EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 20:07:47.358 04/23/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 20:07:47.518 04/23/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 20:07:47.518 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 20:07:51.574 04/23/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1127 for TCP connection. 5 20:07:51.574 04/23/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 20:07:51.574 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 20:07:51.574 04/23/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1127, dst port 4005 8 20:07:52.425 04/23/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1127 9 20:07:52.425 04/23/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1127, dst port 4005 10 20:07:52.425 04/23/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 20:07:52.936 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 20:07:52.956 04/23/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 20:07:53.006 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 20:07:53.286 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 20:07:53.286 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 20:07:53.286 04/23/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 20:07:53.286 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 20:07:53.286 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 20:07:53.286 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 20:07:53.296 04/23/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 20:07:53.296 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 20:07:53.296 04/23/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 20:07:53.296 04/23/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 20:07:53.416 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 20:07:53.416 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 20:07:53.416 04/23/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 20:07:53.416 04/23/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E675E54CFAB75CB2 R_Cookie=3A17BC7280329EC6) reason = DEL_REASON_LOAD_BALANCING 28 20:07:53.416 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 20:07:53.927 04/23/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E675E54CFAB75CB2 R_Cookie=3A17BC7280329EC6) reason = DEL_REASON_LOAD_BALANCING 30 20:07:53.927 04/23/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 20:07:53.927 04/23/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 20:07:53.927 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 20:07:53.927 04/23/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 20:07:54.428 04/23/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1127, dst port 4005 35 20:07:54.428 04/23/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1127, dst port 4005 36 20:07:54.428 04/23/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1127 37 20:07:54.428 04/23/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1127, dst port 4005 38 20:07:54.428 04/23/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 20:07:54.928 04/23/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 20:07:54.938 04/23/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 20:07:54.948 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 20:07:55.229 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 20:07:55.229 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 20:07:55.229 04/23/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 20:07:55.229 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 20:07:55.229 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 20:07:55.229 04/23/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 20:07:55.229 04/23/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 20:07:55.229 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 20:07:55.229 04/23/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 20:07:55.229 04/23/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 20:07:55.349 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 20:07:55.349 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 20:07:55.349 04/23/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 20:08:10.291 04/23/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 20:08:10.291 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 20:08:12.764 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 20:08:12.764 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 20:08:12.764 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 20:08:12.764 04/23/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 20:08:12.854 04/23/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 20:08:12.854 04/23/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 20:08:12.854 04/23/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 20:08:12.854 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 20:08:13.946 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.100 68 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 20:08:13.946 04/23/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 20:08:13.966 04/23/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 20:08:13.976 04/23/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.100, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 20:08:13.976 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 20:08:13.976 04/23/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 20:08:13.976 04/23/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 20:08:14.126 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 20 seconds, setting expiry to 86380 seconds from now 89 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 20:08:14.126 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 20:08:14.126 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=4E345DE6 OUTBOUND SPI = 0x321D6F38 INBOUND SPI = 0x5EA8BC0A) 94 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x321D6F38 95 20:08:14.126 04/23/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x5EA8BC0A 96 20:08:16.479 04/23/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.100/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 20:08:16.509 04/23/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 20:08:16.529 04/23/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 20:08:16.539 04/23/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.1.22.42. Current address(es): 10.1.22.42, 10.13.32.100. 100 20:08:16.539 04/23/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.100. Current address(es): 10.1.22.42, 10.13.32.100. 101 20:08:16.750 04/23/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 20:08:16.750 04/23/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x386f1d32 into key list 103 20:08:16.750 04/23/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 20:08:16.750 04/23/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0abca85e into key list 105 20:08:16.750 04/23/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.100 106 20:08:21.467 04/23/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x386f1d32 for inbound key with SPI=0x0abca85e 107 20:10:54.186 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368566 108 20:10:54.186 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 20:10:54.316 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 20:10:54.316 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 20:10:54.316 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368567, seq# expected = 2297368567 112 20:12:55.861 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 113 20:17:56.293 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 114 20:18:11.815 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368567 115 20:18:11.815 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 116 20:18:11.936 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 117 20:18:11.936 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 118 20:18:11.936 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368568, seq# expected = 2297368568 119 20:22:56.437 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 120 20:27:56.571 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 121 20:30:17.840 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368568 122 20:30:17.840 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 123 20:30:17.990 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 124 20:30:17.990 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 125 20:30:17.990 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368569, seq# expected = 2297368569 126 20:32:57.069 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 127 20:37:57.501 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 128 20:42:14.920 04/23/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368569 129 20:42:14.920 04/23/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 130 20:42:15.051 04/23/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 131 20:42:15.051 04/23/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 132 20:42:15.051 04/23/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368570, seq# expected = 2297368570 133 20:42:57.493 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 134 20:47:58.495 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 135 20:52:58.483 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 136 20:57:58.468 04/23/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 137 21:02:59.209 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 138 21:06:13.490 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368570 139 21:06:13.490 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 140 21:06:13.811 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 141 21:06:13.811 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 142 21:06:13.811 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368571, seq# expected = 2297368571 143 21:07:58.688 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 144 21:13:00.122 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 145 21:18:00.061 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 146 21:18:14.103 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368571 147 21:18:14.143 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 148 21:18:14.653 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 149 21:18:14.653 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 150 21:18:14.653 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368572, seq# expected = 2297368572 151 21:23:00.092 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 152 21:28:00.521 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 153 21:30:15.214 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368572 154 21:30:15.214 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 155 21:30:15.344 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 156 21:30:15.344 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 157 21:30:15.344 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368573, seq# expected = 2297368573 158 21:33:00.955 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 159 21:38:01.488 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 160 21:42:17.026 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368573 161 21:42:22.323 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 162 21:42:23.715 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 163 21:42:23.715 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 164 21:42:23.725 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368574, seq# expected = 2297368574 165 21:43:04.785 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 166 21:48:05.467 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 167 21:53:06.587 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 168 21:54:16.299 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368574 169 21:54:16.590 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 170 21:54:16.800 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 171 21:54:16.800 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 172 21:54:16.800 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368575, seq# expected = 2297368575 173 21:58:06.160 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 174 22:03:06.171 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 175 22:04:28.299 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368575 176 22:04:28.299 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 177 22:04:28.419 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 178 22:04:28.419 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 179 22:04:28.419 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368576, seq# expected = 2297368576 180 22:06:19.111 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368576 181 22:06:19.111 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 182 22:06:19.241 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 183 22:06:19.241 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 184 22:06:19.241 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368577, seq# expected = 2297368577 185 22:08:05.824 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 186 22:13:06.463 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 187 22:18:06.898 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 188 22:18:19.416 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368577 189 22:18:19.416 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 190 22:18:19.536 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 191 22:18:19.546 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 192 22:18:19.546 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368578, seq# expected = 2297368578 193 22:23:07.332 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 194 22:28:11.578 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 195 22:30:22.176 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368578 196 22:30:34.253 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 197 22:30:34.423 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 198 22:30:34.423 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 199 22:30:34.423 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368579, seq# expected = 2297368579 200 22:33:11.249 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 201 22:38:11.350 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 202 22:42:16.805 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368579 203 22:42:16.885 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 204 22:42:17.095 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 205 22:42:17.095 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 206 22:42:17.095 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368580, seq# expected = 2297368580 207 22:43:10.933 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 208 22:48:11.987 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 209 22:53:12.429 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 210 22:54:18.584 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368580 211 22:54:18.684 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 212 22:54:18.835 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 213 22:54:18.835 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 214 22:54:18.835 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368581, seq# expected = 2297368581 215 22:58:12.842 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 216 23:03:12.916 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 217 23:06:14.697 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368581 218 23:06:14.747 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 219 23:06:14.907 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 220 23:06:14.907 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 221 23:06:14.907 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368582, seq# expected = 2297368582 222 23:08:12.847 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 223 23:13:13.810 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 224 23:18:14.272 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 225 23:18:17.276 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368582 226 23:18:17.276 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 227 23:18:17.396 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 228 23:18:17.396 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 229 23:18:17.396 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368583, seq# expected = 2297368583 230 23:23:14.884 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 231 23:28:14.505 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 232 23:30:18.213 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368583 233 23:30:18.213 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 234 23:30:18.343 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 235 23:30:18.343 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 236 23:30:18.343 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368584, seq# expected = 2297368584 237 23:33:14.967 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 238 23:38:14.998 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 239 23:42:18.959 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368584 240 23:42:18.959 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 241 23:42:19.079 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 242 23:42:19.079 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 243 23:42:19.079 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368585, seq# expected = 2297368585 244 23:43:15.070 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 245 23:44:50.717 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368585 246 23:44:50.757 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 23:44:50.897 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 23:44:50.897 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 23:44:50.897 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368586, seq# expected = 2297368586 250 23:46:02.320 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368586 251 23:46:02.320 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 252 23:46:02.440 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 253 23:46:02.440 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 254 23:46:02.440 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368587, seq# expected = 2297368587 255 23:48:15.043 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 256 23:53:15.639 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 257 23:58:15.703 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 258 00:03:15.757 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 259 00:06:19.096 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368587 260 00:06:19.096 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 261 00:06:19.226 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 262 00:06:19.226 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 263 00:06:19.226 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368588, seq# expected = 2297368588 264 00:08:15.310 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 265 00:09:50.486 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368588 266 00:09:50.486 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 267 00:09:50.727 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 268 00:09:50.727 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 269 00:09:50.727 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368589, seq# expected = 2297368589 270 00:13:15.865 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 271 00:18:15.919 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 272 00:18:16.921 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368589 273 00:18:16.921 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 274 00:18:17.042 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 275 00:18:17.042 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 276 00:18:17.042 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368590, seq# expected = 2297368590 277 00:23:16.084 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 278 00:28:16.128 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 279 00:30:17.853 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368590 280 00:30:17.853 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 281 00:30:17.973 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 282 00:30:17.973 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 283 00:30:17.973 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368591, seq# expected = 2297368591 284 00:33:16.182 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 285 00:38:16.236 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 286 00:42:19.685 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368591 287 00:42:19.685 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 288 00:42:19.816 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 289 00:42:19.816 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 290 00:42:19.816 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368592, seq# expected = 2297368592 291 00:43:15.789 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 292 00:48:16.344 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 293 00:53:16.398 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 294 00:54:22.520 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368592 295 00:54:22.520 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 00:54:22.640 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 297 00:54:22.640 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 298 00:54:22.640 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368593, seq# expected = 2297368593 299 00:58:16.452 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 300 01:03:16.506 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 301 01:06:24.353 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368593 302 01:06:24.353 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 303 01:06:24.483 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 304 01:06:24.483 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 305 01:06:24.483 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368594, seq# expected = 2297368594 306 01:08:16.059 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 307 01:13:16.614 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 308 01:18:16.669 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 309 01:18:26.687 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368594 310 01:18:26.687 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 311 01:18:26.807 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 312 01:18:26.807 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 313 01:18:26.807 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368595, seq# expected = 2297368595 314 01:23:16.723 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 315 01:28:16.777 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 316 01:30:24.012 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368595 317 01:30:24.012 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 318 01:30:24.142 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 319 01:30:24.142 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 320 01:30:24.142 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368596, seq# expected = 2297368596 321 01:33:17.496 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 322 01:38:17.377 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 323 01:42:20.824 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368596 324 01:42:20.824 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 325 01:42:20.944 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 326 01:42:20.944 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 327 01:42:20.944 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368597, seq# expected = 2297368597 328 01:43:16.927 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 329 01:46:48.317 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=36716) 330 01:46:54.329 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=53101) 331 01:46:59.839 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=11887) 332 01:47:05.349 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=60528) 333 01:48:17.482 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 334 01:53:17.536 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 335 01:54:22.656 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368597 336 01:54:22.656 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 337 01:54:22.777 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 338 01:54:22.777 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 339 01:54:22.777 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368598, seq# expected = 2297368598 340 01:58:17.590 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 341 02:03:17.644 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 342 02:06:25.491 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368598 343 02:06:25.491 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 344 02:06:25.621 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 345 02:06:25.621 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 346 02:06:25.621 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368599, seq# expected = 2297368599 347 02:08:17.198 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 348 02:13:17.753 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 349 02:18:17.807 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 350 02:18:27.825 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368599 351 02:18:27.825 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 352 02:18:27.945 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 353 02:18:27.945 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 354 02:18:27.945 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368600, seq# expected = 2297368600 355 02:23:17.380 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 356 02:28:17.915 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 357 02:30:24.649 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368600 358 02:30:24.649 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 359 02:30:24.779 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 360 02:30:24.779 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 361 02:30:24.779 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368601, seq# expected = 2297368601 362 02:32:42.403 04/24/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x386f1d32 is about to expire, requesting a new one 363 02:32:42.483 04/24/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.100, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 364 02:32:42.493 04/24/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=46F5F25D) Initiator = ID=10.13.32.100 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 365 02:32:42.543 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 366 02:32:42.694 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 367 02:32:42.694 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 368 02:32:42.694 04/24/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 369 02:32:42.694 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 370 02:32:42.694 04/24/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=46F5F25D OUTBOUND SPI = 0x1B1E4D4B INBOUND SPI = 0x4AFFC49A) 371 02:32:42.694 04/24/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x1B1E4D4B 372 02:32:42.694 04/24/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4AFFC49A 373 02:32:42.694 04/24/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 374 02:32:43.405 04/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 375 02:32:43.405 04/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4b4d1e1b into key list 376 02:32:43.405 04/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 377 02:32:43.405 04/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9ac4ff4a into key list 378 02:33:12.699 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 379 02:33:12.719 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 380 02:33:12.729 04/24/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 321D6F38 INBOUND SPI = 5EA8BC0A) 381 02:33:12.729 04/24/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=4E345DE6 382 02:33:12.970 04/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0abca85e 383 02:33:12.970 04/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0abca85e 384 02:33:12.970 04/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x386f1d32 385 02:33:12.970 04/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x386f1d32 386 02:33:17.468 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 387 02:34:06.559 04/24/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4b4d1e1b for inbound key with SPI=0x9ac4ff4a 388 02:38:18.023 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 389 02:42:24.184 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368601 390 02:42:24.184 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 391 02:42:24.314 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 392 02:42:24.314 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 393 02:42:24.314 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368602, seq# expected = 2297368602 394 02:43:18.449 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 395 02:48:18.605 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 396 02:53:18.952 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 397 02:54:24.528 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368602 398 02:54:24.528 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 399 02:54:24.648 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 400 02:54:24.648 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 401 02:54:24.648 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368603, seq# expected = 2297368603 402 02:58:19.300 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 403 03:03:19.648 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 404 03:06:22.360 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368603 405 03:06:22.360 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 406 03:06:22.510 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 407 03:06:22.510 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 408 03:06:22.510 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368604, seq# expected = 2297368604 409 03:08:19.496 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 410 03:13:20.344 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 411 03:18:20.692 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 412 03:18:25.698 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368604 413 03:18:25.698 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 414 03:18:25.818 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 415 03:18:25.818 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 416 03:18:25.818 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368605, seq# expected = 2297368605 417 03:23:21.040 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 418 03:28:21.388 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 419 03:28:26.394 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=35186) 420 03:28:31.900 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=64371) 421 03:28:37.407 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=21109) 422 03:28:42.913 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=14455) 423 03:28:48.420 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=42104) 424 03:28:53.926 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=3962) 425 03:30:22.529 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368605 426 03:30:22.529 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 427 03:30:22.659 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 428 03:30:22.659 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 429 03:30:22.659 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368606, seq# expected = 2297368606 430 03:33:21.736 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 431 03:34:09.291 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=17531) 432 03:34:14.297 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=4221) 433 03:34:20.304 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=15063) 434 03:34:25.811 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=45529) 435 03:34:30.816 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=50907) 436 03:34:36.323 04/24/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=59358) 437 03:38:22.084 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 438 03:42:19.359 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368606 439 03:42:19.359 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 440 03:42:19.489 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 441 03:42:19.489 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 442 03:42:19.489 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368607, seq# expected = 2297368607 443 03:43:21.932 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 444 03:48:22.520 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 445 03:53:22.880 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 446 03:54:17.959 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368607 447 03:54:17.959 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 448 03:54:18.079 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 449 03:54:18.079 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 450 03:54:18.079 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368608, seq# expected = 2297368608 451 03:58:23.312 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 452 04:03:24.245 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 453 04:06:19.997 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2297368608 454 04:06:19.997 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 455 04:06:20.128 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 456 04:06:20.128 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 457 04:06:20.128 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2297368609, seq# expected = 2297368609 458 04:08:24.136 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 459 04:13:24.568 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 460 04:18:25.000 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 461 04:23:25.432 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1127, dst port 4005 462 04:25:54.837 04/24/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 463 04:25:54.837 04/24/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 464 04:25:54.857 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 465 04:25:54.857 04/24/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1B1E4D4B INBOUND SPI = 4AFFC49A) 466 04:25:54.857 04/24/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=46F5F25D 467 04:25:54.857 04/24/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=EDF0A7D1D701A905 R_Cookie=67DB9CBC6FED52F4) reason = DEL_REASON_RESET_SADB 468 04:25:54.857 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 469 04:25:54.857 04/24/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=EDF0A7D1D701A905 R_Cookie=67DB9CBC6FED52F4) reason = DEL_REASON_RESET_SADB 470 04:25:54.947 04/24/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 471 04:25:54.997 04/24/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 472 04:25:55.488 04/24/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 473 04:25:55.488 04/24/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1127 for TCP connection. 474 04:25:55.488 04/24/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 8:17:39 475 04:25:55.658 04/24/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 476 04:26:00.555 04/24/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 477 04:26:00.555 04/24/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 478 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9ac4ff4a 479 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9ac4ff4a 480 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4b4d1e1b 481 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4b4d1e1b 482 04:26:00.555 04/24/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1127 483 04:26:00.555 04/24/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1127, dst port 4005 484 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 485 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 486 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 487 04:26:00.555 04/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys