EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 13:15:59.395 05/13/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 13:15:59.405 05/13/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 13:15:59.405 05/13/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 4 13:15:59.405 05/13/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 5 13:15:59.415 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 6 13:15:59.415 05/13/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 13:15:59.415 05/13/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 13:16:04.480 05/13/06 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 9 13:16:04.480 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to 10.0.0.1 10 13:16:09.496 05/13/06 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 11 13:16:09.496 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to 10.0.0.1 12 13:16:14.511 05/13/06 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 13 13:16:14.511 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to 10.0.0.1 14 13:16:19.527 05/13/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0B501871E4D69288 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 15 13:16:20.028 05/13/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0B501871E4D69288 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 16 13:16:20.028 05/13/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "10.0.0.1" because of "DEL_REASON_PEER_NOT_RESPONDING" 17 13:16:20.028 05/13/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 18 13:16:20.038 05/13/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 19 13:16:20.530 05/13/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 20 13:16:20.530 05/13/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 21 13:16:20.530 05/13/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 22 13:16:20.530 05/13/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 23 13:19:27.263 05/13/06 Sev=Info/4 CM/0x63100002 Begin connection process 24 13:19:27.263 05/13/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 25 13:19:27.263 05/13/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 26 13:19:27.273 05/13/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1156 for TCP connection. 27 13:19:27.604 05/13/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 28 13:19:27.604 05/13/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 29 13:19:27.604 05/13/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1156, dst port 4005 30 13:19:27.604 05/13/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1156 31 13:19:27.604 05/13/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1156, dst port 4005 32 13:19:27.604 05/13/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 33 13:19:28.106 05/13/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 34 13:19:28.106 05/13/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 35 13:19:28.116 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 36 13:19:28.276 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 37 13:19:28.276 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 38 13:19:28.276 05/13/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 39 13:19:28.276 05/13/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 40 13:19:28.276 05/13/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 41 13:19:28.276 05/13/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 42 13:19:28.286 05/13/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 43 13:19:28.286 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 44 13:19:28.286 05/13/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 45 13:19:28.286 05/13/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 46 13:19:28.306 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 47 13:19:28.316 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 48 13:19:28.316 05/13/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 49 13:19:28.316 05/13/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=BD20A60B2B6D8BF8 R_Cookie=D94E9E646D2D60FB) reason = DEL_REASON_LOAD_BALANCING 50 13:19:28.316 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 51 13:19:29.109 05/13/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=BD20A60B2B6D8BF8 R_Cookie=D94E9E646D2D60FB) reason = DEL_REASON_LOAD_BALANCING 52 13:19:29.109 05/13/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 53 13:19:29.109 05/13/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 54 13:19:29.109 05/13/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 55 13:19:29.109 05/13/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 56 13:19:29.610 05/13/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1156, dst port 4005 57 13:19:29.610 05/13/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1156, dst port 4005 58 13:19:29.610 05/13/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1156 59 13:19:29.610 05/13/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1156, dst port 4005 60 13:19:29.610 05/13/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 61 13:19:30.112 05/13/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 62 13:19:30.112 05/13/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 63 13:19:30.122 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 64 13:19:30.282 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 65 13:19:30.282 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 66 13:19:30.282 05/13/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 67 13:19:30.282 05/13/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 68 13:19:30.282 05/13/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 69 13:19:30.282 05/13/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 70 13:19:30.292 05/13/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 71 13:19:30.292 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 72 13:19:30.292 05/13/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 73 13:19:30.292 05/13/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 74 13:19:30.312 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 75 13:19:30.312 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 76 13:19:30.312 05/13/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 77 13:19:42.510 05/13/06 Sev=Info/4 CM/0x63100017 xAuth application returned 78 13:19:42.510 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 79 13:19:44.897 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 80 13:19:44.907 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 81 13:19:44.907 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 82 13:19:44.907 05/13/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 83 13:19:44.977 05/13/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 84 13:19:44.977 05/13/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 85 13:19:44.977 05/13/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 86 13:19:44.977 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 87 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 13:19:45.910 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 89 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.77 90 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 91 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 92 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 93 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 94 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 95 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 96 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 97 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 98 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 99 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 100 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 101 13:19:45.910 05/13/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 102 13:19:45.910 05/13/06 Sev=Info/4 CM/0x63100019 Mode Config data received 103 13:19:45.910 05/13/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.77, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 104 13:19:45.910 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 105 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 106 13:19:45.940 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 107 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 108 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 15 seconds, setting expiry to 86385 seconds from now 109 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 13:19:45.940 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 111 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 112 13:19:45.940 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 113 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=63A68D90 OUTBOUND SPI = 0x3340C662 INBOUND SPI = 0x9BD0A97B) 114 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3340C662 115 13:19:45.940 05/13/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x9BD0A97B 116 13:19:47.795 05/13/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.77/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 117 13:19:47.835 05/13/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 118 13:19:48.095 05/13/06 Sev=Info/4 CM/0x6310001A One secure connection established 119 13:19:48.095 05/13/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.3. Current address(es): 192.168.1.3, 10.13.32.77. 120 13:19:48.095 05/13/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.77. Current address(es): 192.168.1.3, 10.13.32.77. 121 13:19:48.316 05/13/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 122 13:19:48.316 05/13/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 123 13:19:48.316 05/13/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 124 13:19:48.316 05/13/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x62c64033 into key list 125 13:19:48.316 05/13/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 126 13:19:48.316 05/13/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7ba9d09b into key list 127 13:19:48.316 05/13/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.77 128 13:19:49.167 05/13/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x62c64033 for inbound key with SPI=0x7ba9d09b 129 13:24:31.072 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 130 13:25:10.629 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175527 131 13:25:10.629 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 132 13:25:10.649 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 133 13:25:10.649 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 134 13:25:10.649 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175528, seq# expected = 2301175528 135 13:29:31.504 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 136 13:33:09.878 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 137 13:33:09.878 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 138 13:33:09.878 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714101, last seq# = 0 139 13:33:09.878 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 140 13:34:31.436 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 141 13:37:10.665 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175528 142 13:37:10.665 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 143 13:37:10.685 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 144 13:37:10.685 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 145 13:37:10.685 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175529, seq# expected = 2301175529 146 13:39:32.368 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 147 13:44:32.800 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 148 13:49:33.232 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 149 13:54:34.405 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 150 13:59:19.806 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 151 13:59:19.806 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 152 13:59:19.806 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714102, last seq# = 1126714101 153 13:59:19.806 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 154 13:59:33.866 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 155 14:01:07.010 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175529 156 14:01:07.010 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 157 14:01:07.030 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 158 14:01:07.030 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 159 14:01:07.030 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175530, seq# expected = 2301175530 160 14:04:35.082 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 161 14:09:34.756 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 162 14:12:09.030 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 163 14:12:09.030 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 164 14:12:09.030 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714103, last seq# = 1126714102 165 14:12:09.030 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 166 14:13:04.400 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175530 167 14:13:04.400 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 168 14:13:04.440 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 169 14:13:04.440 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 170 14:13:04.440 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175531, seq# expected = 2301175531 171 14:14:34.677 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 172 14:19:35.150 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 173 14:24:36.054 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 174 14:29:36.506 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 175 14:34:36.748 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 176 14:37:13.820 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175531 177 14:37:13.820 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 178 14:37:13.840 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 179 14:37:13.840 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 180 14:37:13.840 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175532, seq# expected = 2301175532 181 14:39:36.759 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 182 14:44:36.399 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 183 14:44:56.451 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175532 184 14:44:56.451 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 185 14:44:56.471 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 186 14:44:56.471 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 187 14:44:56.471 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175533, seq# expected = 2301175533 188 14:49:10.742 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175533 189 14:49:10.742 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 190 14:49:10.772 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 191 14:49:10.772 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 192 14:49:10.772 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175534, seq# expected = 2301175534 193 14:49:37.333 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 194 14:54:37.906 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 195 14:59:43.635 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 196 15:04:53.501 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 197 15:10:04.786 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 198 15:13:13.364 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175534 199 15:13:13.364 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 200 15:13:17.340 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 201 15:13:17.340 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 202 15:13:17.340 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175535, seq# expected = 2301175535 203 15:15:08.082 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 204 15:20:11.380 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 205 15:25:07.706 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175535 206 15:25:07.706 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 207 15:25:07.746 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 208 15:25:07.746 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 209 15:25:07.746 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175536, seq# expected = 2301175536 210 15:25:12.690 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 211 15:30:08.886 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 212 15:30:53.369 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 213 15:30:53.369 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 214 15:30:53.369 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714104, last seq# = 1126714103 215 15:30:53.369 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 216 15:35:08.568 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 217 15:37:03.446 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175536 218 15:37:03.446 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 219 15:37:03.466 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 220 15:37:03.466 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 221 15:37:03.466 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175537, seq# expected = 2301175537 222 15:40:08.740 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 223 15:45:09.431 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 224 15:49:00.186 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175537 225 15:49:00.186 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 226 15:49:00.206 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 227 15:49:00.206 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 228 15:49:00.206 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175538, seq# expected = 2301175538 229 15:50:09.113 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 230 15:55:09.324 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 231 15:59:09.030 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 232 15:59:09.030 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 233 15:59:09.030 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714105, last seq# = 1126714104 234 15:59:09.030 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 235 16:00:09.006 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 236 16:00:57.954 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175538 237 16:00:57.954 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 238 16:00:57.974 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 239 16:00:57.974 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 240 16:00:57.974 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175539, seq# expected = 2301175539 241 16:05:09.606 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 242 16:10:09.957 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 243 16:11:39.160 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 244 16:11:39.160 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 245 16:11:39.160 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714106, last seq# = 1126714105 246 16:11:39.160 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 247 16:13:05.119 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175539 248 16:13:05.119 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 249 16:13:05.149 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 250 16:13:05.149 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 251 16:13:05.149 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175540, seq# expected = 2301175540 252 16:15:10.109 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 253 16:19:20.281 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 16:19:20.281 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 255 16:19:20.281 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714107, last seq# = 1126714106 256 16:19:20.281 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 257 16:20:09.785 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 258 16:25:06.952 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175540 259 16:25:06.952 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 260 16:25:06.982 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 261 16:25:06.982 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 262 16:25:06.982 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175541, seq# expected = 2301175541 263 16:25:09.963 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 264 16:27:22.985 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175541 265 16:27:22.985 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 266 16:27:23.016 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 267 16:27:23.016 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 268 16:27:23.016 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175542, seq# expected = 2301175542 269 16:30:10.643 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 270 16:35:10.821 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 271 16:40:11.000 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 272 16:45:11.198 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 273 16:49:13.639 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175542 274 16:49:13.639 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 275 16:49:13.659 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 16:49:13.659 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 277 16:49:13.659 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175543, seq# expected = 2301175543 278 16:50:10.864 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 279 16:55:11.544 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 280 16:59:26.153 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 281 16:59:26.153 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 282 16:59:26.153 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714108, last seq# = 1126714107 283 16:59:26.153 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 284 17:00:11.220 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 285 17:01:16.978 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175543 286 17:01:16.978 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 287 17:01:16.998 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 288 17:01:16.998 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 289 17:01:16.998 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175544, seq# expected = 2301175544 290 17:05:11.713 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 291 17:10:12.668 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 292 17:11:36.055 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 293 17:11:36.055 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 294 17:11:36.055 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714109, last seq# = 1126714108 295 17:11:36.055 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 296 17:13:08.476 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175544 297 17:13:08.476 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 298 17:13:08.496 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 299 17:13:08.496 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 300 17:13:08.496 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175545, seq# expected = 2301175545 301 17:15:12.844 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 302 17:20:12.526 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 303 17:25:12.727 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 304 17:30:13.408 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 305 17:32:42.819 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 306 17:32:42.819 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 307 17:32:42.819 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714110, last seq# = 1126714109 308 17:32:42.819 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 309 17:35:13.140 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 310 17:37:00.037 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175545 311 17:37:00.037 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 312 17:37:00.057 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 313 17:37:00.057 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 314 17:37:00.057 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175546, seq# expected = 2301175546 315 17:40:13.821 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 316 17:43:51.100 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 317 17:43:51.100 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 318 17:43:51.100 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714111, last seq# = 1126714110 319 17:43:51.100 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 320 17:45:13.533 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 321 17:48:57.795 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175546 322 17:48:57.795 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 323 17:48:57.825 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 324 17:48:57.825 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 325 17:48:57.825 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175547, seq# expected = 2301175547 326 17:50:14.214 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 327 17:50:36.690 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175547 328 17:50:36.690 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 329 17:50:36.740 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 330 17:50:36.740 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 331 17:50:36.740 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175548, seq# expected = 2301175548 332 17:55:13.906 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 333 17:59:08.777 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 334 17:59:08.777 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 335 17:59:08.777 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714112, last seq# = 1126714111 336 17:59:08.777 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 337 18:00:14.587 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 338 18:00:58.540 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175548 339 18:00:58.540 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 340 18:00:58.570 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 341 18:00:58.570 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 342 18:00:58.570 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175549, seq# expected = 2301175549 343 18:05:14.539 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 344 18:10:15.433 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 345 18:11:38.803 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 346 18:11:38.803 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 347 18:11:38.803 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714113, last seq# = 1126714112 348 18:11:38.803 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 349 18:13:09.621 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175549 350 18:13:09.621 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 351 18:13:09.651 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 352 18:13:09.651 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 353 18:13:09.651 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175550, seq# expected = 2301175550 354 18:15:15.113 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 355 18:20:15.793 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 356 18:25:12.959 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175550 357 18:25:12.959 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 358 18:25:12.990 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 359 18:25:12.990 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 360 18:25:12.990 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175551, seq# expected = 2301175551 361 18:25:15.981 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 362 18:27:34.013 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175551 363 18:27:34.013 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 364 18:27:34.043 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 365 18:27:34.043 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 366 18:27:34.043 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175552, seq# expected = 2301175552 367 18:30:15.647 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 368 18:35:15.825 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 369 18:37:11.790 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175552 370 18:37:11.790 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 371 18:37:11.811 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 372 18:37:11.821 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 373 18:37:11.821 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175553, seq# expected = 2301175553 374 18:40:16.505 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 375 18:42:13.254 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 376 18:42:13.254 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 377 18:42:13.254 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714114, last seq# = 1126714113 378 18:42:13.254 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 379 18:45:16.182 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 380 18:49:15.119 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175553 381 18:49:15.119 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 382 18:49:15.139 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 383 18:49:15.139 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 384 18:49:15.139 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175554, seq# expected = 2301175554 385 18:50:16.862 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 386 18:55:16.548 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 387 19:00:16.786 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 388 19:05:17.733 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 389 19:10:17.351 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 390 19:12:25.670 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 391 19:12:25.670 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 392 19:12:25.670 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714115, last seq# = 1126714114 393 19:12:25.670 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 394 19:13:14.668 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175554 395 19:13:14.668 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 396 19:13:14.698 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 397 19:13:14.698 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 398 19:13:14.708 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175555, seq# expected = 2301175555 399 19:15:18.047 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 400 19:20:17.739 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 401 19:25:08.811 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175555 402 19:25:08.811 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 403 19:25:08.841 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 404 19:25:08.841 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 405 19:25:08.841 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175556, seq# expected = 2301175556 406 19:25:18.301 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 407 19:30:12.938 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 408 19:30:12.938 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 409 19:30:12.938 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714116, last seq# = 1126714115 410 19:30:12.938 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 411 19:30:17.983 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 412 19:35:18.663 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 413 19:37:10.045 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175556 414 19:37:10.045 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 415 19:37:10.075 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 416 19:37:10.075 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 417 19:37:10.075 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175557, seq# expected = 2301175557 418 19:40:18.345 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 419 19:42:11.096 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 420 19:42:11.096 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 421 19:42:11.096 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714117, last seq# = 1126714116 422 19:42:11.096 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 423 19:44:07.103 05/13/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x62c64033 is about to expire, requesting a new one 424 19:44:07.103 05/13/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.77, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 425 19:44:07.103 05/13/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=EB861549) Initiator = ID=10.13.32.77 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 426 19:44:07.103 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 427 19:44:07.133 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 428 19:44:07.133 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 429 19:44:07.133 05/13/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 430 19:44:07.133 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 431 19:44:07.133 05/13/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=EB861549 OUTBOUND SPI = 0x2136AA1C INBOUND SPI = 0x93CDB87B) 432 19:44:07.133 05/13/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x2136AA1C 433 19:44:07.133 05/13/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x93CDB87B 434 19:44:07.133 05/13/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 435 19:44:07.612 05/13/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 436 19:44:07.612 05/13/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x1caa3621 into key list 437 19:44:07.612 05/13/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 438 19:44:07.612 05/13/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7bb8cd93 into key list 439 19:44:37.051 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 440 19:44:37.051 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 441 19:44:37.051 05/13/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3340C662 INBOUND SPI = 9BD0A97B) 442 19:44:37.051 05/13/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=63A68D90 443 19:44:37.071 05/13/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7ba9d09b 444 19:44:37.071 05/13/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7ba9d09b 445 19:44:37.071 05/13/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x62c64033 446 19:44:37.071 05/13/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x62c64033 447 19:45:18.527 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 448 19:49:07.784 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175557 449 19:49:07.784 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 450 19:49:07.814 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 451 19:49:07.814 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 452 19:49:07.814 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175558, seq# expected = 2301175558 453 19:50:18.209 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 454 19:50:52.173 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175558 455 19:50:52.173 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 456 19:50:52.193 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 457 19:50:52.193 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 458 19:50:52.193 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175559, seq# expected = 2301175559 459 19:51:02.662 05/13/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x1caa3621 for inbound key with SPI=0x7bb8cd93 460 19:55:18.890 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 461 19:59:08.496 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 462 19:59:08.496 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 463 19:59:08.496 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714118, last seq# = 1126714117 464 19:59:08.496 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 465 20:00:19.571 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 466 20:01:09.018 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175559 467 20:01:09.018 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 468 20:01:09.038 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 469 20:01:09.038 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 470 20:01:09.038 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175560, seq# expected = 2301175560 471 20:05:19.585 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 472 20:10:19.422 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 473 20:11:48.475 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 474 20:11:48.485 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) from 137.69.115.17 475 20:11:48.485 05/13/06 Sev=Info/5 IKE/0x63000040 Received DPD request from 137.69.115.17, new seq# = 1126714119, last seq# = 1126714118 476 20:11:48.485 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) to 137.69.115.17 477 20:13:15.158 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175560 478 20:13:15.158 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 479 20:13:15.258 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 480 20:13:15.258 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 481 20:13:15.258 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175561, seq# expected = 2301175561 482 20:15:20.228 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 483 20:20:20.678 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 484 20:25:17.583 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175561 485 20:25:17.583 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 486 20:25:17.623 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 487 20:25:17.623 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 488 20:25:17.623 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175562, seq# expected = 2301175562 489 20:25:20.595 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 490 20:28:24.004 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175562 491 20:28:24.004 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 492 20:28:24.034 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 493 20:28:24.034 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 494 20:28:24.034 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175563, seq# expected = 2301175563 495 20:28:34.546 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175563 496 20:28:34.546 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 497 20:28:34.566 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 498 20:28:34.566 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 499 20:28:34.566 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175564, seq# expected = 2301175564 500 20:30:20.973 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 501 20:35:21.643 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 502 20:40:21.821 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 503 20:45:22.000 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 504 20:49:22.945 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175564 505 20:49:22.945 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 506 20:49:22.965 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 507 20:49:22.965 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 508 20:49:22.965 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175565, seq# expected = 2301175565 509 20:50:21.676 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 510 20:55:26.432 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 511 21:00:24.260 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 512 21:01:21.334 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175565 513 21:01:21.334 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 514 21:01:21.375 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 515 21:01:21.375 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 516 21:01:21.375 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175566, seq# expected = 2301175566 517 21:05:24.412 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 518 21:10:24.851 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 519 21:15:25.327 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 520 21:20:25.618 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 521 21:25:15.880 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175566 522 21:25:15.880 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 523 21:25:15.960 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 524 21:25:15.960 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 525 21:25:15.960 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175567, seq# expected = 2301175567 526 21:25:25.370 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 527 21:28:16.688 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175567 528 21:28:16.688 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 529 21:28:16.758 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 530 21:28:16.758 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 531 21:28:16.758 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175568, seq# expected = 2301175568 532 21:30:26.061 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 533 21:35:26.552 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 534 21:37:14.547 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175568 535 21:37:14.547 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 536 21:37:14.577 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 537 21:37:14.577 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 538 21:37:14.577 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175569, seq# expected = 2301175569 539 21:40:26.344 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 540 21:45:26.565 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 541 21:50:26.767 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 542 21:51:09.731 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175569 543 21:51:09.731 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 544 21:51:09.761 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 545 21:51:09.761 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 546 21:51:09.761 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175570, seq# expected = 2301175570 547 21:55:27.018 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 548 22:00:35.381 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 549 22:05:20.328 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175570 550 22:05:20.328 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 551 22:05:20.358 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 552 22:05:20.358 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 553 22:05:20.358 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175571, seq# expected = 2301175571 554 22:05:30.827 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175571 555 22:05:30.827 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 556 22:05:30.847 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 557 22:05:30.847 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 558 22:05:30.847 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175572, seq# expected = 2301175572 559 22:05:32.316 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 560 22:06:08.777 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175572 561 22:06:08.777 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 562 22:06:08.807 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 563 22:06:08.807 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 564 22:06:08.807 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175573, seq# expected = 2301175573 565 22:07:19.702 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175573 566 22:07:19.702 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 567 22:07:19.722 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 568 22:07:19.722 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 569 22:07:19.722 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175574, seq# expected = 2301175574 570 22:08:31.126 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175574 571 22:08:31.126 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 572 22:08:31.146 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 573 22:08:31.146 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 574 22:08:31.146 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175575, seq# expected = 2301175575 575 22:10:32.497 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 576 22:15:33.398 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 577 22:20:33.470 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 578 22:25:33.271 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 579 22:30:33.513 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 580 22:35:34.124 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 581 22:40:33.836 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 582 22:45:34.587 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 583 22:50:34.398 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 584 22:55:34.940 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 585 23:00:34.642 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 586 23:05:34.873 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 587 23:10:35.004 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 588 23:15:35.176 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 589 23:20:35.427 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 590 23:25:35.559 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 591 23:30:35.740 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 592 23:35:35.982 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 593 23:40:36.083 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 594 23:45:36.265 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 595 23:48:47.592 05/13/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175575 596 23:48:47.592 05/13/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 597 23:48:47.642 05/13/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 598 23:48:47.642 05/13/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 599 23:48:47.642 05/13/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175576, seq# expected = 2301175576 600 23:50:36.476 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 601 23:55:36.678 05/13/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 602 00:00:36.969 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 603 00:05:37.011 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 604 00:10:37.132 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 605 00:15:37.194 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 606 00:20:37.415 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 607 00:24:44.673 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175576 608 00:24:44.673 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 609 00:24:44.703 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 610 00:24:44.703 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 611 00:24:44.703 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175577, seq# expected = 2301175577 612 00:25:37.677 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 613 00:30:48.217 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 614 00:35:44.503 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 615 00:36:43.440 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175577 616 00:36:43.440 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 617 00:36:43.470 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 618 00:36:43.470 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 619 00:36:43.470 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175578, seq# expected = 2301175578 620 00:40:45.184 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 621 00:45:44.866 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 622 00:48:41.179 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175578 623 00:48:41.179 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 624 00:48:41.199 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 625 00:48:41.199 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 626 00:48:41.199 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175579, seq# expected = 2301175579 627 00:50:45.077 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 628 00:55:46.068 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 629 01:00:46.429 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 630 01:05:46.543 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 631 01:10:46.905 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 632 01:13:15.022 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175579 633 01:13:15.022 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 634 01:13:20.032 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175580 635 01:13:20.032 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 636 01:13:20.052 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 637 01:13:20.052 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 638 01:13:20.052 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175581, seq# expected = 2301175581 639 01:15:47.111 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 640 01:20:47.720 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 641 01:25:18.443 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175581 642 01:25:18.443 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 643 01:25:18.483 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 644 01:25:18.483 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 645 01:25:18.483 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175582, seq# expected = 2301175582 646 01:25:48.139 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 647 01:30:47.735 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 648 01:35:47.913 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 649 01:37:20.848 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175582 650 01:37:20.848 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 651 01:37:20.878 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 652 01:37:20.878 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 653 01:37:20.878 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175583, seq# expected = 2301175583 654 01:40:48.091 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 655 01:45:48.309 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 656 01:49:24.156 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175583 657 01:49:24.156 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 658 01:49:24.177 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 659 01:49:24.177 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 660 01:49:24.177 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175584, seq# expected = 2301175584 661 01:50:47.985 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 662 01:55:48.666 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 663 02:00:48.864 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 664 02:01:24.504 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175584 665 02:01:24.504 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 666 02:01:24.524 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 667 02:01:24.524 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 668 02:01:24.524 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175585, seq# expected = 2301175585 669 02:05:51.056 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 670 02:09:02.133 05/14/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x1caa3621 is about to expire, requesting a new one 671 02:09:02.133 05/14/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.77, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 672 02:09:02.133 05/14/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=DFA31546) Initiator = ID=10.13.32.77 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 673 02:09:02.133 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 674 02:09:02.183 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 675 02:09:02.183 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 676 02:09:02.183 05/14/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 677 02:09:02.183 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 678 02:09:02.183 05/14/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=DFA31546 OUTBOUND SPI = 0x302597EA INBOUND SPI = 0xD6362DC0) 679 02:09:02.183 05/14/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x302597EA 680 02:09:02.183 05/14/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xD6362DC0 681 02:09:02.183 05/14/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 682 02:09:02.643 05/14/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 683 02:09:02.643 05/14/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xea972530 into key list 684 02:09:02.643 05/14/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 685 02:09:02.643 05/14/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc02d36d6 into key list 686 02:09:32.090 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 687 02:09:32.090 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 688 02:09:32.090 05/14/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2136AA1C INBOUND SPI = 93CDB87B) 689 02:09:32.090 05/14/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=EB861549 690 02:09:32.110 05/14/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7bb8cd93 691 02:09:32.110 05/14/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7bb8cd93 692 02:09:32.110 05/14/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x1caa3621 693 02:09:32.110 05/14/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x1caa3621 694 02:10:02.567 05/14/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xea972530 for inbound key with SPI=0xc02d36d6 695 02:10:50.014 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 696 02:13:12.867 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175585 697 02:13:12.867 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 698 02:13:12.897 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 699 02:13:12.897 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 700 02:13:12.897 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175586, seq# expected = 2301175586 701 02:15:50.700 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 702 02:20:50.372 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 703 02:25:51.053 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 704 02:30:50.745 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 705 02:35:51.426 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 706 02:40:51.108 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 707 02:45:51.799 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 708 02:50:51.481 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 709 02:55:52.162 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 710 03:00:51.854 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 711 03:05:52.256 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 712 03:10:52.493 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 713 03:13:17.058 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175586 714 03:13:17.058 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 715 03:13:17.088 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 716 03:13:17.088 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 717 03:13:17.088 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175587, seq# expected = 2301175587 718 03:15:52.679 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 719 03:20:52.857 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 720 03:21:24.471 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175587 721 03:21:24.471 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 722 03:21:24.541 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 723 03:21:24.541 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 724 03:21:24.541 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175588, seq# expected = 2301175588 725 03:25:20.989 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175588 726 03:25:20.989 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 727 03:25:26.009 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175589 728 03:25:26.009 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 729 03:25:26.029 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 730 03:25:26.029 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 731 03:25:26.029 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175590, seq# expected = 2301175590 732 03:25:52.613 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 733 03:30:53.293 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 734 03:35:18.836 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175590 735 03:35:18.836 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 736 03:35:23.855 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175591 737 03:35:23.855 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 738 03:35:23.875 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 739 03:35:23.875 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 740 03:35:23.875 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175592, seq# expected = 2301175592 741 03:35:53.482 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 742 03:37:22.842 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175592 743 03:37:22.842 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 744 03:37:22.903 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 745 03:37:22.903 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 746 03:37:22.903 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175593, seq# expected = 2301175593 747 03:40:53.680 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 748 03:45:53.828 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 749 03:50:54.046 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 750 03:55:58.702 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 751 04:00:59.392 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 752 04:01:24.089 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175593 753 04:01:24.089 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 754 04:01:24.109 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 755 04:01:24.109 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 756 04:01:24.109 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175594, seq# expected = 2301175594 757 04:05:56.213 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 758 04:10:56.223 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 759 04:13:15.569 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175594 760 04:13:15.569 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 761 04:13:15.599 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 762 04:13:15.599 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 763 04:13:15.599 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175595, seq# expected = 2301175595 764 04:15:56.408 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 765 04:20:56.590 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 766 04:25:14.306 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175595 767 04:25:14.306 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 768 04:25:14.326 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 769 04:25:14.326 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 770 04:25:14.326 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175596, seq# expected = 2301175596 771 04:25:57.261 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 772 04:30:56.973 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 773 04:35:59.641 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 774 04:41:04.818 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 775 04:46:05.998 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 776 04:51:10.675 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 777 04:56:16.760 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 778 05:01:12.057 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 779 05:06:12.489 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 780 05:11:12.916 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 781 05:13:14.895 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175596 782 05:13:14.895 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 783 05:13:14.915 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 784 05:13:14.915 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 785 05:13:14.915 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175597, seq# expected = 2301175597 786 05:16:13.409 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 787 05:21:13.846 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 788 05:26:14.283 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 789 05:31:14.720 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 790 05:36:15.797 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 791 05:41:16.604 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 792 05:46:45.864 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 793 05:49:57.584 05/14/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2301175597 794 05:49:57.584 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 795 05:50:05.573 05/14/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 796 05:50:05.573 05/14/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 797 05:50:05.573 05/14/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2301175598, seq# expected = 2301175598 798 05:52:06.397 05/14/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1156, dst port 4005 799 05:53:08.324 05/14/06 Sev=Warning/3 GUI/0xA3B00004 Unable to load tray icon. 800 05:53:28.270 05/14/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 801 05:53:28.270 05/14/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 802 05:53:28.270 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 803 05:53:28.280 05/14/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 302597EA INBOUND SPI = D6362DC0) 804 05:53:28.280 05/14/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=DFA31546 805 05:53:28.280 05/14/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=4EA4E90D280DE0C8 R_Cookie=33EAF853C4B6EB93) reason = DEL_REASON_RESET_SADB 806 05:53:28.280 05/14/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 807 05:53:28.280 05/14/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=4EA4E90D280DE0C8 R_Cookie=33EAF853C4B6EB93) reason = DEL_REASON_RESET_SADB 808 05:53:28.280 05/14/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 809 05:53:28.280 05/14/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 810 05:53:32.269 05/14/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 811 05:53:32.289 05/14/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1156 for TCP connection. 812 05:53:32.289 05/14/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 16:33:44 813 05:55:52.060 05/14/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter