EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 01:51:41.302 08/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 01:51:41.332 08/08/06 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xC0A80104 (DRVIFACE:1199). 3 01:51:41.342 08/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 4 01:51:41.342 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 5 01:51:41.362 08/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3185 for TCP connection. 6 01:51:41.372 08/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 01:51:41.372 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 01:51:41.372 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3185, dst port 4005 9 01:51:42.293 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3185 10 01:51:42.293 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3185, dst port 4005 11 01:51:42.293 08/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 01:51:42.794 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 01:51:42.794 08/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 01:51:42.814 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 01:51:42.974 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 01:51:42.974 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 01:51:42.974 08/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 01:51:42.974 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 01:51:42.974 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 01:51:42.974 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 01:51:42.984 08/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 01:51:42.984 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 01:51:42.984 08/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 01:51:42.984 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 01:51:43.004 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 01:51:43.004 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 01:51:43.004 08/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 01:51:43.004 08/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A143DE3CF14C06C4 R_Cookie=997406FF62486E0B) reason = DEL_REASON_LOAD_BALANCING 29 01:51:43.004 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 01:51:43.795 08/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A143DE3CF14C06C4 R_Cookie=997406FF62486E0B) reason = DEL_REASON_LOAD_BALANCING 31 01:51:43.795 08/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 01:51:43.795 08/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 01:51:43.795 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 01:51:43.795 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 01:51:44.296 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3185, dst port 4005 36 01:51:44.296 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3185, dst port 4005 37 01:51:44.296 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3185 38 01:51:44.296 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3185, dst port 4005 39 01:51:44.296 08/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 40 01:51:44.797 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 41 01:51:44.797 08/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 42 01:51:44.807 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 43 01:51:44.977 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 44 01:51:44.977 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 45 01:51:44.977 08/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 01:51:44.977 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 01:51:44.977 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 01:51:44.977 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 01:51:44.987 08/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 01:51:44.987 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 51 01:51:44.987 08/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 01:51:44.987 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 01:51:45.017 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 54 01:51:45.017 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 55 01:51:45.017 08/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 01:51:53.780 08/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 57 01:51:53.780 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 58 01:51:57.495 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 59 01:51:57.495 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 60 01:51:57.495 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 61 01:51:57.495 08/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3226786E3B9282E0 R_Cookie=6BABC9F1B1AE2857) reason = DEL_REASON_WE_FAILED_AUTH 62 01:51:57.495 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 63 01:51:57.815 08/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 3185 64 01:51:58.316 08/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3226786E3B9282E0 R_Cookie=6BABC9F1B1AE2857) reason = DEL_REASON_WE_FAILED_AUTH 65 01:51:58.316 08/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "DEL_REASON_WE_FAILED_AUTH" 66 01:51:58.316 08/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 67 01:51:58.316 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 68 01:51:58.316 08/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 3185 for TCP connection. 69 01:51:58.316 08/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 70 01:51:58.316 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 3185, dst port 4005 71 01:51:58.316 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 72 01:51:58.316 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 73 01:51:58.316 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 01:51:58.316 08/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 75 01:52:02.923 08/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 76 01:52:02.933 08/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 77 01:52:02.933 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 78 01:52:02.943 08/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3194 for TCP connection. 79 01:52:03.323 08/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 80 01:52:03.323 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 81 01:52:03.323 08/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 82 01:52:03.323 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3194, dst port 4005 83 01:52:03.323 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3194 84 01:52:03.323 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3194, dst port 4005 85 01:52:03.323 08/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 86 01:52:03.824 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 87 01:52:03.834 08/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 88 01:52:03.844 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 89 01:52:04.004 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 90 01:52:04.004 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 91 01:52:04.004 08/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 92 01:52:04.004 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 93 01:52:04.004 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 94 01:52:04.004 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 95 01:52:04.014 08/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 96 01:52:04.014 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 97 01:52:04.014 08/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 98 01:52:04.014 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 99 01:52:04.034 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 100 01:52:04.034 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 101 01:52:04.034 08/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 102 01:52:04.034 08/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=DD9B09040F7F0390 R_Cookie=2DDBB0B613351BEB) reason = DEL_REASON_LOAD_BALANCING 103 01:52:04.034 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 104 01:52:04.825 08/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=DD9B09040F7F0390 R_Cookie=2DDBB0B613351BEB) reason = DEL_REASON_LOAD_BALANCING 105 01:52:04.825 08/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 106 01:52:04.825 08/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 107 01:52:04.825 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 108 01:52:04.825 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 109 01:52:05.326 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3194, dst port 4005 110 01:52:05.326 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3194, dst port 4005 111 01:52:05.326 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3194 112 01:52:05.326 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3194, dst port 4005 113 01:52:05.326 08/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 114 01:52:05.827 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 115 01:52:05.827 08/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 116 01:52:05.837 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 117 01:52:06.007 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 118 01:52:06.007 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 119 01:52:06.007 08/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 120 01:52:06.007 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 121 01:52:06.007 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 122 01:52:06.007 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 123 01:52:06.017 08/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 124 01:52:06.017 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 125 01:52:06.017 08/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 126 01:52:06.017 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 127 01:52:06.047 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 128 01:52:06.047 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 129 01:52:06.047 08/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 130 01:52:16.562 08/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 131 01:52:16.562 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 132 01:52:16.673 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 133 01:52:16.673 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DWR) from 137.69.115.17 134 01:52:16.673 08/08/06 Sev=Info/4 IKE/0x63000080 Delete Reason Code: 4 --> PEER_DELETE-IKE_DELETE_NO_ERROR. 135 01:52:16.673 08/08/06 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=334240C585BFE961 R_Cookie=241969DDBA287D58 136 01:52:16.673 08/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=334240C585BFE961 R_Cookie=241969DDBA287D58) reason = PEER_DELETE-IKE_DELETE_NO_ERROR 137 01:52:16.843 08/08/06 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 3194 138 01:52:17.343 08/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=334240C585BFE961 R_Cookie=241969DDBA287D58) reason = PEER_DELETE-IKE_DELETE_NO_ERROR 139 01:52:17.343 08/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "PEER_DELETE-IKE_DELETE_NO_ERROR" 140 01:52:17.343 08/08/06 Sev=Info/4 CM/0x63100011 Attempt connection with backup server "usvgw1.emc.com" 141 01:52:17.343 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 142 01:52:17.364 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 143 01:52:17.364 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 3194, dst port 4005 144 01:52:17.364 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 3194, dst port 4005 145 01:52:18.345 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 3194 146 01:52:18.345 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 3194, dst port 4005 147 01:52:22.851 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 3194, dst port 4005 148 01:52:27.859 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 3194, dst port 4005 149 01:52:32.866 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 3194, dst port 4005 150 01:52:37.873 08/08/06 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw1.emc.com" 151 01:52:37.873 08/08/06 Sev=Info/4 CM/0x6310000C All connection attempts with backup server failed 152 01:52:37.873 08/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 153 01:52:37.873 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 154 01:52:37.873 08/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 3194 for TCP connection. 155 01:52:37.883 08/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 156 01:52:37.893 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 3194, dst port 4005 157 01:52:37.893 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 158 01:52:37.893 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 159 01:52:37.893 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 160 01:52:37.893 08/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 161 01:53:05.953 08/08/06 Sev=Info/4 CM/0x63100002 Begin connection process 162 01:53:05.963 08/08/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 163 01:53:05.963 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 164 01:53:05.973 08/08/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3210 for TCP connection. 165 01:53:06.414 08/08/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 166 01:53:06.414 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 167 01:53:06.414 08/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 6 packets, 0 were fragmented. 168 01:53:06.414 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3210, dst port 4005 169 01:53:06.414 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3210 170 01:53:06.414 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3210, dst port 4005 171 01:53:06.414 08/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 172 01:53:06.915 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 173 01:53:06.915 08/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 174 01:53:06.925 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 175 01:53:07.085 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 176 01:53:07.085 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 177 01:53:07.085 08/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 178 01:53:07.085 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 179 01:53:07.085 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 180 01:53:07.085 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 181 01:53:07.095 08/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 182 01:53:07.095 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 183 01:53:07.095 08/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 184 01:53:07.095 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 185 01:53:07.115 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 186 01:53:07.115 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 187 01:53:07.115 08/08/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 188 01:53:07.115 08/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E8D442F7A83267B5 R_Cookie=77969A0025D4271F) reason = DEL_REASON_LOAD_BALANCING 189 01:53:07.115 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 190 01:53:07.916 08/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E8D442F7A83267B5 R_Cookie=77969A0025D4271F) reason = DEL_REASON_LOAD_BALANCING 191 01:53:07.916 08/08/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 192 01:53:07.916 08/08/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 193 01:53:07.916 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 