EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:35:38.779 04/30/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:35:38.789 04/30/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:35:38.789 04/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:35:38.829 04/30/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1090 for TCP connection. 5 21:35:38.839 04/30/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:35:38.839 04/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:35:38.839 04/30/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1090, dst port 4005 8 21:35:39.350 04/30/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1090 9 21:35:39.350 04/30/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1090, dst port 4005 10 21:35:39.350 04/30/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:35:39.851 04/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:35:39.851 04/30/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:35:40.011 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:35:40.191 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:35:40.191 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:35:40.191 04/30/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:35:40.191 04/30/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:35:40.191 04/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:35:40.191 04/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:35:40.201 04/30/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:35:40.201 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:35:40.201 04/30/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:35:40.201 04/30/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:35:40.221 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:35:40.221 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:35:40.221 04/30/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 21:35:40.221 04/30/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=4A2B0688CAEA83B9 R_Cookie=19F0F44433C874FB) reason = DEL_REASON_LOAD_BALANCING 28 21:35:40.221 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:35:40.852 04/30/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=4A2B0688CAEA83B9 R_Cookie=19F0F44433C874FB) reason = DEL_REASON_LOAD_BALANCING 30 21:35:40.852 04/30/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:35:40.852 04/30/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 21:35:40.852 04/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 21:35:40.852 04/30/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:35:41.353 04/30/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1090, dst port 4005 35 21:35:41.353 04/30/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1090, dst port 4005 36 21:35:41.353 04/30/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1090 37 21:35:41.353 04/30/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1090, dst port 4005 38 21:35:41.353 04/30/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 21:35:41.854 04/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 21:35:41.854 04/30/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 21:35:41.864 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 21:35:42.034 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 21:35:42.034 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 21:35:42.034 04/30/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:35:42.034 04/30/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:35:42.034 04/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:35:42.034 04/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:35:42.044 04/30/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:35:42.044 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 21:35:42.044 04/30/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:35:42.044 04/30/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:35:42.064 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 21:35:42.064 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 21:35:42.064 04/30/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:35:55.613 04/30/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:35:55.613 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 21:35:57.857 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 21:35:57.857 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 21:35:57.857 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 21:35:57.857 04/30/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:35:57.917 04/30/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:35:57.917 04/30/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:35:57.917 04/30/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:35:57.917 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 21:35:58.808 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.85 68 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:35:58.808 04/30/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:35:58.808 04/30/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:35:58.808 04/30/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.85, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 21:35:58.808 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 21:35:58.808 04/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 21:35:58.808 04/30/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 21:35:58.848 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 89 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 21:35:58.848 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 21:35:58.848 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=639909B7 OUTBOUND SPI = 0x3495AC29 INBOUND SPI = 0x65352878) 94 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3495AC29 95 21:35:58.848 04/30/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x65352878 96 21:36:01.332 04/30/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.85/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 21:36:01.442 04/30/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 21:36:01.472 04/30/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 21:36:01.502 04/30/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 10.13.32.85. 100 21:36:01.502 04/30/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.85. Current address(es): 192.168.1.3, 10.13.32.85. 101 21:36:01.662 04/30/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:36:01.662 04/30/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x29ac9534 into key list 103 21:36:01.662 04/30/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:36:01.662 04/30/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x78283565 into key list 105 21:36:01.662 04/30/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.85 106 21:36:04.887 04/30/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x29ac9534 for inbound key with SPI=0x78283565 107 21:40:42.977 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 108 21:44:13.099 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343286 109 21:44:13.099 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 110 21:44:13.129 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 111 21:44:13.129 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 112 21:44:13.129 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343287, seq# expected = 1084343287 113 21:45:42.758 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 114 21:47:54.447 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343287 115 21:47:54.447 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 116 21:47:54.487 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 117 21:47:54.497 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 118 21:47:54.497 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343288, seq# expected = 1084343288 119 21:49:45.106 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343288 120 21:49:45.106 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 121 21:49:45.136 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 122 21:49:45.136 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 123 21:49:45.136 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343289, seq# expected = 1084343289 124 21:50:30.672 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343289 125 21:50:30.672 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 126 21:50:30.692 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 127 21:50:30.692 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 128 21:50:30.692 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343290, seq# expected = 1084343290 129 21:50:43.190 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 130 21:53:57.119 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343290 131 21:53:57.119 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 132 21:53:57.149 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 133 21:53:57.149 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 134 21:53:57.149 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343291, seq# expected = 1084343291 135 21:55:44.059 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 136 21:57:46.700 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343291 137 21:57:46.700 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 138 21:57:46.730 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 139 21:57:46.730 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 140 21:57:46.730 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343292, seq# expected = 1084343292 141 22:00:44.466 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 142 22:02:29.106 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343292 143 22:02:29.106 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 144 22:02:29.167 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 145 22:02:29.167 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 146 22:02:29.167 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343293, seq# expected = 1084343293 147 22:05:44.888 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 148 22:10:45.327 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 149 22:15:45.773 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 150 22:20:46.217 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 151 22:25:46.658 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 152 22:30:47.154 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 153 22:35:47.577 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 154 22:40:48.010 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 155 22:45:48.423 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 156 22:50:48.846 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 157 22:55:49.269 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 158 23:00:49.735 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 159 23:02:12.397 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343293 160 23:02:12.397 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 161 23:02:12.417 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 162 23:02:12.417 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 163 23:02:12.417 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343294, seq# expected = 1084343294 164 23:05:50.302 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 165 23:10:50.299 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 166 23:14:14.137 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343294 167 23:14:14.137 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 168 23:14:14.177 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 169 23:14:14.177 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 170 23:14:14.177 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343295, seq# expected = 1084343295 171 23:15:50.297 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 172 23:20:51.068 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 173 23:25:51.509 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 174 23:26:11.039 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343295 175 23:26:11.039 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 176 23:26:11.059 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 177 23:26:11.059 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 178 23:26:11.059 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343296, seq# expected = 1084343296 179 23:30:51.974 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 180 23:35:52.374 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 181 23:38:14.523 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343296 182 23:38:14.523 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 183 23:38:14.543 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 184 23:38:14.543 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 185 23:38:14.543 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343297, seq# expected = 1084343297 186 23:40:52.242 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 187 23:45:53.181 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 188 23:48:15.889 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343297 189 23:48:15.889 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 190 23:48:15.919 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 191 23:48:15.919 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 192 23:48:15.919 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343298, seq# expected = 1084343298 193 23:50:16.565 04/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343298 194 23:50:16.565 04/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 195 23:50:16.585 04/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 196 23:50:16.585 04/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 197 23:50:16.585 04/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343299, seq# expected = 1084343299 198 23:50:53.118 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 199 23:55:54.054 04/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 200 00:00:54.492 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 201 00:02:15.610 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343299 202 00:02:15.610 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 00:02:15.630 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 00:02:15.630 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 00:02:15.630 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343300, seq# expected = 1084343300 206 00:05:54.930 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 207 00:09:11.710 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343300 208 00:09:11.710 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 209 00:09:11.740 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 210 00:09:11.740 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 211 00:09:11.740 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343301, seq# expected = 1084343301 212 00:09:22.225 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343301 213 00:09:22.225 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 214 00:09:22.255 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 215 00:09:22.255 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 216 00:09:22.255 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343302, seq# expected = 1084343302 217 00:09:42.753 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343302 218 00:09:42.753 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 219 00:09:42.773 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 220 00:09:42.773 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 221 00:09:42.773 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343303, seq# expected = 1084343303 222 00:10:54.852 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 223 00:14:18.639 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343303 224 00:14:18.639 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 225 00:14:18.669 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 226 00:14:18.669 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 227 00:14:18.669 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343304, seq# expected = 1084343304 228 00:15:55.279 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 229 00:20:56.215 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 230 00:25:56.649 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 231 00:30:57.082 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 232 00:35:57.517 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 233 00:40:57.952 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 234 00:45:58.377 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 235 00:50:58.810 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 236 00:55:59.245 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 237 01:00:59.680 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 238 01:06:00.115 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 239 01:11:00.550 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 240 01:16:00.985 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 241 01:21:01.423 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 242 01:26:01.858 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 243 01:31:02.293 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 244 01:36:02.728 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 245 01:41:03.163 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 246 01:46:03.598 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 247 01:48:29.810 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343304 248 01:48:29.810 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 249 01:48:29.830 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 250 01:48:29.830 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 251 01:48:29.830 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343305, seq# expected = 1084343305 252 01:51:04.029 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 253 01:56:04.449 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 254 02:01:04.881 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 255 02:06:05.313 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 256 02:10:12.168 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343305 257 02:10:12.168 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 258 02:10:12.198 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 259 02:10:12.198 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 260 02:10:12.198 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343306, seq# expected = 1084343306 261 02:11:05.245 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 262 02:16:06.177 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 263 02:21:06.609 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 264 02:26:07.051 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 265 02:31:07.501 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 266 02:36:07.936 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 267 02:38:15.621 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343306 268 02:38:15.621 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 269 02:38:15.651 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 270 02:38:15.651 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 271 02:38:15.651 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343307, seq# expected = 1084343307 272 02:41:08.371 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 273 02:46:08.806 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 274 02:50:12.159 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343307 275 02:50:12.159 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 276 02:50:12.189 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 277 02:50:12.189 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 278 02:50:12.189 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343308, seq# expected = 1084343308 279 02:51:08.741 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 280 02:56:09.676 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 281 03:01:10.111 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 282 03:02:13.703 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343308 283 03:02:13.703 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 284 03:02:13.723 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 285 03:02:13.723 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 286 03:02:13.723 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343309, seq# expected = 1084343309 287 03:06:10.546 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 288 03:11:10.981 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 289 03:14:10.241 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343309 290 03:14:10.241 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 291 03:14:10.261 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 292 03:14:10.261 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 293 03:14:10.261 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343310, seq# expected = 1084343310 294 03:16:11.416 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 295 03:21:11.851 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 296 03:26:12.286 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343310 297 03:26:12.286 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 298 03:26:12.286 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 299 03:26:12.306 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 300 03:26:12.306 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 301 03:26:12.306 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343311, seq# expected = 1084343311 302 03:31:12.721 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 303 03:36:13.156 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 304 03:38:16.335 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343311 305 03:38:16.335 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 306 03:38:16.355 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 307 03:38:16.355 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 308 03:38:16.355 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343312, seq# expected = 1084343312 309 03:41:13.591 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 310 03:46:14.026 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 311 03:48:48.250 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343312 312 03:48:48.250 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 313 03:48:48.270 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 314 03:48:48.280 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 315 03:48:48.280 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343313, seq# expected = 1084343313 316 03:48:58.765 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343313 317 03:48:58.765 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 318 03:48:58.795 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 319 03:48:58.795 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 320 03:48:58.795 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343314, seq# expected = 1084343314 321 03:50:14.374 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343314 322 03:50:14.374 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 323 03:50:14.394 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 324 03:50:14.394 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 325 03:50:14.394 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343315, seq# expected = 1084343315 326 03:51:13.961 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 327 03:56:14.896 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 328 04:00:23.757 05/01/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x29ac9534 is about to expire, requesting a new one 329 04:00:23.757 05/01/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.85, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 330 04:00:23.757 05/01/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=0AA11BA3) Initiator = ID=10.13.32.85 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 331 04:00:23.757 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 332 04:00:23.787 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 333 04:00:23.787 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 334 04:00:23.787 05/01/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 335 04:00:23.787 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 336 04:00:23.787 05/01/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=0AA11BA3 OUTBOUND SPI = 0x224A3F71 INBOUND SPI = 0x924CD63C) 337 04:00:23.787 05/01/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x224A3F71 338 04:00:23.787 05/01/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x924CD63C 339 04:00:23.787 05/01/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 340 04:00:24.267 05/01/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 341 04:00:24.267 05/01/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x713f4a22 into key list 342 04:00:24.267 05/01/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 343 04:00:24.267 05/01/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3cd64c92 into key list 344 04:00:53.780 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 345 04:00:53.780 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 346 04:00:53.780 05/01/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3495AC29 INBOUND SPI = 65352878) 347 04:00:53.780 05/01/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=639909B7 348 04:00:53.800 05/01/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x78283565 349 04:00:53.800 05/01/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x78283565 350 04:00:53.800 05/01/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x29ac9534 351 04:00:53.800 05/01/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x29ac9534 352 04:01:14.831 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 353 04:01:17.835 05/01/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x713f4a22 for inbound key with SPI=0x3cd64c92 354 04:02:15.919 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343315 355 04:02:15.919 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 356 04:02:15.939 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 357 04:02:15.939 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 358 04:02:15.939 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343316, seq# expected = 1084343316 359 04:06:15.766 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 360 04:10:22.118 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343316 361 04:10:22.118 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 362 04:10:22.138 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 363 04:10:22.138 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 364 04:10:22.138 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343317, seq# expected = 1084343317 365 04:11:15.695 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 366 04:14:17.958 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343317 367 04:14:17.958 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 368 04:14:17.988 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 369 04:14:17.988 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 370 04:14:17.988 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343318, seq# expected = 1084343318 371 04:16:16.130 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 372 04:21:17.065 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 373 04:26:14.997 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343318 374 04:26:14.997 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 375 04:26:15.027 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 376 04:26:15.027 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 377 04:26:15.027 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343319, seq# expected = 1084343319 378 04:26:17.000 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 379 04:31:17.935 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 380 04:36:18.370 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 381 04:38:16.541 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343319 382 04:38:16.541 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 383 04:38:16.561 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 384 04:38:16.561 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 385 04:38:16.561 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343320, seq# expected = 1084343320 386 04:41:18.805 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 387 04:46:19.240 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 388 04:50:18.086 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343320 389 04:50:18.086 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 390 04:50:18.116 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 391 04:50:18.116 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 392 04:50:18.116 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343321, seq# expected = 1084343321 393 04:51:19.175 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 394 04:56:20.110 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 395 05:01:20.545 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 396 05:02:15.625 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343321 397 05:02:15.625 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 398 05:02:15.645 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 399 05:02:15.645 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 400 05:02:15.645 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343322, seq# expected = 1084343322 401 05:06:20.980 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 402 05:11:21.415 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 403 05:14:22.177 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343322 404 05:14:22.177 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 405 05:14:22.207 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 406 05:14:22.207 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 407 05:14:22.207 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343323, seq# expected = 1084343323 408 05:16:21.350 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 409 05:21:22.285 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 410 05:26:20.717 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343323 411 05:26:20.717 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 412 05:26:20.757 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 413 05:26:20.757 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 414 05:26:20.757 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343324, seq# expected = 1084343324 415 05:26:22.220 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 416 05:31:23.155 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 417 05:36:23.590 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 418 05:38:22.262 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343324 419 05:38:22.262 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 420 05:38:22.292 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 421 05:38:22.292 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 422 05:38:22.292 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343325, seq# expected = 1084343325 423 05:41:24.025 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 424 05:46:24.460 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 425 05:49:08.698 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343325 426 05:49:08.698 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 427 05:49:08.718 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 428 05:49:08.718 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 429 05:49:08.718 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343326, seq# expected = 1084343326 430 05:49:19.213 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343326 431 05:49:19.213 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 432 05:49:19.233 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 433 05:49:19.233 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 434 05:49:19.233 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343327, seq# expected = 1084343327 435 05:50:19.801 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343327 436 05:50:19.801 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 437 05:50:19.821 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 438 05:50:19.821 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 439 05:50:19.821 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343328, seq# expected = 1084343328 440 05:51:24.395 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 441 05:56:25.330 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 442 06:01:25.765 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 443 06:02:21.346 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343328 444 06:02:21.346 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 445 06:02:21.366 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 446 06:02:21.366 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 447 06:02:21.366 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343329, seq# expected = 1084343329 448 06:06:26.200 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 449 06:10:42.571 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343329 450 06:10:42.571 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 451 06:10:42.592 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 452 06:10:42.592 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 453 06:10:42.592 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343330, seq# expected = 1084343330 454 06:11:26.135 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 455 06:14:18.384 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343330 456 06:14:18.384 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 457 06:14:18.404 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 458 06:14:18.414 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 459 06:14:18.414 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343331, seq# expected = 1084343331 460 06:16:27.070 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 461 06:21:27.505 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 462 06:26:27.924 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 463 06:31:28.346 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 464 06:36:28.778 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 465 06:38:16.433 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343331 466 06:38:16.433 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 467 06:38:16.453 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 468 06:38:16.453 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 469 06:38:16.453 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343332, seq# expected = 1084343332 470 06:41:29.210 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 471 06:46:29.642 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 472 06:50:12.964 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343332 473 06:50:12.964 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 474 06:50:12.984 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 475 06:50:12.984 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 476 06:50:12.984 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343333, seq# expected = 1084343333 477 06:51:29.574 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 478 06:56:30.506 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 479 07:01:30.938 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 480 07:02:15.002 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343333 481 07:02:15.002 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 482 07:02:15.032 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 483 07:02:15.032 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 484 07:02:15.032 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343334, seq# expected = 1084343334 485 07:06:31.370 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 486 07:11:31.802 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 487 07:14:13.034 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343334 488 07:14:13.034 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 489 07:14:13.054 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 490 07:14:13.064 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 491 07:14:13.064 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343335, seq# expected = 1084343335 492 07:16:32.234 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 493 07:21:32.666 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 494 07:26:14.572 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343335 495 07:26:14.572 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 496 07:26:14.592 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 497 07:26:14.592 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 498 07:26:14.592 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343336, seq# expected = 1084343336 499 07:26:32.598 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 500 07:31:33.531 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 501 07:36:33.992 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 502 07:41:34.424 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 503 07:46:34.856 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 504 07:49:28.606 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343336 505 07:49:28.606 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 506 07:49:28.636 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 507 07:49:28.636 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 508 07:49:28.636 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343337, seq# expected = 1084343337 509 07:49:39.121 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343337 510 07:49:39.121 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 511 07:49:39.141 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 512 07:49:39.141 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 513 07:49:39.141 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343338, seq# expected = 1084343338 514 07:50:14.673 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343338 515 07:50:14.673 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 516 07:50:14.693 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 517 07:50:14.693 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 518 07:50:14.693 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343339, seq# expected = 1084343339 519 07:51:34.788 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 520 07:56:35.720 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 521 08:01:36.152 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 522 08:02:16.210 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343339 523 08:02:16.210 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 524 08:02:16.230 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 525 08:02:16.230 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 526 08:02:16.230 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343340, seq# expected = 1084343340 527 08:06:36.584 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 528 08:11:02.467 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343340 529 08:11:02.467 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 530 08:11:02.487 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 531 08:11:02.487 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 532 08:11:02.487 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343341, seq# expected = 1084343341 533 08:11:36.516 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 534 08:14:13.241 05/01/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1084343341 535 08:14:13.241 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 536 08:14:13.271 05/01/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 537 08:14:13.271 05/01/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 538 08:14:13.271 05/01/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1084343342, seq# expected = 1084343342 539 08:16:37.448 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 540 08:21:37.880 05/01/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1090, dst port 4005 541 08:23:26.977 05/01/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 542 08:23:26.977 05/01/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 543 08:23:26.977 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 544 08:23:26.977 05/01/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 224A3F71 INBOUND SPI = 924CD63C) 545 08:23:26.977 05/01/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=0AA11BA3 546 08:23:26.977 05/01/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F38E1C0F91312606 R_Cookie=52B81C5CFDFD56D3) reason = DEL_REASON_RESET_SADB 547 08:23:26.977 05/01/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 548 08:23:26.977 05/01/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F38E1C0F91312606 R_Cookie=52B81C5CFDFD56D3) reason = DEL_REASON_RESET_SADB 549 08:23:26.977 05/01/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 550 08:23:26.977 05/01/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 551 08:23:26.997 05/01/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 552 08:23:26.997 05/01/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1090 for TCP connection. 553 08:23:26.997 05/01/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 10:47:25 554 08:23:27.007 05/01/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 555 08:23:29.330 05/01/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 556 08:23:29.340 05/01/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 557 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3cd64c92 558 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3cd64c92 559 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x713f4a22 560 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x713f4a22 561 08:23:29.340 05/01/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1090, dst port 4005 562 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 563 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 564 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 565 08:23:29.340 05/01/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys