EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:20:05.677 04/24/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:20:05.757 04/24/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:20:05.757 04/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:20:05.817 04/24/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1572 for TCP connection. 5 21:20:05.827 04/24/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:20:05.827 04/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:20:05.827 04/24/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1572, dst port 4005 8 21:20:06.729 04/24/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1572 9 21:20:06.729 04/24/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1572, dst port 4005 10 21:20:06.729 04/24/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:20:07.229 04/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:20:07.229 04/24/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:20:07.249 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:20:07.560 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:20:07.560 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:20:07.560 04/24/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:20:07.560 04/24/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:20:07.560 04/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:20:07.560 04/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:20:07.570 04/24/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:20:07.570 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:20:07.570 04/24/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:20:07.570 04/24/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:20:07.690 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:20:07.690 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:20:07.690 04/24/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 21:20:07.690 04/24/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=157DCE82A0E85D86 R_Cookie=EF44961064065F0D) reason = DEL_REASON_LOAD_BALANCING 28 21:20:07.690 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:20:08.231 04/24/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=157DCE82A0E85D86 R_Cookie=EF44961064065F0D) reason = DEL_REASON_LOAD_BALANCING 30 21:20:08.231 04/24/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:20:08.231 04/24/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 21:20:08.231 04/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 21:20:08.241 04/24/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:20:08.731 04/24/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1572, dst port 4005 35 21:20:08.731 04/24/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1572, dst port 4005 36 21:20:08.731 04/24/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1572 37 21:20:08.731 04/24/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1572, dst port 4005 38 21:20:08.731 04/24/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 21:20:09.232 04/24/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 21:20:09.242 04/24/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 21:20:09.242 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 21:20:09.523 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 21:20:09.523 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 21:20:09.523 04/24/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:20:09.523 04/24/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:20:09.523 04/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:20:09.523 04/24/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:20:09.533 04/24/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:20:09.533 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 21:20:09.533 04/24/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:20:09.533 04/24/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:20:09.653 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 21:20:09.653 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 21:20:09.653 04/24/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:20:19.307 04/24/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:20:19.307 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 21:20:27.178 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 21:20:27.178 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 21:20:27.178 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 21:20:27.178 04/24/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:20:27.238 04/24/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:20:27.238 04/24/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:20:27.238 04/24/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:20:27.238 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 21:20:28.239 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.135 68 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:20:28.239 04/24/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:20:28.239 04/24/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:20:28.250 04/24/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.135, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 21:20:28.250 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 21:20:28.270 04/24/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 21:20:28.270 04/24/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 21:20:28.390 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 21:20:28.390 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 21:20:28.390 04/24/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 21:20:28.390 04/24/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 19 seconds, setting expiry to 86381 seconds from now 89 21:20:28.400 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 21:20:28.400 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 21:20:28.400 04/24/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 21:20:28.400 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 21:20:28.400 04/24/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=73062D23 OUTBOUND SPI = 0x247A9D2D INBOUND SPI = 0x46310361) 94 21:20:28.400 04/24/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x247A9D2D 95 21:20:28.400 04/24/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x46310361 96 21:20:30.833 04/24/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.135/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 21:20:30.973 04/24/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 21:20:31.003 04/24/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 21:20:31.023 04/24/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.1.22.239. Current address(es): 10.1.22.239, 10.13.32.135. 100 21:20:31.023 04/24/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.135. Current address(es): 10.1.22.239, 10.13.32.135. 101 21:20:31.194 04/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:20:31.194 04/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x2d9d7a24 into key list 103 21:20:31.194 04/24/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:20:31.204 04/24/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x61033146 into key list 105 21:20:31.204 04/24/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.135 106 21:20:34.268 04/24/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x2d9d7a24 for inbound key with SPI=0x61033146 107 21:25:10.151 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 108 21:30:10.224 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 109 21:32:41.942 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657614 110 21:32:41.942 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 111 21:32:46.949 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657615 112 21:32:46.949 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 113 21:32:47.070 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 114 21:32:47.070 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 115 21:32:47.070 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657616, seq# expected = 751657616 116 21:35:10.656 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 117 21:36:13.246 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657616 118 21:36:13.246 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 119 21:36:13.496 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 120 21:36:13.496 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 121 21:36:13.496 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657617, seq# expected = 751657617 122 21:40:11.092 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 123 21:45:11.533 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 124 21:50:11.973 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 125 21:55:12.411 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 126 22:00:13.910 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 127 22:05:14.358 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 128 22:10:14.286 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 129 22:15:14.346 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 130 22:20:14.761 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 131 22:22:39.972 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657617 132 22:22:40.082 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 133 22:22:40.273 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 134 22:22:40.283 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 135 22:22:40.283 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657618, seq# expected = 751657618 136 22:25:14.877 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 137 22:30:15.296 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 138 22:35:15.299 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 139 22:40:15.321 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 140 22:45:16.205 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 141 22:50:16.668 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 142 22:55:17.151 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 143 23:00:17.604 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 144 23:05:17.947 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 145 23:10:18.901 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 146 23:15:19.354 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 147 23:20:19.296 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 148 23:21:16.305 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657618 149 23:21:16.305 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 150 23:21:16.425 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 151 23:21:16.425 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 152 23:21:16.425 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657619, seq# expected = 751657619 153 23:21:57.318 04/24/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657619 154 23:21:57.318 04/24/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 155 23:21:57.538 04/24/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 156 23:21:57.548 04/24/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 157 23:21:57.548 04/24/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657620, seq# expected = 751657620 158 23:25:19.901 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 159 23:30:20.224 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 160 23:35:20.507 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 161 23:40:20.134 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 162 23:45:22.078 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 163 23:50:22.041 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 164 23:55:21.923 04/24/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 165 00:00:22.877 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 166 00:05:22.930 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 167 00:10:22.792 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 168 00:15:23.194 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 169 00:18:16.106 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657620 170 00:18:16.106 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 171 00:18:16.467 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 172 00:18:16.507 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 173 00:18:16.517 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657621, seq# expected = 751657621 174 00:18:46.732 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657621 175 00:18:46.732 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 176 00:18:46.842 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 177 00:18:46.842 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 178 00:18:46.842 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657622, seq# expected = 751657622 179 00:19:02.230 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657622 180 00:19:02.230 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 181 00:19:02.350 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 182 00:19:02.350 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 183 00:19:02.350 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657623, seq# expected = 751657623 184 00:20:22.877 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 185 00:25:23.563 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 186 00:30:23.618 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 187 00:35:24.174 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 188 00:40:24.269 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 189 00:45:23.843 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 190 00:50:24.487 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 191 00:55:24.796 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 192 01:00:25.182 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 193 01:02:35.831 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657623 194 01:02:35.891 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 195 01:02:36.021 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 196 01:02:36.021 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 197 01:02:36.021 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657624, seq# expected = 751657624 198 01:03:37.996 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657624 199 01:03:37.996 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 200 01:03:38.187 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 201 01:03:38.187 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 202 01:03:38.187 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657625, seq# expected = 751657625 203 01:03:53.515 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657625 204 01:03:53.515 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 205 01:03:53.636 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 206 01:03:53.636 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 207 01:03:53.636 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657626, seq# expected = 751657626 208 01:05:26.078 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 209 01:10:26.014 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 210 01:14:34.797 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657626 211 01:14:34.997 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 212 01:14:35.227 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 213 01:14:35.227 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 214 01:14:35.227 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657627, seq# expected = 751657627 215 01:15:26.360 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 216 01:20:27.346 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 217 01:21:39.585 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657627 218 01:21:39.585 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 219 01:21:39.706 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 220 01:21:39.706 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 221 01:21:39.706 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657628, seq# expected = 751657628 222 01:23:20.906 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657628 223 01:23:20.906 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 224 01:23:21.027 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 225 01:23:21.027 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 226 01:23:21.027 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657629, seq# expected = 751657629 227 01:25:27.257 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 228 01:26:39.367 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657629 229 01:26:39.377 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 230 01:26:39.497 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 231 01:26:39.497 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 232 01:26:39.497 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657630, seq# expected = 751657630 233 01:30:27.713 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 234 01:35:28.169 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 235 01:38:43.466 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657630 236 01:38:43.466 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 01:38:43.586 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 01:38:43.586 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 01:38:43.586 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657631, seq# expected = 751657631 240 01:40:28.405 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 241 01:45:28.671 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 242 01:50:29.127 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 243 01:55:30.007 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 244 02:00:29.847 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 245 02:02:40.491 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657631 246 02:02:40.491 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 02:02:40.611 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 02:02:40.611 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 02:02:40.611 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657632, seq# expected = 751657632 250 02:05:30.230 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 251 02:09:49.095 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657632 252 02:09:49.105 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 253 02:09:49.265 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 02:09:49.275 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 255 02:09:49.275 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657633, seq# expected = 751657633 256 02:10:30.152 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 257 02:14:37.581 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657633 258 02:14:37.751 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 259 02:14:38.111 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 260 02:14:38.111 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 261 02:14:38.111 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657634, seq# expected = 751657634 262 02:15:31.296 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 263 02:20:31.719 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 264 02:25:32.142 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 265 02:27:06.295 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=23467) 266 02:27:12.273 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=2221) 267 02:27:17.290 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=44974) 268 02:27:22.297 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=30896) 269 02:30:32.589 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 270 02:35:33.041 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 271 02:38:38.794 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657634 272 02:38:38.794 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 273 02:38:38.964 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 274 02:38:38.964 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 275 02:38:38.964 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657635, seq# expected = 751657635 276 02:40:33.467 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 277 02:45:40.392 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 278 02:50:32.746 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 1572, flags 10h 279 02:50:40.708 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 280 02:55:41.124 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 281 03:00:41.540 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 282 03:02:42.214 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657635 283 03:02:42.214 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 284 03:02:42.344 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 285 03:02:42.344 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 286 03:02:42.344 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657636, seq# expected = 751657636 287 03:05:42.113 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 288 03:10:42.508 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 289 03:14:41.186 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657636 290 03:14:41.186 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 291 03:14:41.316 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 292 03:14:41.316 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 293 03:14:41.316 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657637, seq# expected = 751657637 294 03:15:41.775 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 295 03:20:42.713 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 296 03:25:43.151 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 297 03:26:45.242 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657637 298 03:26:45.242 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 299 03:26:45.572 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 300 03:26:45.572 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 301 03:26:45.572 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657638, seq# expected = 751657638 302 03:30:43.599 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 303 03:35:44.037 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 304 03:38:41.786 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657638 305 03:38:41.786 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 306 03:38:41.937 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 307 03:38:41.937 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 308 03:38:41.937 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657639, seq# expected = 751657639 309 03:40:44.976 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 310 03:43:47.262 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=65201) 311 03:43:56.806 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=51379) 312 03:44:02.814 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=61621) 313 03:44:11.287 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=17848) 314 03:44:16.795 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=41913) 315 03:44:22.313 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=32187) 316 03:45:07.369 04/25/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x2d9d7a24 is about to expire, requesting a new one 317 03:45:07.389 04/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.135, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 318 03:45:07.389 04/25/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=E4DE1485) Initiator = ID=10.13.32.135 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 319 03:45:07.439 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 320 03:45:07.589 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 321 03:45:07.589 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 322 03:45:07.589 04/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 323 03:45:07.589 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 324 03:45:07.589 04/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=E4DE1485 OUTBOUND SPI = 0x1FD12635 INBOUND SPI = 0x5E0D2183) 325 03:45:07.589 04/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x1FD12635 326 03:45:07.589 04/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x5E0D2183 327 03:45:07.589 04/25/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 328 03:45:08.380 04/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 329 03:45:08.380 04/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3526d11f into key list 330 03:45:08.380 04/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 331 03:45:08.380 04/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x83210d5e into key list 332 03:45:37.583 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 333 03:45:37.583 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 334 03:45:37.583 04/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 247A9D2D INBOUND SPI = 46310361) 335 03:45:37.583 04/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=73062D23 336 03:45:38.414 04/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x61033146 337 03:45:38.414 04/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x61033146 338 03:45:38.414 04/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x2d9d7a24 339 03:45:38.414 04/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x2d9d7a24 340 03:45:44.923 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 341 03:46:25.983 04/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x3526d11f for inbound key with SPI=0x83210d5e 342 03:50:45.361 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 343 03:55:45.799 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 344 04:00:46.237 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 345 04:02:37.740 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657639 346 04:02:37.740 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 347 04:02:37.860 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 348 04:02:37.860 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 349 04:02:37.860 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657640, seq# expected = 751657640 350 04:05:46.495 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 351 04:10:46.939 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 352 04:14:36.737 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657640 353 04:14:36.737 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 354 04:14:36.868 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 355 04:14:36.868 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 356 04:14:36.868 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657641, seq# expected = 751657641 357 04:15:46.832 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 358 04:20:47.765 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 359 04:21:42.844 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=61884) 360 04:21:48.352 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=10430) 361 04:21:58.867 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=50556) 362 04:22:04.375 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=10110) 363 04:22:10.383 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=8320) 364 04:25:48.207 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 365 04:30:49.139 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 366 04:35:49.071 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 367 04:38:36.311 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657641 368 04:38:36.311 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 369 04:38:36.441 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 370 04:38:36.441 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 371 04:38:36.441 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657642, seq# expected = 751657642 372 04:40:49.503 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 373 04:45:50.275 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 374 04:50:50.266 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 375 04:55:50.648 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 376 05:00:51.110 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 377 05:05:51.522 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 378 05:10:51.954 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 379 05:14:36.778 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657642 380 05:14:36.778 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 381 05:14:36.898 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 382 05:14:36.898 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 383 05:14:36.898 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657643, seq# expected = 751657643 384 05:15:52.416 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 385 05:16:39.484 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=29570) 386 05:16:45.503 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=15493) 387 05:17:01.516 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=20615) 388 05:17:13.533 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=2102) 389 05:17:14.535 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=13625) 390 05:20:52.870 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 391 05:25:53.361 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 392 05:30:53.869 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 393 05:35:54.197 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 394 05:40:54.635 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 395 05:45:55.083 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 396 05:50:36.964 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657643 397 05:50:36.964 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 398 05:50:37.194 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 399 05:50:37.194 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 400 05:50:37.194 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657644, seq# expected = 751657644 401 05:50:55.511 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 402 05:55:21.899 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=49211) 403 05:55:32.925 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=9535) 404 05:55:37.933 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=5954) 405 05:55:47.937 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=53572) 406 05:55:54.968 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=10004) 407 05:55:55.959 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 408 05:56:02.969 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=55572) 409 05:57:37.107 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657644 410 05:57:37.107 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 411 05:57:37.227 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 412 05:57:37.227 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 413 05:57:37.227 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657645, seq# expected = 751657645 414 06:00:56.367 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 415 06:05:56.845 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 416 06:10:09.674 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657645 417 06:10:09.674 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 418 06:10:09.804 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 419 06:10:09.804 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 420 06:10:09.804 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657646, seq# expected = 751657646 421 06:10:57.263 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 422 06:15:57.701 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 423 06:20:58.139 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 424 06:23:42.389 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657646 425 06:23:42.389 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 426 06:23:42.519 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 427 06:23:42.519 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 428 06:23:42.519 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657647, seq# expected = 751657647 429 06:24:39.472 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657647 430 06:24:39.472 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 431 06:24:39.592 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 432 06:24:39.592 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 433 06:24:39.592 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657648, seq# expected = 751657648 434 06:25:58.577 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 435 06:30:59.004 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 436 06:35:59.395 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 437 06:38:39.625 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657648 438 06:38:39.625 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 439 06:38:39.755 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 440 06:38:39.755 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 441 06:38:39.755 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657649, seq# expected = 751657649 442 06:40:59.847 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 443 06:43:58.564 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657649 444 06:43:58.564 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 445 06:43:58.714 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 446 06:43:58.714 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 447 06:43:58.714 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657650, seq# expected = 751657650 448 06:46:00.259 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 449 06:47:58.919 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657650 450 06:47:58.919 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 451 06:47:59.069 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 452 06:47:59.069 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 453 06:47:59.069 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657651, seq# expected = 751657651 454 06:50:14.124 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657651 455 06:50:14.124 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 456 06:50:14.254 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 457 06:50:14.254 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 458 06:50:14.254 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657652, seq# expected = 751657652 459 06:51:00.701 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 460 06:56:01.133 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 461 07:01:01.575 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 462 07:02:39.716 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657652 463 07:02:39.716 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 464 07:02:39.836 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 465 07:02:39.836 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 466 07:02:39.836 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657653, seq# expected = 751657653 467 07:06:02.017 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 468 07:06:33.061 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=40469) 469 07:06:38.078 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=53527) 470 07:06:43.076 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=38936) 471 07:06:54.091 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=22297) 472 07:07:00.100 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=17849) 473 07:07:05.107 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=20668) 474 07:11:02.449 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 475 07:14:39.260 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657653 476 07:14:39.260 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 477 07:14:39.401 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 478 07:14:39.401 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 479 07:14:39.401 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657654, seq# expected = 751657654 480 07:16:02.390 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 481 07:21:03.313 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 482 07:26:03.745 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 483 07:26:39.796 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657654 484 07:26:39.796 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 485 07:26:39.917 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 486 07:26:39.917 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 487 07:26:39.917 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657655, seq# expected = 751657655 488 07:31:04.727 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 489 07:36:04.683 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 490 07:38:37.375 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657655 491 07:38:37.375 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 492 07:38:37.505 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 493 07:38:37.505 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 494 07:38:37.505 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657656, seq# expected = 751657656 495 07:41:05.095 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 496 07:42:18.320 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 1572, flags 10h 497 07:45:24.367 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=45246) 498 07:45:32.379 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=5825) 499 07:45:42.393 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=32451) 500 07:45:52.908 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=50117) 501 07:46:00.449 04/25/06 Sev=Info/4 IPSEC/0x6370001A Receive: Purging stale cached fragment(s). (Peer=137.69.115.17 FragId=12819) 502 07:46:05.426 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 503 07:51:05.879 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 504 07:56:06.321 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 505 08:01:06.342 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 506 08:04:40.290 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657656 507 08:04:40.290 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 508 08:04:40.420 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 509 08:04:40.420 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 510 08:04:40.420 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657657, seq# expected = 751657657 511 08:04:51.265 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657657 512 08:04:51.265 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 513 08:04:51.386 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 514 08:04:51.396 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 515 08:04:51.396 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657658, seq# expected = 751657658 516 08:05:05.376 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657658 517 08:05:05.376 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 518 08:05:05.506 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 519 08:05:05.506 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 520 08:05:05.506 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657659, seq# expected = 751657659 521 08:05:46.675 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 751657659 522 08:05:46.675 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 523 08:05:46.795 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 524 08:05:46.795 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 525 08:05:46.795 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 751657660, seq# expected = 751657660 526 08:06:06.704 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1572, dst port 4005 527 08:11:00.877 04/25/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 528 08:11:00.877 04/25/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 529 08:11:01.097 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 530 08:11:01.097 04/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1FD12635 INBOUND SPI = 5E0D2183) 531 08:11:01.097 04/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=E4DE1485 532 08:11:01.107 04/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D474D856F071DE78 R_Cookie=94ABC293321A8BBA) reason = DEL_REASON_RESET_SADB 533 08:11:01.187 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 534 08:11:01.187 04/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D474D856F071DE78 R_Cookie=94ABC293321A8BBA) reason = DEL_REASON_RESET_SADB 535 08:11:01.237 04/25/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 536 08:11:01.257 04/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 537 08:11:01.287 04/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 538 08:11:01.337 04/25/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1572 for TCP connection. 539 08:11:01.337 04/25/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 10:50:30 540 08:11:01.738 04/25/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 541 08:11:12.213 04/25/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 542 08:11:12.293 04/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 543 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x83210d5e 544 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x83210d5e 545 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3526d11f 546 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3526d11f 547 08:11:12.293 04/25/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1572 548 08:11:12.293 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 1572, flags 14h 549 08:11:12.293 04/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1572, dst port 4005 550 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 551 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 552 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 553 08:11:12.293 04/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys