EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 03:34:31.059 07/17/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 03:34:31.109 07/17/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 03:34:31.109 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 03:34:31.119 07/17/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1422 for TCP connection. 5 03:34:31.319 07/17/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 03:34:31.319 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 03:34:31.319 07/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1422, dst port 4005 8 03:34:31.319 07/17/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1422 9 03:34:31.319 07/17/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1422, dst port 4005 10 03:34:31.319 07/17/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 03:34:31.819 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 03:34:31.829 07/17/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 03:34:31.839 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 03:34:32.020 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 03:34:32.020 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 03:34:32.020 07/17/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 03:34:32.020 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 03:34:32.020 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 03:34:32.020 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 03:34:32.030 07/17/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 03:34:32.030 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 03:34:32.030 07/17/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 03:34:32.030 07/17/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 03:34:32.060 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 03:34:32.060 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 03:34:32.060 07/17/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 03:34:32.060 07/17/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8882158ED819EA88 R_Cookie=CEEC9326AB36F35B) reason = DEL_REASON_LOAD_BALANCING 28 03:34:32.060 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 03:34:32.821 07/17/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8882158ED819EA88 R_Cookie=CEEC9326AB36F35B) reason = DEL_REASON_LOAD_BALANCING 30 03:34:32.821 07/17/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 03:34:32.821 07/17/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 03:34:32.821 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 03:34:32.821 07/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 03:34:33.321 07/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1422, dst port 4005 35 03:34:33.321 07/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1422, dst port 4005 36 03:34:33.321 07/17/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1422 37 03:34:33.321 07/17/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1422, dst port 4005 38 03:34:33.321 07/17/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 03:34:33.822 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 03:34:33.822 07/17/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 03:34:33.832 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 03:34:34.012 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 03:34:34.012 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 03:34:34.012 07/17/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 03:34:34.012 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 03:34:34.012 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 03:34:34.012 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 03:34:34.012 07/17/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 03:34:34.012 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 03:34:34.012 07/17/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 03:34:34.012 07/17/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 03:34:34.062 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 03:34:34.062 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 03:34:34.062 07/17/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 03:34:42.732 07/17/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 03:34:42.732 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 03:34:45.174 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 03:34:45.174 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 03:34:45.174 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 03:34:45.174 07/17/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 03:34:45.234 07/17/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 03:34:45.234 07/17/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 03:34:45.234 07/17/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 03:34:45.234 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 03:34:46.135 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.4 68 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 03:34:46.135 07/17/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 03:34:46.145 07/17/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 03:34:46.145 07/17/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.4, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 03:34:46.145 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 03:34:46.186 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 13 seconds, setting expiry to 86387 seconds from now 87 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 03:34:46.186 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 03:34:46.186 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=242856B8 OUTBOUND SPI = 0x083B35AE INBOUND SPI = 0x4F965F29) 92 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x083B35AE 93 03:34:46.186 07/17/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4F965F29 94 03:34:48.027 07/17/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.4/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 03:34:48.108 07/17/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 03:34:48.128 07/17/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 03:34:48.138 07/17/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.32.4. 98 03:34:48.138 07/17/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.4. Current address(es): 192.168.1.4, 10.13.32.4. 99 03:34:48.368 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 03:34:48.368 07/17/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 03:34:48.368 07/17/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 03:34:48.368 07/17/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xae353b08 into key list 103 03:34:48.368 07/17/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 03:34:48.368 07/17/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x295f964f into key list 105 03:34:48.368 07/17/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.4 106 03:34:50.841 07/17/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xae353b08 for inbound key with SPI=0x295f964f 107 03:36:40.499 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036694 108 03:36:40.499 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 03:36:45.506 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036695 110 03:36:45.506 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 111 03:36:50.514 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036696 112 03:36:50.514 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 113 03:36:55.541 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036697 114 03:36:55.541 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 115 03:37:00.568 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036698 116 03:37:00.568 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 117 03:37:06.036 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036699 118 03:37:06.036 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 119 03:37:11.043 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036700 120 03:37:11.043 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 121 03:37:11.073 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 122 03:37:11.073 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 123 03:37:11.073 07/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1821036701, seq# expected = 1821036701 124 03:37:36.580 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036701 125 03:37:36.580 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 126 03:37:41.587 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036702 127 03:37:41.587 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 128 03:37:46.594 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036703 129 03:37:46.594 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 130 03:37:51.601 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036704 131 03:37:51.601 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 132 03:37:56.609 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036705 133 03:37:56.609 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 134 03:38:01.616 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036706 135 03:38:01.616 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 136 03:38:06.623 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036707 137 03:38:06.623 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 138 03:38:11.630 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036708 139 03:38:11.630 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 140 03:38:16.637 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1821036709 141 03:38:16.637 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 142 03:38:16.657 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 143 03:38:16.657 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 144 03:38:16.657 07/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1821036710, seq# expected = 1821036710 145 03:39:34.249 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1422, dst port 4005 146 03:40:47.254 07/17/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 147 03:40:47.254 07/17/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 148 03:40:47.254 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 149 03:40:47.254 07/17/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 83B35AE INBOUND SPI = 4F965F29) 150 03:40:47.254 07/17/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=242856B8 151 03:40:47.254 07/17/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7844A0B35E4E02DF R_Cookie=8EE8FD20922CEB5B) reason = DEL_REASON_RESET_SADB 152 03:40:47.254 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 153 03:40:47.254 07/17/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7844A0B35E4E02DF R_Cookie=8EE8FD20922CEB5B) reason = DEL_REASON_RESET_SADB 154 03:40:47.254 07/17/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 155 03:40:47.254 07/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 156 03:40:47.254 07/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 157 03:40:47.254 07/17/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1422 for TCP connection. 158 03:40:47.254 07/17/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 0:5:59 159 03:40:47.284 07/17/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 160 03:40:49.497 07/17/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 161 03:40:49.497 07/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 162 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x295f964f 163 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x295f964f 164 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xae353b08 165 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xae353b08 166 03:40:49.527 07/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1422, dst port 4005 167 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 168 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 169 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 170 03:40:49.527 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 171 04:07:02.028 07/17/06 Sev=Info/4 CM/0x63100002 Begin connection process 172 04:07:02.038 07/17/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 173 04:07:02.038 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 174 04:07:02.048 07/17/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1689 for TCP connection. 175 04:07:02.309 07/17/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 176 04:07:02.309 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 177 04:07:02.309 07/17/06 Sev=Info/6 IPSEC/0x6370002B Sent 1615 packets, 0 were fragmented. 178 04:07:02.309 07/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1689, dst port 4005 179 04:07:07.306 07/17/06 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw3.emc.com" 180 04:07:07.306 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 181 04:07:07.406 07/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 182 04:07:07.406 07/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1689, dst port 4005 183 04:07:07.406 07/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1689, dst port 4005 184 04:07:08.307 07/17/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1689 185 04:07:08.307 07/17/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1689, dst port 4005 186 04:07:08.307 07/17/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 187 04:07:08.808 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 188 04:07:08.808 07/17/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 189 04:07:08.818 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 190 04:07:09.078 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 191 04:07:09.078 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 192 04:07:09.078 07/17/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 193 04:07:09.078 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 194 04:07:09.078 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 195 04:07:09.078 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 196 04:07:09.078 07/17/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 197 04:07:09.078 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 198 04:07:09.078 07/17/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 199 04:07:09.078 07/17/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 200 04:07:09.179 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 201 04:07:09.179 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 202 04:07:09.179 07/17/06 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.17" from primary server 203 04:07:09.179 07/17/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B54B8E92C88BF442 R_Cookie=C6A6AF5513B84BB4) reason = DEL_REASON_LOAD_BALANCING 204 04:07:09.179 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 205 04:07:09.810 07/17/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B54B8E92C88BF442 R_Cookie=C6A6AF5513B84BB4) reason = DEL_REASON_LOAD_BALANCING 206 04:07:09.810 07/17/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 207 04:07:09.810 07/17/06 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.17" given by the primary server 208 04:07:09.810 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 209 04:07:09.820 07/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 210 04:07:10.320 07/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1689, dst port 4005 211 04:07:10.320 07/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.17, src port 1689, dst port 4005 212 04:07:10.320 07/17/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.17, src port 4005, dst port 1689 213 04:07:10.320 07/17/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.17, src port 1689, dst port 4005 214 04:07:10.320 07/17/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.17" 215 04:07:10.821 07/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 216 04:07:10.821 07/17/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.17. 217 04:07:10.831 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.17 218 04:07:11.081 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 219 04:07:11.081 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.17 220 04:07:11.081 07/17/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 221 04:07:11.081 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 222 04:07:11.081 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 223 04:07:11.081 07/17/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 224 04:07:11.091 07/17/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 225 04:07:11.091 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.17 226 04:07:11.091 07/17/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 227 04:07:11.091 07/17/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 228 04:07:11.202 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 229 04:07:11.202 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 230 04:07:11.202 07/17/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 231 04:07:16.229 07/17/06 Sev=Info/4 CM/0x63100017 xAuth application returned 232 04:07:16.229 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 233 04:07:21.576 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 234 04:07:21.576 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 235 04:07:21.576 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 236 04:07:21.576 07/17/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 237 04:07:21.586 07/17/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 238 04:07:21.586 07/17/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 239 04:07:21.586 07/17/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 240 04:07:21.586 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 241 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 242 04:07:22.598 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 243 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.17.7 244 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 245 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 246 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 247 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 248 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 249 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = *********************** EMC Americas East Coast VPN Gateway *********************** This is a restricted area. Unauthorized Access Prohibited. Access only authorized for EMC Approved Personnel. If you are not authorized by EMC, PLEASE DISCONNECT NOW. 250 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 251 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 252 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 253 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.Rel built by vmurphy on Jul 20 2005 10:12:45 254 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 255 04:07:22.598 07/17/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 256 04:07:22.598 07/17/06 Sev=Info/4 CM/0x63100019 Mode Config data received 257 04:07:22.608 07/17/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.17.7, GW IP = 128.221.195.17, Remote IP = 0.0.0.0 258 04:07:22.608 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.17 259 04:07:22.608 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 260 04:07:22.608 07/17/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 261 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 262 04:07:22.728 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.17 263 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 264 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 12 seconds, setting expiry to 86388 seconds from now 265 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 266 04:07:22.728 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.17 267 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 268 04:07:22.728 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.17 269 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=C89784F1 OUTBOUND SPI = 0x2119C1E7 INBOUND SPI = 0xC8711DD7) 270 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x2119C1E7 271 04:07:22.728 07/17/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xC8711DD7 272 04:07:23.840 07/17/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.17.7/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 273 04:07:23.840 07/17/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 274 04:07:23.860 07/17/06 Sev=Info/4 CM/0x6310001A One secure connection established 275 04:07:23.900 07/17/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.4.17.7. 276 04:07:23.900 07/17/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.17.7. Current address(es): 192.168.1.4, 10.4.17.7. 277 04:07:23.930 07/17/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 278 04:07:23.930 07/17/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe7c11921 into key list 279 04:07:23.930 07/17/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 280 04:07:23.930 07/17/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xd71d71c8 into key list 281 04:07:23.930 07/17/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.17.7 282 04:07:26.343 07/17/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xe7c11921 for inbound key with SPI=0xd71d71c8 283 04:12:11.771 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 284 04:17:12.018 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 285 04:22:12.364 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 286 04:27:12.740 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 287 04:32:13.086 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 288 04:37:13.422 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 289 04:42:13.758 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 290 04:47:14.094 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 291 04:52:14.430 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 292 04:57:14.766 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 293 05:02:15.102 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 294 05:07:15.939 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 295 05:10:44.672 07/17/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 296 05:10:44.672 07/17/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 297 05:10:44.672 07/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 298 05:12:15.458 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 299 05:17:15.708 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 300 05:22:15.886 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 301 05:27:16.064 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 302 05:32:16.262 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 303 05:37:16.440 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 304 05:42:16.628 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 305 05:45:33.902 07/17/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 306 05:45:33.902 07/17/06 Sev=Warning/3 IPSEC/0xA370001C Bad cTCP trailer, Rsvd 0, Magic# 696c4521h, trailer len 0, MajorVer 85, MinorVer 170 307 05:47:16.806 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 308 05:52:16.984 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 309 05:57:17.162 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 310 06:02:17.340 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 311 06:07:17.518 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 312 06:12:17.549 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 313 06:17:17.766 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 314 06:20:55.805 07/17/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 315 06:20:55.805 07/17/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 316 06:20:55.805 07/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 317 06:22:18.321 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 318 06:27:17.887 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 319 06:32:17.953 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 320 06:37:18.019 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 321 06:42:18.085 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 322 06:47:18.121 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 323 06:52:18.187 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 324 06:57:18.253 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 325 07:02:18.319 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 326 07:07:18.385 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 327 07:12:19.028 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 328 07:17:18.821 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 329 07:22:19.766 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 330 07:27:19.703 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 331 07:32:20.141 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 332 07:35:57.458 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 45955820 333 07:35:57.458 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 334 07:35:57.578 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 335 07:35:57.578 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 336 07:35:57.578 07/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 45955821, seq# expected = 45955821 337 07:37:20.079 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 338 07:42:21.518 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 339 07:47:21.455 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 340 07:47:53.502 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 45955821 341 07:47:53.502 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 342 07:47:53.612 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 343 07:47:53.612 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 344 07:47:53.612 07/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 45955822, seq# expected = 45955822 345 07:52:21.893 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 346 07:57:22.331 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 347 07:59:51.549 07/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 45955822 348 07:59:51.549 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 349 07:59:51.659 07/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 350 07:59:51.659 07/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 351 07:59:51.659 07/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 45955823, seq# expected = 45955823 352 08:02:22.769 07/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1689, dst port 4005 353 08:04:05.659 07/17/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 354 08:04:05.659 07/17/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 355 08:04:05.659 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.17 356 08:04:05.659 07/17/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2119C1E7 INBOUND SPI = C8711DD7) 357 08:04:05.659 07/17/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=C89784F1 358 08:04:05.659 07/17/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=685A8CC110AFF8E5 R_Cookie=D647C213FE6BA536) reason = DEL_REASON_RESET_SADB 359 08:04:05.659 07/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.17 360 08:04:05.659 07/17/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=685A8CC110AFF8E5 R_Cookie=D647C213FE6BA536) reason = DEL_REASON_RESET_SADB 361 08:04:05.659 07/17/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 362 08:04:05.659 07/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 363 08:04:05.659 07/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 364 08:04:05.659 07/17/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1689 for TCP connection. 365 08:04:05.659 07/17/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.17 disconnected: duration: 0 days 3:56:42 366 08:04:05.669 07/17/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 367 08:04:07.972 07/17/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 368 08:04:07.972 07/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 369 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd71d71c8 370 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd71d71c8 371 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe7c11921 372 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe7c11921 373 08:04:08.012 07/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.17, src port 1689, dst port 4005 374 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 375 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 376 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 377 08:04:08.012 07/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys