EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 10:05:36.220 04/25/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 10:05:36.290 04/25/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 10:05:36.290 04/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 10:05:36.320 04/25/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1133 for TCP connection. 5 10:05:36.330 04/25/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 10:05:36.330 04/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 10:05:36.330 04/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1133, dst port 4005 8 10:05:37.272 04/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1133 9 10:05:37.272 04/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1133, dst port 4005 10 10:05:37.272 04/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 10:05:37.772 04/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 10:05:37.782 04/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 10:05:37.812 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 10:05:38.043 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 10:05:38.043 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 10:05:38.043 04/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 10:05:38.043 04/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 10:05:38.043 04/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 10:05:38.043 04/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 10:05:38.143 04/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 10:05:38.143 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 10:05:38.153 04/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 10:05:38.153 04/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 10:05:38.233 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 10:05:38.233 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 10:05:38.233 04/25/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 10:05:38.243 04/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=39F689491A6A7C34 R_Cookie=72A64BF3CDAD79ED) reason = DEL_REASON_LOAD_BALANCING 28 10:05:38.243 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 10:05:38.774 04/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=39F689491A6A7C34 R_Cookie=72A64BF3CDAD79ED) reason = DEL_REASON_LOAD_BALANCING 30 10:05:38.774 04/25/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 10:05:38.774 04/25/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 10:05:38.774 04/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 10:05:38.794 04/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 10:05:39.285 04/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1133, dst port 4005 35 10:05:39.285 04/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1133, dst port 4005 36 10:05:39.285 04/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1133 37 10:05:39.285 04/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1133, dst port 4005 38 10:05:39.285 04/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 10:05:39.775 04/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 10:05:39.785 04/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 10:05:39.815 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 10:05:40.046 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 10:05:40.046 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 10:05:40.046 04/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 10:05:40.046 04/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 10:05:40.046 04/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 10:05:40.046 04/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 10:05:40.046 04/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 10:05:40.046 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 10:05:40.046 04/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 10:05:40.046 04/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 10:05:40.136 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 10:05:40.136 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 10:05:40.136 04/25/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 10:05:49.840 04/25/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 10:05:49.840 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 10:05:54.266 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 10:05:54.266 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 10:05:54.266 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 10:05:54.266 04/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 10:05:54.346 04/25/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 10:05:54.346 04/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 10:05:54.346 04/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 10:05:54.346 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 10:05:55.408 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.6.188 68 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 10:05:55.408 04/25/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 10:05:55.428 04/25/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 10:05:55.438 04/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.188, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 10:05:55.438 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 10:05:55.578 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 16 seconds, setting expiry to 86384 seconds from now 87 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 10:05:55.578 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 10:05:55.578 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=A5E4076E OUTBOUND SPI = 0x1CA2424D INBOUND SPI = 0x7836F3E0) 92 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x1CA2424D 93 10:05:55.578 04/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x7836F3E0 94 10:05:58.342 04/25/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.6.188/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 10:05:58.432 04/25/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 10:05:58.452 04/25/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 10:05:58.472 04/25/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.0.192. Current address(es): 192.168.0.192, 10.13.6.188. 98 10:05:58.472 04/25/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.6.188. Current address(es): 192.168.0.192, 10.13.6.188. 99 10:05:58.682 04/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 10:05:58.682 04/25/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 10:05:58.682 04/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 10:05:58.682 04/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4d42a21c into key list 103 10:05:58.682 04/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 10:05:58.682 04/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe0f33678 into key list 105 10:05:58.682 04/25/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.6.188 106 10:06:05.813 04/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4d42a21c for inbound key with SPI=0xe0f33678 107 10:10:40.238 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 108 10:15:40.387 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 109 10:16:53.493 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017078 110 10:16:53.493 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 111 10:16:53.593 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 112 10:16:53.593 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 113 10:16:53.593 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017079, seq# expected = 202017079 114 10:18:24.124 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017079 115 10:18:24.124 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 116 10:18:24.214 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 117 10:18:24.214 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 118 10:18:24.214 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017080, seq# expected = 202017080 119 10:20:40.822 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 120 10:25:40.993 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 121 10:26:53.107 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017080 122 10:26:53.107 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 123 10:26:53.187 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 124 10:26:53.187 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 125 10:26:53.187 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017081, seq# expected = 202017081 126 10:27:03.612 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017081 127 10:27:03.612 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 128 10:27:03.712 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 129 10:27:03.712 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 130 10:27:03.712 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017082, seq# expected = 202017082 131 10:30:25.421 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017082 132 10:30:25.421 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 133 10:30:25.511 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 134 10:30:25.511 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 135 10:30:25.511 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017083, seq# expected = 202017083 136 10:30:41.456 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 137 10:35:41.915 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 138 10:40:42.361 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 139 10:42:23.044 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017083 140 10:42:23.044 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 141 10:42:23.134 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 142 10:42:23.134 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 143 10:42:23.134 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017084, seq# expected = 202017084 144 10:45:42.827 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 145 10:46:57.405 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017084 146 10:46:57.405 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 147 10:46:57.505 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 148 10:46:57.505 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 149 10:46:57.505 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017085, seq# expected = 202017085 150 10:50:43.197 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 151 10:54:18.010 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017085 152 10:54:18.010 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 153 10:54:18.100 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 154 10:54:18.100 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 155 10:54:18.100 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017086, seq# expected = 202017086 156 10:55:44.622 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 157 11:00:45.065 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 158 11:05:45.531 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 159 11:06:22.592 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017086 160 11:06:22.592 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 161 11:06:22.682 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 162 11:06:22.682 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 163 11:06:22.682 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017087, seq# expected = 202017087 164 11:10:46.019 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 165 11:15:45.462 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 166 11:20:45.907 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 167 11:25:46.362 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 168 11:30:46.837 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 169 11:35:47.292 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 170 11:37:03.400 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017087 171 11:37:03.400 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 172 11:37:03.490 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 173 11:37:03.490 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 174 11:37:03.490 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017088, seq# expected = 202017088 175 11:40:47.718 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 176 11:42:14.344 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017088 177 11:42:14.344 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 178 11:42:14.434 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 179 11:42:14.434 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 180 11:42:14.434 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017089, seq# expected = 202017089 181 11:45:48.163 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 182 11:50:49.099 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 183 11:54:17.911 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017089 184 11:54:17.911 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 185 11:54:18.001 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 186 11:54:18.001 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 187 11:54:18.001 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017090, seq# expected = 202017090 188 11:55:49.043 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 189 11:56:54.137 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017090 190 11:56:54.137 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 191 11:56:54.228 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 192 11:56:54.228 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 193 11:56:54.228 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017091, seq# expected = 202017091 194 11:57:04.653 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017091 195 11:57:04.653 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 196 11:57:04.743 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 197 11:57:04.743 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 198 11:57:04.743 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017092, seq# expected = 202017092 199 12:00:49.498 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 200 12:02:56.692 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017092 201 12:02:56.692 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 202 12:02:56.783 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 203 12:02:56.783 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 204 12:02:56.783 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017093, seq# expected = 202017093 205 12:05:49.943 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 206 12:05:57.454 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017093 207 12:05:57.454 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 208 12:05:57.544 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 209 12:05:57.544 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 210 12:05:57.544 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017094, seq# expected = 202017094 211 12:06:17.984 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017094 212 12:06:17.984 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 213 12:06:18.064 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 214 12:06:18.064 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 215 12:06:18.064 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017095, seq# expected = 202017095 216 12:07:03.550 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017095 217 12:07:03.550 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 12:07:03.640 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 12:07:03.640 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 12:07:03.640 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017096, seq# expected = 202017096 221 12:10:50.218 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 222 12:11:09.746 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017096 223 12:11:09.746 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 224 12:11:09.836 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 225 12:11:09.836 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 226 12:11:09.836 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017097, seq# expected = 202017097 227 12:15:51.151 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 228 12:16:53.251 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017097 229 12:16:53.321 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 12:16:53.411 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 231 12:16:53.411 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 232 12:16:53.411 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017098, seq# expected = 202017098 233 12:18:19.385 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017098 234 12:18:19.385 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 235 12:18:19.476 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 236 12:18:19.476 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 237 12:18:19.476 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017099, seq# expected = 202017099 238 12:20:51.155 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 239 12:25:51.089 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 240 12:26:53.179 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017099 241 12:26:53.179 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 242 12:26:53.269 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 243 12:26:53.269 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 244 12:26:53.269 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017100, seq# expected = 202017100 245 12:27:03.695 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017100 246 12:27:03.695 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 247 12:27:03.785 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 248 12:27:03.785 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 249 12:27:03.785 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017101, seq# expected = 202017101 250 12:30:15.468 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017101 251 12:30:15.468 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 12:30:15.559 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 253 12:30:15.559 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 254 12:30:15.559 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017102, seq# expected = 202017102 255 12:30:51.520 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 256 12:35:52.474 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 257 12:40:52.919 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 258 12:45:53.867 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 259 12:50:53.801 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 260 12:55:53.754 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 261 13:00:54.198 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 262 13:05:54.583 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 263 13:07:10.188 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017102 264 13:07:10.188 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 265 13:07:10.298 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 266 13:07:10.298 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 267 13:07:10.298 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017103, seq# expected = 202017103 268 13:10:55.099 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 269 13:12:18.158 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017103 270 13:12:21.242 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 271 13:12:21.973 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 272 13:12:21.973 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 273 13:12:22.043 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017104, seq# expected = 202017104 274 13:15:55.338 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 275 13:20:56.268 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 276 13:25:56.176 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 277 13:30:17.669 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017104 278 13:30:17.789 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 13:30:17.910 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 13:30:17.910 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 13:30:17.910 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017105, seq# expected = 202017105 282 13:30:56.655 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 283 13:35:57.084 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 284 13:40:57.132 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 285 13:42:18.208 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017105 286 13:42:18.208 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 13:42:18.338 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 13:42:18.338 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 13:42:18.338 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017106, seq# expected = 202017106 290 13:42:34.231 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017106 291 13:42:34.231 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 292 13:42:34.341 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 293 13:42:34.341 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 294 13:42:34.341 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017107, seq# expected = 202017107 295 13:45:57.581 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 296 13:50:58.551 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 297 13:54:18.357 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017107 298 13:54:18.357 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 299 13:54:18.447 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 300 13:54:18.447 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 301 13:54:18.447 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017108, seq# expected = 202017108 302 13:55:58.500 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 303 14:00:59.149 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 304 14:05:59.107 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 305 14:06:22.110 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017108 306 14:06:22.160 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 307 14:06:22.250 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 308 14:06:22.250 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 309 14:06:22.250 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017109, seq# expected = 202017109 310 14:10:59.615 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 311 14:16:00.604 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 312 14:18:22.295 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017109 313 14:18:29.065 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 314 14:18:30.227 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 315 14:18:30.227 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 316 14:18:30.307 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017110, seq# expected = 202017110 317 14:21:04.437 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 318 14:26:05.246 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 319 14:30:21.565 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017110 320 14:30:21.715 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 321 14:30:21.916 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 322 14:30:21.916 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 323 14:30:21.916 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017111, seq# expected = 202017111 324 14:31:05.123 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 325 14:36:05.751 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 326 14:36:56.350 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017111 327 14:36:56.931 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 328 14:36:57.101 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 329 14:36:57.101 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 330 14:36:57.101 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017112, seq# expected = 202017112 331 14:41:05.808 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 332 14:46:06.186 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 333 14:51:05.853 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 334 14:56:06.451 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 335 15:01:07.791 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 336 15:06:07.818 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 337 15:07:04.977 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017112 338 15:07:05.047 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 339 15:07:05.237 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 340 15:07:05.237 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 341 15:07:05.237 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017113, seq# expected = 202017113 342 15:11:07.665 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 343 15:16:07.692 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 344 15:21:07.810 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 345 15:26:08.959 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 346 15:31:08.255 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 347 15:36:09.404 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 348 15:41:09.962 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 349 15:46:09.409 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 350 15:46:56.221 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017113 351 15:46:57.243 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 352 15:46:57.363 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 353 15:46:57.363 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 354 15:46:57.363 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017114, seq# expected = 202017114 355 15:51:09.867 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 356 15:56:11.269 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 357 16:01:10.658 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 358 16:06:11.577 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 359 16:06:24.597 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017114 360 16:06:24.597 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 361 16:06:24.687 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 362 16:06:24.687 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 363 16:06:24.687 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017115, seq# expected = 202017115 364 16:11:11.544 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 365 16:12:01.121 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017115 366 16:12:01.121 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 367 16:12:01.212 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 368 16:12:01.212 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 369 16:12:01.212 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017116, seq# expected = 202017116 370 16:16:11.582 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 371 16:21:12.050 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 372 16:24:59.945 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1133, flags 10h 373 16:25:02.458 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1133, flags 10h 374 16:25:05.964 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1133, flags 10h 375 16:25:08.528 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1133, flags 10h 376 16:25:09.459 04/25/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1133, flags 10h 377 16:26:12.067 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 378 16:29:55.956 04/25/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x4d42a21c is about to expire, requesting a new one 379 16:29:55.976 04/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.188, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 380 16:29:56.046 04/25/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=3CBE9509) Initiator = ID=10.13.6.188 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 381 16:29:56.076 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 382 16:29:56.166 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 383 16:29:56.166 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 384 16:29:56.166 04/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 385 16:29:56.166 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 386 16:29:56.166 04/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=3CBE9509 OUTBOUND SPI = 0x15FDB34D INBOUND SPI = 0x0FAABEBA) 387 16:29:56.166 04/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x15FDB34D 388 16:29:56.176 04/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x0FAABEBA 389 16:29:56.176 04/25/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 390 16:29:56.957 04/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 391 16:29:56.957 04/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4db3fd15 into key list 392 16:29:56.957 04/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 393 16:29:56.957 04/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xbabeaa0f into key list 394 16:30:26.163 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 16:30:26.193 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 396 16:30:26.223 04/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1CA2424D INBOUND SPI = 7836F3E0) 397 16:30:26.223 04/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=A5E4076E 398 16:30:26.553 04/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe0f33678 399 16:30:26.553 04/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe0f33678 400 16:30:26.553 04/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4d42a21c 401 16:30:26.553 04/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4d42a21c 402 16:30:47.566 04/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4db3fd15 for inbound key with SPI=0xbabeaa0f 403 16:31:12.615 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 404 16:36:13.223 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 405 16:41:13.701 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 406 16:42:28.297 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017116 407 16:42:28.307 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 408 16:42:28.398 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 409 16:42:28.398 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 410 16:42:28.398 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017117, seq# expected = 202017117 411 16:46:14.179 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 412 16:51:01.447 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017117 413 16:51:01.447 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 414 16:51:01.537 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 415 16:51:01.537 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 416 16:51:01.537 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017118, seq# expected = 202017118 417 16:51:13.966 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 418 16:54:27.267 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017118 419 16:54:27.267 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 420 16:54:27.357 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 421 16:54:27.357 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 422 16:54:27.357 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017119, seq# expected = 202017119 423 16:56:13.943 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 424 17:00:01.798 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017119 425 17:00:01.808 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 426 17:00:07.307 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017120 427 17:00:07.307 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 428 17:00:12.315 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017121 429 17:00:12.315 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 430 17:00:17.323 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017122 431 17:00:17.323 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 432 17:00:22.340 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017123 433 17:00:22.340 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 434 17:00:27.839 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017124 435 17:00:27.839 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 436 17:00:32.847 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017125 437 17:00:32.847 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 438 17:00:37.925 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017126 439 17:00:37.925 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 440 17:00:43.433 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017127 441 17:00:43.433 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 442 17:00:48.441 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017128 443 17:00:48.441 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 444 17:00:53.449 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017129 445 17:00:53.449 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 446 17:00:58.467 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017130 447 17:00:58.467 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 448 17:01:03.965 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017131 449 17:01:03.965 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 450 17:01:08.983 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017132 451 17:01:08.983 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 452 17:01:13.991 04/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1133, dst port 4005 453 17:01:13.991 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017133 454 17:01:13.991 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 455 17:01:19.489 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017134 456 17:01:19.489 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 457 17:01:24.497 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017135 458 17:01:24.497 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 459 17:01:29.505 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017136 460 17:01:29.505 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 461 17:01:34.513 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017137 462 17:01:34.513 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 463 17:01:39.521 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017138 464 17:01:39.521 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 465 17:01:44.528 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017139 466 17:01:44.528 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 467 17:01:49.536 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017140 468 17:01:49.536 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 17:01:54.544 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017141 470 17:01:54.554 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 471 17:02:00.053 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017142 472 17:02:00.053 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 473 17:02:05.060 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017143 474 17:02:05.060 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 475 17:02:10.068 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017144 476 17:02:10.068 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 477 17:02:15.076 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017145 478 17:02:15.076 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 17:02:20.084 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017146 480 17:02:20.084 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 481 17:02:25.092 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017147 482 17:02:25.092 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 483 17:02:30.109 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017148 484 17:02:30.109 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 485 17:02:35.608 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017149 486 17:02:35.608 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 487 17:02:40.616 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017150 488 17:02:40.616 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 489 17:02:45.623 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017151 490 17:02:45.634 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 491 17:02:51.142 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017152 492 17:02:51.142 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 493 17:02:56.641 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017153 494 17:02:56.641 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 495 17:03:01.658 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017154 496 17:03:01.658 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 497 17:03:07.157 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017155 498 17:03:07.157 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 499 17:03:12.666 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017156 500 17:03:12.666 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 501 17:03:17.673 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017157 502 17:03:17.673 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 503 17:03:23.182 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017158 504 17:03:23.182 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 505 17:03:28.200 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017159 506 17:03:28.200 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 507 17:03:33.698 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017160 508 17:03:33.698 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 509 17:03:38.706 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017161 510 17:03:38.706 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 511 17:03:40.078 04/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 512 17:03:40.078 04/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 513 17:03:40.078 04/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 202017162, seq# expected = 202017162 514 17:04:20.271 04/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 202017162 515 17:04:20.271 04/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16