194 01:53:07.916 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 195 01:53:08.417 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3210, dst port 4005 196 01:53:08.417 08/08/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3210, dst port 4005 197 01:53:08.417 08/08/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3210 198 01:53:08.417 08/08/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3210, dst port 4005 199 01:53:08.417 08/08/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 200 01:53:08.918 08/08/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 201 01:53:08.928 08/08/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 202 01:53:08.938 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 203 01:53:09.108 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 01:53:09.108 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 205 01:53:09.108 08/08/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 206 01:53:09.108 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 207 01:53:09.108 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 208 01:53:09.108 08/08/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 209 01:53:09.118 08/08/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 210 01:53:09.118 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 211 01:53:09.118 08/08/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 212 01:53:09.118 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 213 01:53:09.138 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 214 01:53:09.138 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 215 01:53:09.138 08/08/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 216 01:53:24.220 08/08/06 Sev=Info/4 CM/0x63100017 xAuth application returned 217 01:53:24.220 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 218 01:53:26.673 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 219 01:53:26.673 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 220 01:53:26.673 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 221 01:53:26.673 08/08/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 222 01:53:26.883 08/08/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 223 01:53:26.883 08/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 224 01:53:26.883 08/08/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 225 01:53:26.883 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 226 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 227 01:53:27.885 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 228 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.150 229 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 230 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 231 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 232 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 233 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 234 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 235 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 236 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 237 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 238 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 239 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 240 01:53:27.885 08/08/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 241 01:53:27.885 08/08/06 Sev=Info/4 CM/0x63100019 Mode Config data received 242 01:53:27.895 08/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.150, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 243 01:53:27.895 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 244 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 245 01:53:27.935 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 246 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 247 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 19 seconds, setting expiry to 86381 seconds from now 248 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 249 01:53:27.935 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 250 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 251 01:53:27.935 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 252 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=51E27011 OUTBOUND SPI = 0x48A9B2FB INBOUND SPI = 0x6D5CE3C7) 253 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x48A9B2FB 254 01:53:27.935 08/08/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x6D5CE3C7 255 01:53:28.356 08/08/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.150/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 256 01:53:28.366 08/08/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 257 01:53:28.426 08/08/06 Sev=Info/4 CM/0x6310001A One secure connection established 258 01:53:28.476 08/08/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.32.150. 259 01:53:28.476 08/08/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.150. Current address(es): 192.168.1.4, 10.13.32.150. 260 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 261 01:53:28.636 08/08/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 262 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 263 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfbb2a948 into key list 264 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 265 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc7e35c6d into key list 266 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.150 267 01:53:28.636 08/08/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xfbb2a948 for inbound key with SPI=0xc7e35c6d 268 01:58:09.860 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 269 02:03:10.292 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 270 02:08:10.184 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 271 02:13:11.089 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 272 02:18:11.275 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 273 02:23:11.463 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 274 02:28:11.641 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 275 02:33:11.819 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 276 02:38:11.997 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 277 02:43:12.175 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 278 02:48:12.353 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 279 02:53:12.531 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 280 02:58:12.709 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 281 03:03:12.887 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 282 03:08:13.263 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 283 03:13:13.749 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 284 03:18:13.927 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 285 03:23:14.808 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 286 03:28:14.490 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 287 03:33:15.171 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 288 03:38:14.853 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 289 03:43:15.534 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 290 03:48:15.216 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 291 03:53:15.897 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 292 03:58:15.579 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 293 04:03:16.259 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 294 04:08:15.451 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 295 04:13:16.172 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 296 04:18:16.355 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 297 04:23:16.533 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 298 04:28:16.711 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 299 04:33:16.889 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 300 04:38:17.067 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 301 04:43:17.245 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 302 04:48:17.423 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 303 04:53:17.601 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 304 04:58:17.779 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 305 05:03:17.957 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 306 05:08:18.343 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 307 05:13:18.912 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 308 05:18:19.088 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 309 05:23:18.770 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 310 05:28:19.450 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 311 05:33:19.132 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 312 05:38:19.314 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 313 05:43:19.995 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 314 05:48:19.677 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 315 05:53:20.358 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 316 05:58:20.040 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 317 06:03:20.721 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 318 06:08:20.456 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 319 06:13:20.545 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 320 06:18:20.728 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 321 06:23:20.906 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 322 06:28:21.084 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 323 06:33:21.262 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 324 06:38:21.440 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 325 06:43:21.618 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 326 06:48:21.796 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 327 06:53:21.974 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 328 06:58:22.152 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 329 07:03:22.330 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 330 07:08:23.151 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 331 07:13:23.079 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 332 07:18:23.512 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 333 07:23:23.950 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 334 07:28:24.388 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 335 07:33:24.826 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 336 07:38:25.264 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 337 07:43:25.702 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 338 07:48:26.140 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 339 07:53:26.578 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 340 07:58:27.016 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 341 08:03:27.454 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 342 08:08:27.867 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 343 08:13:28.445 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 344 08:17:27.854 08/08/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xfbb2a948 is about to expire, requesting a new one 345 08:17:27.854 08/08/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.150, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 346 08:17:27.854 08/08/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=0F4D4D7C) Initiator = ID=10.13.32.150 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 347 08:17:27.854 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 348 08:17:27.884 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 349 08:17:27.884 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 350 08:17:27.884 08/08/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 351 08:17:27.884 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 352 08:17:27.894 08/08/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=0F4D4D7C OUTBOUND SPI = 0x5A44C4B9 INBOUND SPI = 0x4CBE85C2) 353 08:17:27.894 08/08/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x5A44C4B9 354 08:17:27.894 08/08/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4CBE85C2 355 08:17:27.894 08/08/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 356 08:17:28.365 08/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 357 08:17:28.365 08/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb9c4445a into key list 358 08:17:28.365 08/08/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 359 08:17:28.365 08/08/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc285be4c into key list 360 08:17:57.878 08/08/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 361 08:17:57.878 08/08/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 362 08:17:57.878 08/08/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 48A9B2FB INBOUND SPI = 6D5CE3C7) 363 08:17:57.878 08/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=51E27011 364 08:17:57.898 08/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc7e35c6d 365 08:17:57.898 08/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc7e35c6d 366 08:17:57.898 08/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xfbb2a948 367 08:17:57.898 08/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xfbb2a948 368 08:17:58.399 08/08/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xb9c4445a for inbound key with SPI=0xc285be4c 369 08:18:27.942 08/08/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3210, dst port 4005 370 08:19:23.893 08/08/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 371 08:19:23.893 08/08/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 372 08:19:23.893 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 373 08:19:23.893 08/08/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5A44C4B9 INBOUND SPI = 4CBE85C2) 374 08:19:23.893 08/08/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=0F4D4D7C 375 08:19:23.893 08/08/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=42F30F39117DB7E9 R_Cookie=CE89D36ECB09EA9F) reason = DEL_REASON_RESET_SADB 376 08:19:23.893 08/08/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 377 08:19:23.893 08/08/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=42F30F39117DB7E9 R_Cookie=CE89D36ECB09EA9F) reason = DEL_REASON_RESET_SADB 378 08:19:23.893 08/08/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 379 08:19:23.893 08/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 380 08:19:23.893 08/08/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 381 08:19:23.893 08/08/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 3210 for TCP connection. 382 08:19:23.893 08/08/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 6:25:55 383 08:19:23.923 08/08/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 384 08:19:25.095 08/08/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 385 08:19:25.105 08/08/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 386 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc285be4c 387 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc285be4c 388 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb9c4445a 389 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb9c4445a 390 08:19:25.105 08/08/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 3210, dst port 4005 391 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 392 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 393 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 394 08:19:25.105 08/08/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys