EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 10:10:06.182 04/26/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 10:10:06.192 04/26/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 10:10:06.192 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 10:10:06.202 04/26/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1132 for TCP connection. 5 10:10:06.202 04/26/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 10:10:06.202 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 10:10:06.202 04/26/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 8 10:10:06.202 04/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1132, dst port 4005 9 10:10:06.763 04/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1132 10 10:10:06.763 04/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1132, dst port 4005 11 10:10:06.763 04/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 10:10:07.263 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 10:10:07.273 04/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 10:10:07.283 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 10:10:07.524 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 10:10:07.524 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 10:10:07.524 04/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 10:10:07.524 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 10:10:07.524 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 10:10:07.524 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 10:10:07.524 04/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 10:10:07.524 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 10:10:07.524 04/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 10:10:07.524 04/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 10:10:07.624 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 10:10:07.624 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 10:10:07.624 04/26/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 28 10:10:07.624 04/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=81AAC0CE5592BF01 R_Cookie=68D68590EBE44014) reason = DEL_REASON_LOAD_BALANCING 29 10:10:07.624 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 10:10:08.265 04/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=81AAC0CE5592BF01 R_Cookie=68D68590EBE44014) reason = DEL_REASON_LOAD_BALANCING 31 10:10:08.265 04/26/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 10:10:08.265 04/26/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 33 10:10:08.265 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 34 10:10:08.265 04/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 10:10:08.765 04/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1132, dst port 4005 36 10:10:08.765 04/26/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1132, dst port 4005 37 10:10:08.765 04/26/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1132 38 10:10:08.765 04/26/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1132, dst port 4005 39 10:10:08.765 04/26/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 40 10:10:09.266 04/26/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 41 10:10:09.276 04/26/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 42 10:10:09.286 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 43 10:10:09.507 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 44 10:10:09.507 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 45 10:10:09.507 04/26/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 10:10:09.507 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 10:10:09.507 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 10:10:09.507 04/26/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 10:10:09.517 04/26/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 10:10:09.517 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 51 10:10:09.517 04/26/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 10:10:09.517 04/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 10:10:09.597 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 54 10:10:09.597 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 55 10:10:09.597 04/26/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 10:10:20.092 04/26/06 Sev=Info/4 CM/0x63100017 xAuth application returned 57 10:10:20.092 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 58 10:10:26.591 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 59 10:10:26.591 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 60 10:10:26.591 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 61 10:10:26.591 04/26/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 62 10:10:26.641 04/26/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 63 10:10:26.641 04/26/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 64 10:10:26.641 04/26/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 65 10:10:26.641 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 66 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 67 10:10:27.593 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 68 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.6.209 69 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 70 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 71 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 72 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 73 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 74 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 75 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 76 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 77 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 78 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 79 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 80 10:10:27.593 04/26/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 81 10:10:27.613 04/26/06 Sev=Info/4 CM/0x63100019 Mode Config data received 82 10:10:27.613 04/26/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.209, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 83 10:10:27.613 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 84 10:10:27.613 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 85 10:10:27.613 04/26/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 86 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 87 10:10:27.713 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 88 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 89 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 18 seconds, setting expiry to 86382 seconds from now 90 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 91 10:10:27.713 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 92 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 93 10:10:27.713 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 94 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=49089EB1 OUTBOUND SPI = 0x52030FD0 INBOUND SPI = 0x93616471) 95 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x52030FD0 96 10:10:27.713 04/26/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x93616471 97 10:10:28.213 04/26/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.6.209/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 98 10:10:28.243 04/26/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 99 10:10:28.263 04/26/06 Sev=Info/4 CM/0x6310001A One secure connection established 100 10:10:28.454 04/26/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.0.192. Current address(es): 192.168.0.192, 10.13.6.209. 101 10:10:28.454 04/26/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.6.209. Current address(es): 192.168.0.192, 10.13.6.209. 102 10:10:28.564 04/26/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 103 10:10:28.564 04/26/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xd00f0352 into key list 104 10:10:28.564 04/26/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 105 10:10:28.564 04/26/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x71646193 into key list 106 10:10:28.564 04/26/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.6.209 107 10:10:30.296 04/26/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xd00f0352 for inbound key with SPI=0x71646193 108 10:15:09.336 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 109 10:19:09.817 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219531 110 10:19:09.817 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 111 10:19:09.908 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 112 10:19:09.908 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 113 10:19:09.908 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219532, seq# expected = 2398219532 114 10:19:09.908 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 10:19:09.908 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 10:19:09.908 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219532, seq# expected = 2398219532 117 10:20:09.685 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 118 10:25:10.130 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 119 10:27:31.333 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219532 120 10:27:31.333 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 121 10:27:31.473 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 122 10:27:31.473 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 123 10:27:31.473 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219533, seq# expected = 2398219533 124 10:30:10.562 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 125 10:35:10.994 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 126 10:37:47.719 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219533 127 10:37:47.719 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 128 10:37:47.819 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 129 10:37:47.819 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 130 10:37:47.819 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219534, seq# expected = 2398219534 131 10:38:48.306 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219534 132 10:38:48.306 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 133 10:38:48.386 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 134 10:38:48.386 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 135 10:38:48.386 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219535, seq# expected = 2398219535 136 10:40:11.426 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 137 10:45:11.858 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 138 10:50:14.089 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 139 10:55:07.214 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219535 140 10:55:07.214 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 141 10:55:07.304 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 142 10:55:07.304 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 143 10:55:07.304 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219536, seq# expected = 2398219536 144 10:55:13.737 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 145 11:00:14.358 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 146 11:05:13.977 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 147 11:07:10.035 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219536 148 11:07:10.035 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 149 11:07:10.125 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 150 11:07:10.125 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 151 11:07:10.135 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219537, seq# expected = 2398219537 152 11:10:14.443 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 153 11:15:14.827 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 154 11:20:15.824 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 155 11:25:15.714 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 156 11:30:16.553 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 157 11:31:04.112 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219537 158 11:31:04.112 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 159 11:31:04.202 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 160 11:31:04.202 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 161 11:31:04.202 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219538, seq# expected = 2398219538 162 11:35:16.991 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 163 11:40:17.428 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 164 11:43:02.150 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219538 165 11:43:02.150 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 166 11:43:02.251 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 11:43:02.251 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 168 11:43:02.251 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219539, seq# expected = 2398219539 169 11:45:16.870 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 170 11:50:18.310 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 171 11:55:01.723 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219539 172 11:55:01.723 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 173 11:55:01.813 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 174 11:55:01.813 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 175 11:55:01.813 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219540, seq# expected = 2398219540 176 11:55:17.746 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 177 12:00:18.678 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 178 12:05:18.610 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 179 12:07:03.263 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219540 180 12:07:03.263 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 181 12:07:03.353 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 182 12:07:03.353 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 183 12:07:03.353 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219541, seq# expected = 2398219541 184 12:10:19.048 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 185 12:11:30.152 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219541 186 12:11:30.152 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 12:11:30.242 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 12:11:30.242 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 12:11:30.242 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219542, seq# expected = 2398219542 190 12:12:15.718 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219542 191 12:12:15.718 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 192 12:12:15.819 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 193 12:12:15.819 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 194 12:12:15.819 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219543, seq# expected = 2398219543 195 12:15:19.482 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 196 12:19:02.802 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219543 197 12:19:02.802 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 198 12:19:02.892 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 199 12:19:02.892 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 200 12:19:02.892 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219544, seq# expected = 2398219544 201 12:20:19.913 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 202 12:25:20.348 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 203 12:30:20.623 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 204 12:31:02.683 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219544 205 12:31:02.683 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 12:31:02.774 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 12:31:02.774 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 12:31:02.774 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219545, seq# expected = 2398219545 209 12:35:21.058 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 210 12:40:21.973 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 211 12:43:06.301 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219545 212 12:43:06.902 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 213 12:43:08.234 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 214 12:43:08.284 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 215 12:43:08.314 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219546, seq# expected = 2398219546 216 12:45:23.450 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 217 12:50:23.584 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 218 12:55:04.151 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219546 219 12:55:04.431 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 220 12:55:04.701 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 221 12:55:04.731 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 222 12:55:04.731 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219547, seq# expected = 2398219547 223 12:55:24.700 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 224 13:00:24.314 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 225 13:05:24.779 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 226 13:07:04.869 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219547 227 13:07:04.970 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 228 13:07:05.130 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 229 13:07:05.170 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 230 13:07:05.170 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219548, seq# expected = 2398219548 231 13:10:25.147 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 232 13:15:26.076 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 233 13:19:05.880 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219548 234 13:19:05.880 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 235 13:19:06.000 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 236 13:19:06.000 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 237 13:19:06.000 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219549, seq# expected = 2398219549 238 13:20:26.505 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 239 13:25:26.944 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 240 13:30:27.373 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 241 13:31:04.917 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219549 242 13:31:04.917 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 243 13:31:05.037 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 244 13:31:05.037 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 245 13:31:05.037 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219550, seq# expected = 2398219550 246 13:35:27.812 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 247 13:40:27.652 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 248 13:43:08.380 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219550 249 13:43:08.620 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 250 13:43:09.171 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 251 13:43:09.171 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 252 13:43:09.171 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219551, seq# expected = 2398219551 253 13:45:28.085 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 254 13:50:29.038 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 255 13:55:28.949 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 256 14:00:29.881 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 257 14:05:30.313 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 258 14:07:06.452 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219551 259 14:07:06.452 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 260 14:07:06.592 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 261 14:07:06.592 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 262 14:07:06.592 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219552, seq# expected = 2398219552 263 14:10:30.745 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 264 14:13:28.000 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219552 265 14:13:28.000 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 266 14:13:28.141 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 267 14:13:28.141 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 268 14:13:28.141 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219553, seq# expected = 2398219553 269 14:14:38.608 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219553 270 14:14:38.608 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 271 14:14:38.748 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 272 14:14:38.748 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 273 14:14:38.748 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219554, seq# expected = 2398219554 274 14:15:30.689 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 275 14:20:31.148 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 276 14:25:31.589 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 277 14:30:32.530 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 278 14:31:09.605 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219554 279 14:31:09.605 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 280 14:31:09.775 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 281 14:31:09.775 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 282 14:31:09.775 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219555, seq# expected = 2398219555 283 14:35:32.982 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 284 14:40:33.433 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 285 14:43:04.654 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219555 286 14:43:04.725 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 14:43:04.885 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 14:43:04.885 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 14:43:04.885 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219556, seq# expected = 2398219556 290 14:43:04.895 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 291 14:43:04.895 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 292 14:43:04.895 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219556, seq# expected = 2398219556 293 14:45:33.373 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 294 14:50:33.795 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 295 14:55:34.218 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 296 15:00:34.655 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 297 15:05:35.094 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 298 15:10:35.563 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 299 15:15:35.952 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 300 15:19:04.740 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219556 301 15:19:04.740 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 302 15:19:04.841 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 303 15:19:04.851 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 304 15:19:04.851 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219557, seq# expected = 2398219557 305 15:20:36.371 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 306 15:25:36.844 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 307 15:30:37.797 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 308 15:35:19.235 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219557 309 15:35:19.235 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 310 15:35:19.355 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 311 15:35:19.355 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 312 15:35:19.355 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219558, seq# expected = 2398219558 313 15:35:37.761 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 314 15:35:43.269 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 315 15:35:43.770 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 316 15:35:44.271 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 317 15:35:44.782 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 318 15:35:45.773 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 319 15:35:45.773 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 320 15:35:46.274 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 321 15:35:46.774 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 322 15:35:47.285 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 323 15:35:47.285 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 324 15:35:48.277 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 325 15:35:48.277 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 326 15:35:49.779 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 327 15:35:50.280 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 328 15:35:50.280 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 329 15:35:50.780 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 330 15:35:51.291 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 331 15:35:52.282 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 332 15:35:52.282 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 333 15:35:52.282 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 334 15:36:11.310 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 335 15:36:11.811 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 336 15:36:12.311 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 337 15:36:12.812 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 338 15:36:12.812 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 339 15:36:13.313 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 340 15:36:13.814 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 341 15:36:14.314 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 342 15:36:14.815 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 343 15:36:15.316 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 344 15:36:15.817 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 345 15:36:16.317 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 346 15:36:17.819 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 347 15:36:17.819 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 348 15:36:18.320 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 349 15:36:18.821 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 350 15:36:19.322 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 351 15:36:19.822 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 352 15:36:20.323 04/26/06 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1132, flags 10h 353 15:40:38.697 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 354 15:43:07.412 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219558 355 15:43:07.412 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 356 15:43:07.573 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 357 15:43:07.573 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 358 15:43:07.573 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219559, seq# expected = 2398219559 359 15:45:38.631 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 360 15:50:39.587 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 361 15:55:39.521 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 362 16:00:39.956 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 363 16:05:40.391 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 364 16:07:06.516 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219559 365 16:07:06.516 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 366 16:07:06.606 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 367 16:07:06.606 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 368 16:07:06.606 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219560, seq# expected = 2398219560 369 16:10:40.696 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 370 16:15:10.577 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219560 371 16:15:10.577 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 372 16:15:10.667 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 373 16:15:10.667 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 374 16:15:10.667 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219561, seq# expected = 2398219561 375 16:15:41.121 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 376 16:19:08.922 04/26/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2398219561 377 16:19:08.922 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 378 16:19:09.012 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 379 16:19:09.012 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 380 16:19:09.012 04/26/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2398219562, seq# expected = 2398219562 381 16:20:42.057 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 382 16:25:41.991 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 383 16:30:42.926 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 384 16:34:32.762 04/26/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xd00f0352 is about to expire, requesting a new one 385 16:34:32.782 04/26/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.209, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 386 16:34:32.782 04/26/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=829DF53A) Initiator = ID=10.13.6.209 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 387 16:34:32.832 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 388 16:34:32.932 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 389 16:34:32.932 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 390 16:34:32.932 04/26/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 391 16:34:32.932 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 392 16:34:32.932 04/26/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=829DF53A OUTBOUND SPI = 0x53E1ABF0 INBOUND SPI = 0x9B1E53FB) 393 16:34:32.932 04/26/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x53E1ABF0 394 16:34:32.932 04/26/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x9B1E53FB 395 16:34:32.932 04/26/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 396 16:34:33.764 04/26/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 397 16:34:33.764 04/26/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf0abe153 into key list 398 16:34:33.764 04/26/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 399 16:34:33.764 04/26/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfb531e9b into key list 400 16:35:02.915 04/26/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 401 16:35:02.935 04/26/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 402 16:35:02.935 04/26/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 52030FD0 INBOUND SPI = 93616471) 403 16:35:02.935 04/26/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=49089EB1 404 16:35:03.306 04/26/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x71646193 405 16:35:03.316 04/26/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x71646193 406 16:35:03.316 04/26/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd00f0352 407 16:35:03.316 04/26/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd00f0352 408 16:35:15.823 04/26/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xf0abe153 for inbound key with SPI=0xfb531e9b 409 16:35:42.862 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 410 16:40:43.297 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 411 16:45:43.742 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 412 16:50:44.678 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 413 16:55:45.123 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 414 17:00:45.568 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 415 17:05:46.003 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 416 17:10:46.478 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 417 17:15:46.372 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 418 17:20:46.817 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 419 17:25:47.242 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 420 17:30:48.188 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 421 17:35:47.732 04/26/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1132, dst port 4005 422 17:36:56.722 04/26/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 423 17:36:56.722 04/26/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 424 17:36:56.722 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 425 17:36:56.722 04/26/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 53E1ABF0 INBOUND SPI = 9B1E53FB) 426 17:36:56.722 04/26/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=829DF53A 427 17:36:56.722 04/26/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=837179D9EFBE9EEA R_Cookie=2B9DC5432AB821D1) reason = DEL_REASON_RESET_SADB 428 17:36:56.722 04/26/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 429 17:36:56.722 04/26/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=837179D9EFBE9EEA R_Cookie=2B9DC5432AB821D1) reason = DEL_REASON_RESET_SADB 430 17:36:56.792 04/26/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 431 17:36:56.832 04/26/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 432 17:36:56.892 04/26/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 433 17:36:56.892 04/26/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1132 for TCP connection. 434 17:36:56.892 04/26/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 7:26:28 435 17:36:57.393 04/26/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 436 17:37:00.767 04/26/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 437 17:37:00.767 04/26/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 438 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xfb531e9b 439 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xfb531e9b 440 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf0abe153 441 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf0abe153 442 17:37:00.777 04/26/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.16, src port 4005, dst port 1132 443 17:37:00.777 04/26/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1132, dst port 4005 444 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 445 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 446 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 447 17:37:00.777 04/26/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys