EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:03:46.211 05/07/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:03:46.391 05/07/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:03:46.391 05/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:03:46.411 05/07/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1100 for TCP connection. 5 21:03:46.521 05/07/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:03:46.521 05/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:03:46.521 05/07/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1100, dst port 4005 8 21:03:46.521 05/07/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1100 9 21:03:46.521 05/07/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1100, dst port 4005 10 21:03:46.521 05/07/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:03:46.822 05/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:03:46.842 05/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:03:46.852 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:03:47.022 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:03:47.022 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:03:47.022 05/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:03:47.022 05/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:03:47.022 05/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:03:47.022 05/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:03:47.022 05/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:03:47.022 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:03:47.022 05/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:03:47.022 05/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:03:47.042 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:03:47.042 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:03:47.042 05/07/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 21:03:47.042 05/07/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=4201B03F5877BE3F R_Cookie=B743431B75408EC4) reason = DEL_REASON_LOAD_BALANCING 28 21:03:47.042 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:03:47.823 05/07/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=4201B03F5877BE3F R_Cookie=B743431B75408EC4) reason = DEL_REASON_LOAD_BALANCING 30 21:03:47.823 05/07/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:03:47.823 05/07/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 21:03:47.823 05/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 21:03:47.823 05/07/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:03:48.324 05/07/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1100, dst port 4005 35 21:03:48.324 05/07/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1100, dst port 4005 36 21:03:48.324 05/07/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1100 37 21:03:48.324 05/07/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1100, dst port 4005 38 21:03:48.324 05/07/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 21:03:48.824 05/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 21:03:48.824 05/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 21:03:48.834 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 21:03:48.995 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 21:03:48.995 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 21:03:48.995 05/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:03:48.995 05/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:03:48.995 05/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:03:48.995 05/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:03:49.005 05/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:03:49.005 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 21:03:49.005 05/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:03:49.005 05/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:03:49.055 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 21:03:49.055 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 21:03:49.055 05/07/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:04:01.072 05/07/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:04:01.072 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 21:04:10.355 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 21:04:10.355 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 21:04:10.355 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 21:04:10.355 05/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:04:10.415 05/07/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:04:10.415 05/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:04:10.415 05/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:04:10.415 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 21:04:11.317 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.6.18 68 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:04:11.317 05/07/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:04:11.337 05/07/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:04:11.337 05/07/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.18, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 21:04:11.337 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 21:04:11.367 05/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 21:04:11.367 05/07/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 21:04:11.397 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 23 seconds, setting expiry to 86377 seconds from now 89 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 21:04:11.397 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 21:04:11.397 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=43C09D2B OUTBOUND SPI = 0x0BB12637 INBOUND SPI = 0x943A9036) 94 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0BB12637 95 21:04:11.397 05/07/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x943A9036 96 21:04:12.999 05/07/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.6.18/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 21:04:13.099 05/07/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 21:04:13.139 05/07/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 21:04:13.169 05/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 10.13.6.18. 100 21:04:13.169 05/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.6.18. Current address(es): 192.168.1.3, 10.13.6.18. 101 21:04:13.300 05/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:04:13.300 05/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3726b10b into key list 103 21:04:13.300 05/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:04:13.300 05/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x36903a94 into key list 105 21:04:13.300 05/07/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.6.18 106 21:04:19.869 05/07/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x3726b10b for inbound key with SPI=0x36903a94 107 21:06:01.014 05/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866232 108 21:06:01.014 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 21:06:01.045 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 21:06:01.045 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 21:06:01.045 05/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866233, seq# expected = 2395866233 112 21:08:49.256 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 113 21:13:50.219 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 114 21:18:50.841 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 115 21:23:51.333 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 116 21:28:51.204 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 117 21:33:51.636 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 118 21:38:52.067 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 119 21:44:01.198 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 120 21:49:01.136 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 121 21:54:01.250 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 122 21:59:01.750 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 123 22:04:01.747 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 124 22:09:02.215 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 125 22:14:02.586 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 126 22:19:03.002 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 127 22:24:03.420 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 128 22:29:03.857 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 129 22:34:04.293 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 130 22:37:46.618 05/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866233 131 22:37:46.618 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 132 22:37:46.648 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 133 22:37:46.648 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 134 22:37:46.648 05/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866234, seq# expected = 2395866234 135 22:39:04.231 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 136 22:44:04.969 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 137 22:49:05.392 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 138 22:54:05.837 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 139 22:59:06.275 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 140 23:09:07.139 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 141 23:11:27.844 05/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866234 142 23:11:27.844 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 23:11:27.874 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 23:11:27.874 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 23:11:27.874 05/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866235, seq# expected = 2395866235 146 23:13:48.549 05/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866235 147 23:13:48.549 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 148 23:13:48.579 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 149 23:13:48.579 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 150 23:13:48.579 05/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866236, seq# expected = 2395866236 151 23:14:07.076 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 152 23:19:08.015 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 153 23:24:08.447 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 154 23:29:08.885 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 155 23:34:09.323 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 156 23:36:16.015 05/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866236 157 23:36:16.015 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 158 23:36:16.095 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 159 23:36:16.095 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 160 23:36:16.095 05/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866237, seq# expected = 2395866237 161 23:37:46.637 05/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866237 162 23:37:46.637 05/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 163 23:37:46.667 05/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 164 23:37:46.667 05/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 165 23:37:46.667 05/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866238, seq# expected = 2395866238 166 23:39:09.248 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 167 23:44:10.170 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 168 23:49:10.599 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 169 23:54:11.033 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 170 23:59:11.479 05/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 171 00:01:49.706 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866238 172 00:01:49.706 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 173 00:01:49.776 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 174 00:01:49.776 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 175 00:01:49.776 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866239, seq# expected = 2395866239 176 00:04:11.911 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 177 00:09:12.363 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 178 00:13:51.266 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866239 179 00:13:51.266 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 180 00:13:56.273 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866240 181 00:13:56.273 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 182 00:13:56.293 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 183 00:13:56.293 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 184 00:13:56.293 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866241, seq# expected = 2395866241 185 00:14:12.297 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 186 00:19:13.240 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 187 00:24:13.672 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 188 00:24:44.716 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866241 189 00:24:44.716 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 190 00:24:44.736 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 191 00:24:44.736 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 192 00:24:44.736 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866242, seq# expected = 2395866242 193 00:25:00.239 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866242 194 00:25:00.239 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 195 00:25:00.269 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 196 00:25:00.269 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 197 00:25:00.269 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866243, seq# expected = 2395866243 198 00:25:25.775 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866243 199 00:25:25.775 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 200 00:25:25.816 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 201 00:25:25.816 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 202 00:25:25.816 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866244, seq# expected = 2395866244 203 00:25:46.305 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866244 204 00:25:46.305 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 205 00:25:46.325 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 206 00:25:46.325 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 207 00:25:46.325 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866245, seq# expected = 2395866245 208 00:26:01.827 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866245 209 00:26:01.827 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 210 00:26:01.847 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 211 00:26:01.847 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 212 00:26:01.847 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866246, seq# expected = 2395866246 213 00:26:12.342 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866246 214 00:26:12.342 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 215 00:26:12.362 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 216 00:26:12.362 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 217 00:26:12.362 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866247, seq# expected = 2395866247 218 00:26:32.872 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866247 219 00:26:32.872 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 220 00:26:32.892 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 221 00:26:32.892 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 222 00:26:32.892 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866248, seq# expected = 2395866248 223 00:26:48.394 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866248 224 00:26:48.394 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 225 00:26:48.414 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 226 00:26:48.414 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 227 00:26:48.414 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866249, seq# expected = 2395866249 228 00:27:08.924 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866249 229 00:27:08.924 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 00:27:13.931 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866250 231 00:27:13.931 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 232 00:27:13.951 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 233 00:27:13.951 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 234 00:27:13.951 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866251, seq# expected = 2395866251 235 00:27:29.453 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866251 236 00:27:29.453 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 237 00:27:29.473 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 238 00:27:29.473 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 239 00:27:29.473 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866252, seq# expected = 2395866252 240 00:27:39.968 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866252 241 00:27:39.968 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 242 00:27:39.988 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 243 00:27:39.988 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 244 00:27:39.988 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866253, seq# expected = 2395866253 245 00:27:50.484 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866253 246 00:27:50.484 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 247 00:27:50.524 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 248 00:27:50.524 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 249 00:27:50.524 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866254, seq# expected = 2395866254 250 00:28:00.999 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866254 251 00:28:00.999 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 00:28:01.019 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 253 00:28:01.019 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 254 00:28:01.019 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866255, seq# expected = 2395866255 255 00:29:13.603 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 256 00:34:14.536 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 257 00:37:52.850 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866255 258 00:37:52.850 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 00:37:52.880 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 00:37:52.880 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 00:37:52.880 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866256, seq# expected = 2395866256 262 00:39:14.467 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 263 00:44:15.401 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 264 00:49:15.865 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 265 00:54:16.309 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 266 00:59:16.753 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 267 01:01:55.488 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866256 268 01:01:55.488 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 269 01:01:55.518 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 270 01:01:55.518 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 271 01:01:55.518 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866257, seq# expected = 2395866257 272 01:04:17.197 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 273 01:09:17.641 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 274 01:13:57.054 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866257 275 01:13:57.054 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 276 01:13:57.074 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 277 01:13:57.074 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 278 01:13:57.074 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866258, seq# expected = 2395866258 279 01:14:17.585 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 280 01:19:18.509 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 281 01:24:18.881 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 282 01:25:58.524 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866258 283 01:25:58.524 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 284 01:25:58.544 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 285 01:25:58.544 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 286 01:25:58.544 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866259, seq# expected = 2395866259 287 01:29:19.313 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 288 01:34:19.755 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 289 01:38:01.073 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866259 290 01:38:01.073 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 291 01:38:01.093 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 292 01:38:01.093 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 293 01:38:01.093 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866260, seq# expected = 2395866260 294 01:38:21.602 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866260 295 01:38:21.602 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 296 01:38:21.622 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 297 01:38:21.622 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 298 01:38:21.622 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866261, seq# expected = 2395866261 299 01:39:19.686 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 300 01:44:20.619 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 301 01:49:21.051 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 302 01:54:21.497 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 303 01:59:21.955 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 304 02:04:22.390 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 305 02:09:22.825 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 306 02:13:59.225 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866261 307 02:13:59.225 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 308 02:13:59.245 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 309 02:13:59.245 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 310 02:13:59.245 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866262, seq# expected = 2395866262 311 02:14:22.759 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 312 02:19:23.695 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 313 02:24:24.130 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 314 02:26:00.770 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866262 315 02:26:00.770 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 316 02:26:00.790 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 317 02:26:00.790 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 318 02:26:00.790 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866263, seq# expected = 2395866263 319 02:29:24.558 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 320 02:34:24.988 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 321 02:37:57.295 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866263 322 02:37:57.295 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 323 02:37:57.325 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 324 02:37:57.325 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 325 02:37:57.325 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866264, seq# expected = 2395866264 326 02:39:24.922 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 327 02:44:25.858 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 328 02:49:26.293 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 329 02:54:26.227 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 330 02:59:27.163 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 331 03:01:55.878 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866264 332 03:01:55.878 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 333 03:01:55.908 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 334 03:01:55.908 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 335 03:01:55.908 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866265, seq# expected = 2395866265 336 03:04:27.598 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 337 03:09:28.033 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 338 03:11:57.249 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866265 339 03:11:57.249 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 340 03:11:57.269 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 341 03:11:57.269 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 342 03:11:57.269 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866266, seq# expected = 2395866266 343 03:13:52.916 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866266 344 03:13:52.916 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 345 03:13:52.966 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 346 03:13:52.966 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 347 03:13:52.966 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866267, seq# expected = 2395866267 348 03:14:27.967 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 349 03:19:28.903 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 350 03:24:29.348 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 351 03:25:54.972 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866267 352 03:25:54.972 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 353 03:25:54.992 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 354 03:25:54.992 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 355 03:25:54.992 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866268, seq# expected = 2395866268 356 03:28:25.189 05/08/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x3726b10b is about to expire, requesting a new one 357 03:28:25.189 05/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.18, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 358 03:28:25.189 05/08/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=7767CA62) Initiator = ID=10.13.6.18 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 359 03:28:25.199 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 360 03:28:25.229 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 361 03:28:25.229 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 362 03:28:25.229 05/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 363 03:28:25.229 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 364 03:28:25.229 05/08/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=7767CA62 OUTBOUND SPI = 0x3B1D0264 INBOUND SPI = 0x27DC1144) 365 03:28:25.229 05/08/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3B1D0264 366 03:28:25.229 05/08/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x27DC1144 367 03:28:25.229 05/08/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 368 03:28:25.710 05/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 369 03:28:25.710 05/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x64021d3b into key list 370 03:28:25.710 05/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 371 03:28:25.710 05/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4411dc27 into key list 372 03:28:55.223 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 373 03:28:55.223 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 374 03:28:55.223 05/08/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = BB12637 INBOUND SPI = 943A9036) 375 03:28:55.223 05/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=43C09D2B 376 03:28:55.233 05/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x36903a94 377 03:28:55.233 05/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x36903a94 378 03:28:55.233 05/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3726b10b 379 03:28:55.233 05/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3726b10b 380 03:29:04.246 05/08/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x64021d3b for inbound key with SPI=0x4411dc27 381 03:29:29.282 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 382 03:32:16.524 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866268 383 03:32:16.524 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 384 03:32:16.554 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 385 03:32:16.554 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 386 03:32:16.554 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866269, seq# expected = 2395866269 387 03:33:47.155 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866269 388 03:33:47.155 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 389 03:33:47.175 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 390 03:33:47.175 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 391 03:33:47.175 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866270, seq# expected = 2395866270 392 03:33:57.671 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866270 393 03:33:57.671 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 394 03:33:57.701 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 03:33:57.701 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 396 03:33:57.711 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866271, seq# expected = 2395866271 397 03:34:29.717 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 398 03:35:23.293 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866271 399 03:35:23.293 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 400 03:35:23.313 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 401 03:35:23.313 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 402 03:35:23.313 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866272, seq# expected = 2395866272 403 03:37:54.508 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866272 404 03:37:54.508 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 405 03:37:54.528 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 406 03:37:54.528 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 407 03:37:54.528 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866273, seq# expected = 2395866273 408 03:39:30.143 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 409 03:44:31.600 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 410 03:49:32.035 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 411 03:54:32.460 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 412 03:59:32.895 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 413 04:04:32.829 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 414 04:09:33.765 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 415 04:13:50.636 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866273 416 04:13:50.636 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 417 04:13:50.656 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 418 04:13:50.656 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 419 04:13:50.656 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866274, seq# expected = 2395866274 420 04:14:33.198 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 421 04:19:34.635 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 422 04:24:35.080 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 423 04:29:35.515 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 424 04:34:35.950 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 425 04:37:49.720 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866274 426 04:37:49.720 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 427 04:37:49.740 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 428 04:37:49.740 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 429 04:37:49.740 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866275, seq# expected = 2395866275 430 04:39:36.385 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 431 04:44:36.813 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 432 04:49:36.723 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 433 04:54:37.188 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 434 04:59:37.623 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 435 05:01:49.314 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866275 436 05:01:49.314 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 437 05:01:49.334 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 438 05:01:49.334 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 439 05:01:49.334 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866276, seq# expected = 2395866276 440 05:04:38.559 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 441 05:09:38.493 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 442 05:13:51.860 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866276 443 05:13:51.860 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 444 05:13:56.867 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866277 445 05:13:56.867 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 446 05:14:01.874 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866278 447 05:14:01.874 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 448 05:14:06.881 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866279 449 05:14:06.881 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 450 05:14:11.889 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866280 451 05:14:11.889 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 452 05:14:16.896 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866281 453 05:14:16.896 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 454 05:14:21.903 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866282 455 05:14:21.903 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 456 05:14:26.910 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866283 457 05:14:26.910 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 458 05:14:31.918 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866284 459 05:14:31.918 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 460 05:14:31.938 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 461 05:14:31.938 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 462 05:14:31.938 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866285, seq# expected = 2395866285 463 05:14:38.427 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 464 05:14:47.440 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866285 465 05:14:47.440 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 466 05:14:52.447 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866286 467 05:14:52.447 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 468 05:14:57.455 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866287 469 05:14:57.455 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 470 05:15:02.462 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866288 471 05:15:02.462 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 472 05:15:02.492 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 473 05:15:02.492 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 474 05:15:02.492 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866289, seq# expected = 2395866289 475 05:15:27.999 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866289 476 05:15:27.999 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 477 05:15:33.006 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866290 478 05:15:33.006 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 05:15:38.013 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866291 480 05:15:38.013 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 481 05:15:43.021 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866292 482 05:15:43.021 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 483 05:15:48.028 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866293 484 05:15:48.028 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 485 05:15:53.035 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866294 486 05:15:53.035 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 487 05:15:58.042 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866295 488 05:15:58.042 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 489 05:16:03.050 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866296 490 05:16:03.050 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 491 05:16:03.070 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 492 05:16:03.070 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 493 05:16:03.070 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866297, seq# expected = 2395866297 494 05:19:39.363 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 495 05:24:39.798 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 496 05:29:40.243 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 497 05:34:40.177 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 498 05:39:41.113 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 499 05:44:42.049 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 500 05:49:41.993 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 501 05:54:42.410 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 502 05:59:42.841 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 503 06:04:43.276 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 504 06:09:43.711 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 505 06:14:44.146 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 506 06:16:55.837 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866297 507 06:16:55.837 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 508 06:16:55.907 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 509 06:16:55.907 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 510 06:16:55.907 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866298, seq# expected = 2395866298 511 06:19:44.581 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 512 06:24:45.016 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 513 06:25:47.607 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866298 514 06:25:47.607 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 515 06:25:47.627 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 516 06:25:47.627 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 517 06:25:47.627 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866299, seq# expected = 2395866299 518 06:29:45.451 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 519 06:34:45.886 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 520 06:39:46.321 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 521 06:44:46.756 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 522 06:49:47.191 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 523 06:49:51.197 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866299 524 06:49:51.197 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 525 06:49:51.217 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 526 06:49:51.217 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 527 06:49:51.217 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866300, seq# expected = 2395866300 528 06:54:48.127 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 529 06:56:52.807 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866300 530 06:56:52.807 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 531 06:56:52.827 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 532 06:56:52.827 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 533 06:56:52.827 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866301, seq# expected = 2395866301 534 06:59:48.061 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 535 07:01:54.246 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866301 536 07:01:54.246 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 537 07:01:54.267 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 538 07:01:54.267 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 539 07:01:54.267 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866302, seq# expected = 2395866302 540 07:04:48.502 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 541 07:06:51.180 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866302 542 07:06:51.180 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 543 07:06:51.210 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 544 07:06:51.210 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 545 07:06:51.210 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866303, seq# expected = 2395866303 546 07:07:01.695 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866303 547 07:07:01.695 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 548 07:07:01.715 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 549 07:07:01.715 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 550 07:07:01.715 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866304, seq# expected = 2395866304 551 07:09:48.937 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 552 07:13:53.291 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866304 553 07:13:53.291 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 554 07:13:53.311 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 555 07:13:53.311 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 556 07:13:53.311 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866305, seq# expected = 2395866305 557 07:14:48.871 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 558 07:19:50.308 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 559 07:24:50.242 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 560 07:25:49.828 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866305 561 07:25:49.828 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 562 07:25:54.835 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866306 563 07:25:54.835 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 564 07:25:54.865 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 565 07:25:54.865 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 566 07:25:54.865 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866307, seq# expected = 2395866307 567 07:29:50.677 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 568 07:34:51.112 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 569 07:35:26.663 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866307 570 07:35:26.663 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 571 07:35:26.683 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 572 07:35:26.683 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 573 07:35:26.683 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866308, seq# expected = 2395866308 574 07:37:57.382 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866308 575 07:37:57.382 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 576 07:37:57.402 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 577 07:37:57.402 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 578 07:37:57.402 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866309, seq# expected = 2395866309 579 07:39:51.046 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 580 07:44:51.982 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 581 07:49:52.417 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 582 07:49:53.919 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866309 583 07:49:53.919 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 584 07:49:53.939 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 585 07:49:53.939 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 586 07:49:53.939 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866310, seq# expected = 2395866310 587 07:54:52.852 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 588 07:59:53.287 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 589 08:01:51.458 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866310 590 08:01:51.458 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 591 08:01:51.488 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 592 08:01:51.488 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 593 08:01:51.488 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866311, seq# expected = 2395866311 594 08:04:53.722 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 595 08:09:54.149 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 596 08:13:53.482 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866311 597 08:13:53.482 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 598 08:13:53.502 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 599 08:13:53.502 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 600 08:13:53.502 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866312, seq# expected = 2395866312 601 08:14:54.080 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 602 08:16:54.745 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866312 603 08:16:54.745 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 604 08:16:54.775 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 605 08:16:54.775 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 606 08:16:54.775 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866313, seq# expected = 2395866313 607 08:19:55.006 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 608 08:19:55.507 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866313 609 08:19:55.507 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 610 08:19:55.527 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 611 08:19:55.527 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 612 08:19:55.527 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866314, seq# expected = 2395866314 613 08:24:55.451 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 614 08:29:55.886 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 615 08:34:56.321 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 616 08:37:52.576 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866314 617 08:37:52.576 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 618 08:37:52.606 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 619 08:37:52.606 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 620 08:37:52.606 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866315, seq# expected = 2395866315 621 08:39:56.756 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 622 08:44:57.201 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 623 08:49:54.131 05/08/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2395866315 624 08:49:54.131 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 625 08:49:54.221 05/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 626 08:49:54.221 05/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 627 08:49:54.221 05/08/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2395866316, seq# expected = 2395866316 628 08:49:57.135 05/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 629 08:51:00.156 05/08/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 630 08:51:00.156 05/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 631 08:51:00.156 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 632 08:51:00.156 05/08/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3B1D0264 INBOUND SPI = 27DC1144) 633 08:51:00.156 05/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=7767CA62 634 08:51:00.156 05/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3D3E620420123D77 R_Cookie=0A6E0AC63E04C4A6) reason = DEL_REASON_RESET_SADB 635 08:51:00.156 05/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 636 08:51:00.166 05/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3D3E620420123D77 R_Cookie=0A6E0AC63E04C4A6) reason = DEL_REASON_RESET_SADB 637 08:51:00.166 05/08/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 638 08:51:00.166 05/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 639 08:51:00.237 05/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 640 08:51:00.237 05/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1100 for TCP connection. 641 08:51:00.237 05/08/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 11:46:47 642 08:51:00.387 05/08/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 643 08:51:03.180 05/08/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 644 08:51:03.180 05/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 645 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4411dc27 646 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4411dc27 647 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x64021d3b 648 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x64021d3b 649 08:51:03.190 05/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1100, dst port 4005 650 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 651 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 652 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 653 08:51:03.190 05/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys