17:15:15.377 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 216 17:15:15.738 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 217 17:15:15.738 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 218 17:15:15.738 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941599, seq# expected = 3360941599 219 17:19:55.664 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 220 17:24:56.721 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 221 17:27:14.777 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941599 222 17:27:14.777 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 17:27:14.907 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 17:27:14.907 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 17:27:14.907 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941600, seq# expected = 3360941600 226 17:29:56.506 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 227 17:34:57.453 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 228 17:39:57.889 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 229 17:44:58.095 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 230 17:49:58.030 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 231 17:51:20.147 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941600 232 17:51:20.167 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 233 17:51:20.327 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 234 17:51:20.347 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 235 17:51:20.347 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941601, seq# expected = 3360941601 236 17:54:57.976 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 237 17:59:59.383 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 238 18:04:59.308 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 239 18:10:00.555 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 240 18:15:00.671 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 241 18:20:00.666 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 242 18:25:00.562 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 243 18:30:01.068 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 244 18:34:38.932 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941601 245 18:34:38.952 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 246 18:34:39.092 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 247 18:34:39.092 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 248 18:34:39.092 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941602, seq# expected = 3360941602 249 18:35:00.462 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 250 18:40:01.940 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 251 18:45:01.645 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 252 18:50:01.991 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 253 18:51:17.618 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941602 254 18:51:17.618 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 255 18:51:17.728 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 256 18:51:17.728 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 257 18:51:17.728 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941603, seq# expected = 3360941603 258 18:55:02.957 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 259 19:00:04.034 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 260 19:05:10.299 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 261 19:10:11.546 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 262 19:15:11.531 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 263 19:20:15.823 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 264 19:24:54.378 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.16 FragId=10239) 265 19:25:04.622 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.16 FragId=27904) 266 19:25:20.745 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.16 FragId=48385) 267 19:25:20.745 04/23/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.16 FragId=25859) 268 19:25:22.317 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 269 19:30:30.464 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 270 19:35:11.453 04/23/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1175, flags 10h 271 19:35:23.510 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941603 272 19:35:24.601 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 273 19:35:24.912 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 274 19:35:24.962 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 275 19:35:24.962 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941604, seq# expected = 3360941604 276 19:35:27.485 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 277 19:40:32.037 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 278 19:45:32.173 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 279 19:50:32.398 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 280 19:51:10.953 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941604 281 19:51:10.953 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 282 19:51:11.073 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 283 19:51:11.073 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 284 19:51:11.073 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941605, seq# expected = 3360941605 285 19:55:16.953 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941605 286 19:55:16.953 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 19:55:17.073 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 19:55:17.073 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 19:55:17.073 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941606, seq# expected = 3360941606 290 19:55:32.885 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1175, dst port 4005 291 19:55:48.096 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3360941606 292 19:55:48.096 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 293 19:55:48.216 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 294 19:55:48.216 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 295 19:55:48.216 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3360941607, seq# expected = 3360941607 296 19:58:26.912 04/23/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 297 19:58:26.922 04/23/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 298 19:58:26.992 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 299 19:58:26.992 04/23/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 67BEF87F INBOUND SPI = E02D4D22) 300 19:58:26.992 04/23/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=EC8D380E 301 19:58:26.992 04/23/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8B807514D24D830C R_Cookie=B05A66112A92124C) reason = DEL_REASON_RESET_SADB 302 19:58:26.992 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 303 19:58:26.992 04/23/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8B807514D24D830C R_Cookie=B05A66112A92124C) reason = DEL_REASON_RESET_SADB 304 19:58:26.992 04/23/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 305 19:58:27.012 04/23/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 306 19:58:27.092 04/23/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 307 19:58:27.113 04/23/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1175 for TCP connection. 308 19:58:27.113 04/23/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 5:48:43 309 19:58:28.374 04/23/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 310 19:58:53.430 04/23/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 311 19:58:53.510 04/23/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 312 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x224d2de0 313 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x224d2de0 314 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7ff8be67 315 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7ff8be67 316 19:58:53.560 04/23/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1175, dst port 4005 317 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 318 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 319 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 320 19:58:53.560 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys