EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 22:26:32.210 07/20/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 22:26:32.250 07/20/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 22:26:32.250 07/20/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 22:26:32.311 07/20/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1103 for TCP connection. 5 22:26:32.321 07/20/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 22:26:32.321 07/20/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 22:26:32.321 07/20/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1103, dst port 4005 8 22:26:33.151 07/20/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1103 9 22:26:33.151 07/20/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1103, dst port 4005 10 22:26:33.151 07/20/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 22:26:33.652 07/20/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 22:26:33.652 07/20/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 22:26:33.712 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 22:26:33.872 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 22:26:33.872 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 22:26:33.872 07/20/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 22:26:33.872 07/20/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 22:26:33.872 07/20/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 22:26:33.872 07/20/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 22:26:33.882 07/20/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 22:26:33.882 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 22:26:33.882 07/20/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 22:26:33.882 07/20/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 22:26:33.912 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 22:26:33.912 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 22:26:33.912 07/20/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 22:26:33.912 07/20/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=6D55E9FC278C4AF6 R_Cookie=4BF1CBF87F9C31FA) reason = DEL_REASON_LOAD_BALANCING 28 22:26:33.912 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 22:26:34.653 07/20/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=6D55E9FC278C4AF6 R_Cookie=4BF1CBF87F9C31FA) reason = DEL_REASON_LOAD_BALANCING 30 22:26:34.653 07/20/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 22:26:34.653 07/20/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 22:26:34.653 07/20/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 22:26:34.653 07/20/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 22:26:35.154 07/20/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1103, dst port 4005 35 22:26:35.154 07/20/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1103, dst port 4005 36 22:26:35.154 07/20/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1103 37 22:26:35.154 07/20/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1103, dst port 4005 38 22:26:35.154 07/20/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 22:26:35.654 07/20/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 22:26:35.654 07/20/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 22:26:35.664 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 22:26:35.824 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 22:26:35.824 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 22:26:35.824 07/20/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 22:26:35.824 07/20/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 22:26:35.824 07/20/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 22:26:35.824 07/20/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 22:26:35.834 07/20/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 22:26:35.834 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 22:26:35.834 07/20/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 22:26:35.834 07/20/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 22:26:35.854 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 22:26:35.854 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 22:26:35.854 07/20/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 22:26:43.142 07/20/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 22:26:43.142 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 22:26:45.535 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 22:26:45.535 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 22:26:45.535 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 22:26:45.535 07/20/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 22:26:45.605 07/20/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 22:26:45.605 07/20/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 22:26:45.605 07/20/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 22:26:45.605 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 22:26:46.586 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.68 68 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 22:26:46.586 07/20/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 22:26:46.616 07/20/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 22:26:46.616 07/20/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.68, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 22:26:46.616 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 22:26:46.656 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 11 seconds, setting expiry to 86389 seconds from now 87 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 22:26:46.656 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 22:26:46.656 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=7901AF6C OUTBOUND SPI = 0x05E267A1 INBOUND SPI = 0x92BFA017) 92 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x05E267A1 93 22:26:46.656 07/20/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x92BFA017 94 22:26:49.289 07/20/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.68/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 22:26:49.419 07/20/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 22:26:49.469 07/20/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 22:26:49.489 07/20/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.32.68. 98 22:26:49.489 07/20/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.68. Current address(es): 192.168.1.4, 10.13.32.68. 99 22:26:50.290 07/20/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 22:26:50.290 07/20/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 22:26:50.290 07/20/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 22:26:50.290 07/20/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa167e205 into key list 103 22:26:50.290 07/20/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 22:26:50.290 07/20/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x17a0bf92 into key list 105 22:26:50.290 07/20/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.68 106 22:26:52.684 07/20/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xa167e205 for inbound key with SPI=0x17a0bf92 107 22:28:36.823 07/20/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879005 108 22:28:36.823 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 22:28:36.843 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 22:28:36.843 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 22:28:36.843 07/20/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879006, seq# expected = 2187879006 112 22:31:36.592 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 113 22:36:37.034 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 114 22:36:40.038 07/20/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879006 115 22:36:40.038 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 116 22:36:40.058 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 117 22:36:40.058 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 118 22:36:40.058 07/20/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879007, seq# expected = 2187879007 119 22:41:37.466 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 120 22:46:37.617 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 121 22:48:38.812 07/20/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879007 122 22:48:38.812 07/20/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 123 22:48:38.852 07/20/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 124 22:48:38.852 07/20/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 125 22:48:38.852 07/20/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879008, seq# expected = 2187879008 126 22:51:37.639 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 127 22:56:38.071 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 128 23:01:38.503 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 129 23:06:38.935 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 130 23:11:39.367 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 131 23:16:39.799 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 132 23:21:40.231 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 133 23:26:40.692 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 134 23:31:41.164 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 135 23:36:41.596 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 136 23:41:42.028 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 137 23:46:42.470 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 138 23:51:42.902 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 139 23:56:43.334 07/20/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 140 00:01:43.766 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 141 00:06:44.218 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 142 00:11:44.650 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 143 00:16:45.092 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 144 00:21:45.564 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 145 00:26:46.036 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 146 00:31:46.478 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 147 00:36:46.920 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 148 00:41:47.352 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 149 00:46:47.784 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 150 00:51:47.945 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 151 00:56:48.227 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 152 00:59:38.592 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 153 00:59:38.592 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 154 00:59:38.592 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 155 01:01:48.659 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 156 01:06:49.091 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 157 01:11:49.523 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 158 01:16:49.975 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 159 01:21:50.407 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 160 01:26:50.839 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 161 01:31:51.271 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 162 01:36:51.703 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 163 01:41:52.135 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 164 01:45:33.484 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 165 01:45:33.484 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 166 01:45:33.484 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 167 01:46:52.257 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 168 01:51:52.679 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 169 01:56:52.941 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 170 02:00:36.893 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879008 171 02:00:36.893 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 172 02:00:36.913 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 173 02:00:36.913 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 174 02:00:36.913 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879009, seq# expected = 2187879009 175 02:01:53.002 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 176 02:02:03.527 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 177 02:02:03.527 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 178 02:02:03.527 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 179 02:02:04.529 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 180 02:02:04.529 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 181 02:02:04.529 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 182 02:02:04.529 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 183 02:02:04.529 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 184 02:02:04.529 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 185 02:06:03.863 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 186 02:06:03.863 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 187 02:06:03.863 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 188 02:06:53.434 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 189 02:08:04.036 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 190 02:08:04.036 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 191 02:08:04.036 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 192 02:11:53.866 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 193 02:16:54.298 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 194 02:21:54.730 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 195 02:26:55.064 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 196 02:31:55.294 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 197 02:35:17.156 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879009 198 02:35:17.156 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 199 02:35:17.187 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 200 02:35:17.187 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 201 02:35:17.187 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879010, seq# expected = 2187879010 202 02:35:47.857 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879010 203 02:35:47.857 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 204 02:35:47.877 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 205 02:35:47.877 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 206 02:35:47.877 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879011, seq# expected = 2187879011 207 02:36:55.111 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 208 02:40:50.153 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879011 209 02:40:50.153 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 210 02:40:50.183 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 211 02:40:50.183 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 212 02:40:50.183 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879012, seq# expected = 2187879012 213 02:41:55.480 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 214 02:46:56.180 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 215 02:51:56.368 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 216 02:56:56.546 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 217 03:01:56.724 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 218 03:06:56.902 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 219 03:11:57.090 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 220 03:16:57.268 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 221 03:21:57.446 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 222 03:26:57.624 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 223 03:31:57.802 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 224 03:36:57.980 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 225 03:41:58.169 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 226 03:46:07.658 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 227 03:46:07.658 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 228 03:46:07.658 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 229 03:46:58.347 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 230 03:51:58.535 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 231 03:56:58.723 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 232 04:01:58.891 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 233 04:06:59.069 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 234 04:11:59.247 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 235 04:16:59.425 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 236 04:21:59.603 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 237 04:26:59.801 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 238 04:32:00.531 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 239 04:35:40.824 07/21/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 240 04:35:40.824 07/21/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 241 04:35:40.824 07/21/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 242 04:37:00.436 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 243 04:42:00.856 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 244 04:47:01.276 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 245 04:50:47.101 07/21/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xa167e205 is about to expire, requesting a new one 246 04:50:47.101 07/21/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.68, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 247 04:50:47.101 07/21/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=293137C1) Initiator = ID=10.13.32.68 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 248 04:50:47.101 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 249 04:50:47.131 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 250 04:50:47.131 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 251 04:50:47.131 07/21/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 252 04:50:47.131 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 253 04:50:47.131 07/21/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=293137C1 OUTBOUND SPI = 0x38256FDC INBOUND SPI = 0x2FFB8834) 254 04:50:47.131 07/21/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x38256FDC 255 04:50:47.131 07/21/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x2FFB8834 256 04:50:47.131 07/21/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 257 04:50:47.612 07/21/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 258 04:50:47.612 07/21/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xdc6f2538 into key list 259 04:50:47.612 07/21/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 260 04:50:47.612 07/21/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3488fb2f into key list 261 04:51:17.133 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 262 04:51:17.133 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 263 04:51:17.133 07/21/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5E267A1 INBOUND SPI = 92BFA017) 264 04:51:17.133 07/21/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=7901AF6C 265 04:51:17.143 07/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x17a0bf92 266 04:51:17.143 07/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x17a0bf92 267 04:51:17.143 07/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa167e205 268 04:51:17.143 07/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa167e205 269 04:51:19.146 07/21/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xdc6f2538 for inbound key with SPI=0x3488fb2f 270 04:52:01.205 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 271 04:57:02.126 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 272 05:02:02.616 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 273 05:07:03.046 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 274 05:12:03.456 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 275 05:17:03.876 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 276 05:22:04.296 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 277 05:27:04.776 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 278 05:32:04.789 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 279 05:37:05.212 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 280 05:42:05.635 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 281 05:44:25.832 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879012 282 05:44:25.832 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 283 05:44:25.862 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 284 05:44:25.862 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 285 05:44:25.862 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879013, seq# expected = 2187879013 286 05:47:06.058 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 287 05:47:26.587 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879013 288 05:47:26.587 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 05:47:26.607 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 05:47:26.607 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 05:47:26.607 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879014, seq# expected = 2187879014 292 05:52:06.481 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 293 05:57:06.904 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 294 05:58:47.556 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879014 295 05:58:47.556 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 05:58:47.586 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 297 05:58:47.586 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 298 05:58:47.586 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879015, seq# expected = 2187879015 299 06:00:48.726 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879015 300 06:00:48.726 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 301 06:00:48.756 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 302 06:00:48.756 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 303 06:00:48.756 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879016, seq# expected = 2187879016 304 06:02:07.337 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 305 06:07:07.760 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 306 06:12:08.183 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 307 06:17:09.107 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 308 06:22:09.029 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 309 06:26:36.453 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879016 310 06:26:36.453 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 311 06:26:36.483 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 312 06:26:36.483 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 313 06:26:36.483 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879017, seq# expected = 2187879017 314 06:27:09.013 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 315 06:28:07.120 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879017 316 06:28:07.120 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 317 06:28:07.140 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 318 06:28:07.140 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 319 06:28:07.140 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879018, seq# expected = 2187879018 320 06:28:17.639 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879018 321 06:28:17.639 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 322 06:28:17.670 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 323 06:28:17.670 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 324 06:28:17.670 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879019, seq# expected = 2187879019 325 06:32:09.515 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 326 06:36:49.911 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879019 327 06:36:49.911 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 328 06:36:49.941 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 329 06:36:49.941 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 330 06:36:49.941 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879020, seq# expected = 2187879020 331 06:37:09.439 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 332 06:42:10.363 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 333 06:47:10.796 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 334 06:48:49.935 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879020 335 06:48:49.935 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 336 06:48:49.965 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 337 06:48:49.965 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 338 06:48:49.965 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879021, seq# expected = 2187879021 339 06:52:11.219 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 340 06:57:11.642 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 341 07:02:12.065 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 342 07:07:12.498 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 343 07:12:12.921 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 344 07:17:13.344 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 345 07:22:13.767 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 346 07:27:14.260 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 347 07:32:14.260 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 348 07:37:14.686 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 349 07:42:15.112 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 350 07:47:15.548 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 351 07:52:15.964 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 352 07:57:16.390 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 353 07:59:16.060 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879021 354 07:59:16.060 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 355 07:59:16.090 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 356 07:59:16.090 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 357 07:59:16.090 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879022, seq# expected = 2187879022 358 08:00:47.189 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879022 359 08:00:47.189 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 360 08:00:47.209 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 361 08:00:47.219 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 362 08:00:47.219 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879023, seq# expected = 2187879023 363 08:02:16.315 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 364 08:07:17.242 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 365 08:12:17.668 07/21/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 366 08:12:45.708 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879023 367 08:12:45.708 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 368 08:12:45.728 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 369 08:12:45.728 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 370 08:12:45.728 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879024, seq# expected = 2187879024 371 08:15:11.435 07/21/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2187879024 372 08:15:11.435 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 373 08:15:11.465 07/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 374 08:15:11.465 07/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 375 08:15:11.465 07/21/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2187879025, seq# expected = 2187879025 376 08:15:29.951 07/21/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 377 08:15:29.951 07/21/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 378 08:15:29.951 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 379 08:15:29.951 07/21/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 38256FDC INBOUND SPI = 2FFB8834) 380 08:15:29.951 07/21/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=293137C1 381 08:15:29.951 07/21/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=AB589474A52C18E0 R_Cookie=B27160EAF94D6D5F) reason = DEL_REASON_RESET_SADB 382 08:15:29.951 07/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 383 08:15:29.951 07/21/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=AB589474A52C18E0 R_Cookie=B27160EAF94D6D5F) reason = DEL_REASON_RESET_SADB 384 08:15:29.951 07/21/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 385 08:15:29.951 07/21/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 386 08:15:29.951 07/21/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 387 08:15:29.951 07/21/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1103 for TCP connection. 388 08:15:29.951 07/21/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 9:48:40 389 08:15:29.961 07/21/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 390 08:15:32.454 07/21/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 391 08:15:32.454 07/21/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 392 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3488fb2f 393 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3488fb2f 394 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xdc6f2538 395 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xdc6f2538 396 08:15:32.464 07/21/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1103, dst port 4005 397 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 398 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 399 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 400 08:15:32.464 07/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys