EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 02:11:43.363 08/11/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 02:11:43.443 08/11/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 02:11:43.443 08/11/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 02:11:43.473 08/11/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1100 for TCP connection. 5 02:11:43.473 08/11/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 02:11:43.473 08/11/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 02:11:43.473 08/11/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1100, dst port 4005 8 02:11:44.395 08/11/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1100 9 02:11:44.395 08/11/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1100, dst port 4005 10 02:11:44.395 08/11/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 02:11:44.895 08/11/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 02:11:44.895 08/11/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 02:11:44.915 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 02:11:45.076 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 02:11:45.076 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 02:11:45.076 08/11/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 02:11:45.076 08/11/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 02:11:45.076 08/11/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 02:11:45.076 08/11/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 02:11:45.086 08/11/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 02:11:45.086 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 02:11:45.086 08/11/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 02:11:45.086 08/11/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 02:11:45.106 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 02:11:45.106 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 02:11:45.106 08/11/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 02:11:45.106 08/11/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8D1FE4384CB6CB5A R_Cookie=D193472B94DA9990) reason = DEL_REASON_LOAD_BALANCING 28 02:11:45.106 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 02:11:45.897 08/11/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8D1FE4384CB6CB5A R_Cookie=D193472B94DA9990) reason = DEL_REASON_LOAD_BALANCING 30 02:11:45.897 08/11/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 02:11:45.897 08/11/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 02:11:45.897 08/11/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 02:11:45.897 08/11/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 02:11:46.397 08/11/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1100, dst port 4005 35 02:11:46.397 08/11/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1100, dst port 4005 36 02:11:46.397 08/11/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1100 37 02:11:46.397 08/11/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1100, dst port 4005 38 02:11:46.397 08/11/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 02:11:46.898 08/11/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 02:11:46.898 08/11/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 02:11:46.908 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 02:11:47.068 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 02:11:47.068 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 02:11:47.068 08/11/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 02:11:47.068 08/11/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 02:11:47.068 08/11/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 02:11:47.068 08/11/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 02:11:47.078 08/11/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 02:11:47.078 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 02:11:47.078 08/11/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 02:11:47.078 08/11/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 02:11:47.098 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 02:11:47.098 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 02:11:47.098 08/11/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 02:11:54.409 08/11/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 02:11:54.409 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 02:11:58.705 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 02:11:58.705 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 02:11:58.705 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 02:11:58.705 08/11/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 02:11:58.765 08/11/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 02:11:58.765 08/11/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 02:11:58.765 08/11/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 02:11:58.765 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 02:11:59.626 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.6.44 68 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 02:11:59.626 08/11/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 02:11:59.636 08/11/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 02:11:59.646 08/11/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.44, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 02:11:59.646 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 02:11:59.676 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 13 seconds, setting expiry to 86387 seconds from now 87 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 02:11:59.676 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 02:11:59.676 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=ADC1E781 OUTBOUND SPI = 0x29B60888 INBOUND SPI = 0xE4D030F4) 92 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x29B60888 93 02:11:59.676 08/11/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xE4D030F4 94 02:12:01.900 08/11/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.6.44/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 02:12:01.940 08/11/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 02:12:01.970 08/11/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 02:12:01.990 08/11/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.6.44. 98 02:12:01.990 08/11/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.6.44. Current address(es): 192.168.1.4, 10.13.6.44. 99 02:12:02.150 08/11/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 02:12:02.150 08/11/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 02:12:02.150 08/11/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 02:12:02.150 08/11/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8808b629 into key list 103 02:12:02.150 08/11/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 02:12:02.150 08/11/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf430d0e4 into key list 105 02:12:02.150 08/11/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.6.44 106 02:12:09.931 08/11/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x8808b629 for inbound key with SPI=0xf430d0e4 107 02:16:48.343 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 108 02:21:48.276 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 109 02:23:15.401 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627188 110 02:23:15.401 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 111 02:23:15.421 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 112 02:23:15.421 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 113 02:23:15.421 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627189, seq# expected = 1329627189 114 02:26:49.208 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 115 02:31:49.140 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 116 02:36:39.057 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627189 117 02:36:39.057 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 118 02:36:39.107 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 119 02:36:39.107 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 120 02:36:39.107 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627190, seq# expected = 1329627190 121 02:36:49.071 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 122 02:41:49.633 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 123 02:46:50.085 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 124 02:50:36.931 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627190 125 02:50:36.931 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 126 02:50:41.939 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627191 127 02:50:41.939 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 128 02:50:41.959 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 129 02:50:41.959 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 130 02:50:41.959 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627192, seq# expected = 1329627192 131 02:51:50.037 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 132 02:56:50.979 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 133 03:01:51.411 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 134 03:06:51.353 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 135 03:11:52.105 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 136 03:16:52.264 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 137 03:21:52.567 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 138 03:26:40.326 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627192 139 03:26:40.326 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 140 03:26:45.339 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627193 141 03:26:45.339 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 142 03:26:45.369 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 143 03:26:45.369 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 144 03:26:45.369 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627194, seq# expected = 1329627194 145 03:26:52.357 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 146 03:31:53.140 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 147 03:36:53.432 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 148 03:38:43.709 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627194 149 03:38:43.709 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 150 03:38:43.729 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 151 03:38:43.729 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 152 03:38:43.729 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627195, seq# expected = 1329627195 153 03:41:53.704 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 154 03:46:53.985 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 155 03:51:54.277 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 156 03:56:54.559 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 157 04:01:54.851 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 158 04:06:54.892 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 159 04:11:55.163 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 160 04:16:56.081 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 161 04:21:55.858 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 162 04:26:36.655 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627195 163 04:26:36.655 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 164 04:26:41.660 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627196 165 04:26:41.660 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 166 04:26:41.680 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 04:26:41.680 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 168 04:26:41.680 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627197, seq# expected = 1329627197 169 04:26:55.675 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 170 04:31:56.497 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 171 04:36:56.818 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 172 04:38:38.426 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627197 173 04:38:38.426 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 174 04:38:38.446 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 175 04:38:38.446 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 176 04:38:38.446 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627198, seq# expected = 1329627198 177 04:41:57.139 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 178 04:46:57.460 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 179 04:50:39.697 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627198 180 04:50:39.697 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 181 04:50:39.767 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 182 04:50:39.767 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 183 04:50:39.767 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627199, seq# expected = 1329627199 184 04:51:57.280 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 185 04:56:58.102 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 186 05:01:58.423 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 187 05:06:58.754 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 188 05:11:59.075 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 189 05:14:36.309 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627199 190 05:14:36.309 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 191 05:14:36.359 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 192 05:14:36.359 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 193 05:14:36.359 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627200, seq# expected = 1329627200 194 05:16:59.166 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 195 05:21:59.271 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 196 05:26:39.686 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627200 197 05:26:39.686 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 198 05:26:39.706 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 199 05:26:39.706 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 200 05:26:39.706 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627201, seq# expected = 1329627201 201 05:26:59.214 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 202 05:32:00.147 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 203 05:37:00.589 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 204 05:38:41.234 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627201 205 05:38:41.234 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 05:38:41.254 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 05:38:41.254 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 05:38:41.254 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627202, seq# expected = 1329627202 209 05:42:01.021 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 210 05:47:01.453 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 211 05:50:42.771 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627202 212 05:50:42.771 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 213 05:50:42.801 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 214 05:50:42.801 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 215 05:50:42.801 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627203, seq# expected = 1329627203 216 05:52:01.384 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 217 05:57:02.818 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 218 06:02:02.759 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 219 06:02:44.319 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627203 220 06:02:44.319 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 221 06:02:44.339 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 222 06:02:44.339 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 223 06:02:44.339 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627204, seq# expected = 1329627204 224 06:07:03.692 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 225 06:12:04.124 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 226 06:14:45.856 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627204 227 06:14:45.856 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 228 06:14:45.926 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 229 06:14:45.926 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 230 06:14:45.926 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627205, seq# expected = 1329627205 231 06:17:04.055 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 232 06:22:04.998 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 233 06:26:48.906 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627205 234 06:26:48.906 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 235 06:26:48.976 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 236 06:26:48.976 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 237 06:26:48.976 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627206, seq# expected = 1329627206 238 06:27:04.428 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 239 06:32:05.361 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 240 06:37:05.793 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 241 06:38:45.446 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627206 242 06:38:45.446 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 243 06:38:45.466 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 244 06:38:45.466 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 245 06:38:45.466 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627207, seq# expected = 1329627207 246 06:42:05.734 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 247 06:47:06.667 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 248 06:50:40.474 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627207 249 06:50:40.474 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 250 06:50:40.494 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 251 06:50:40.494 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 252 06:50:40.494 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627208, seq# expected = 1329627208 253 06:51:51.076 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627208 254 06:51:51.076 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 255 06:51:51.096 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 256 06:51:51.096 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 257 06:51:51.096 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627209, seq# expected = 1329627209 258 06:52:06.598 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 259 06:57:07.541 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 260 07:02:07.973 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 261 07:02:42.523 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627209 262 07:02:42.523 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 263 07:02:42.543 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 264 07:02:42.543 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 265 07:02:42.543 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627210, seq# expected = 1329627210 266 07:03:43.110 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627210 267 07:03:43.110 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 268 07:03:43.140 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 269 07:03:43.140 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 270 07:03:43.140 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627211, seq# expected = 1329627211 271 07:03:53.625 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627211 272 07:03:53.625 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 273 07:03:53.645 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 274 07:03:53.645 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 275 07:03:53.645 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627212, seq# expected = 1329627212 276 07:07:08.405 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 277 07:12:08.837 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 278 07:14:45.064 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627212 279 07:14:45.064 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 280 07:14:45.084 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 281 07:14:45.084 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 282 07:14:45.084 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627213, seq# expected = 1329627213 283 07:17:09.287 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 284 07:22:09.756 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 285 07:26:41.649 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627213 286 07:26:41.649 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 07:26:41.669 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 07:26:41.669 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 07:26:41.669 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627214, seq# expected = 1329627214 290 07:27:09.690 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 291 07:32:10.626 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 292 07:32:52.686 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627214 293 07:32:52.686 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 294 07:32:52.706 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 295 07:32:52.706 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 296 07:32:52.706 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627215, seq# expected = 1329627215 297 07:37:11.061 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 298 07:38:38.697 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627215 299 07:38:38.697 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 300 07:38:38.778 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 301 07:38:38.778 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 302 07:38:38.778 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627216, seq# expected = 1329627216 303 07:42:11.506 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 304 07:47:11.941 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 305 07:50:40.242 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627216 306 07:50:40.242 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 307 07:50:40.272 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 308 07:50:40.272 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 309 07:50:40.272 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627217, seq# expected = 1329627217 310 07:52:11.875 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 311 07:53:46.011 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627217 312 07:53:46.011 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 313 07:53:46.031 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 314 07:53:46.031 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 315 07:53:46.031 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627218, seq# expected = 1329627218 316 07:53:56.526 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627218 317 07:53:56.526 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 07:53:56.546 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 07:53:56.546 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 07:53:56.546 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627219, seq# expected = 1329627219 321 07:57:13.311 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 322 08:02:13.246 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 323 08:02:38.292 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627219 324 08:02:38.292 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 325 08:02:38.312 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 326 08:02:38.312 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 327 08:02:38.312 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627220, seq# expected = 1329627220 328 08:03:43.887 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627220 329 08:03:43.887 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 330 08:03:43.907 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 331 08:03:43.907 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 332 08:03:43.907 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627221, seq# expected = 1329627221 333 08:03:54.402 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627221 334 08:03:54.402 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 335 08:03:54.422 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 336 08:03:54.422 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 337 08:03:54.422 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627222, seq# expected = 1329627222 338 08:07:13.691 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 339 08:12:14.126 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 340 08:13:45.768 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627222 341 08:13:45.768 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 342 08:13:45.788 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 343 08:13:45.788 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 344 08:13:45.788 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627223, seq# expected = 1329627223 345 08:13:56.284 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627223 346 08:13:56.284 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 347 08:13:56.304 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 348 08:13:56.304 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 349 08:13:56.304 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627224, seq# expected = 1329627224 350 08:15:06.896 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627224 351 08:15:06.896 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 352 08:15:06.916 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 353 08:15:06.916 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 354 08:15:06.916 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627225, seq# expected = 1329627225 355 08:17:14.581 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 356 08:22:15.026 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 357 08:26:38.918 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627225 358 08:26:38.918 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 359 08:26:38.968 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 360 08:26:38.968 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 361 08:26:38.968 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627226, seq# expected = 1329627226 362 08:27:14.980 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 363 08:32:15.936 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 364 08:33:59.085 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627226 365 08:33:59.085 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 366 08:34:04.092 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627227 367 08:34:04.092 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 368 08:34:04.112 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 369 08:34:04.112 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 370 08:34:04.112 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627228, seq# expected = 1329627228 371 08:36:26.799 08/11/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x8808b629 is about to expire, requesting a new one 372 08:36:26.799 08/11/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.6.44, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 373 08:36:26.799 08/11/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=23DAB41F) Initiator = ID=10.13.6.44 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 374 08:36:26.799 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 375 08:36:26.829 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 376 08:36:26.829 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 377 08:36:26.829 08/11/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 378 08:36:26.829 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 379 08:36:26.829 08/11/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=23DAB41F OUTBOUND SPI = 0x136331EA INBOUND SPI = 0x2C98352E) 380 08:36:26.829 08/11/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x136331EA 381 08:36:26.829 08/11/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x2C98352E 382 08:36:26.829 08/11/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 383 08:36:27.310 08/11/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 384 08:36:27.310 08/11/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xea316313 into key list 385 08:36:27.310 08/11/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 386 08:36:27.310 08/11/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x2e35982c into key list 387 08:36:56.822 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 388 08:36:56.822 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 389 08:36:56.822 08/11/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 29B60888 INBOUND SPI = E4D030F4) 390 08:36:56.822 08/11/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=ADC1E781 391 08:36:56.842 08/11/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf430d0e4 392 08:36:56.842 08/11/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf430d0e4 393 08:36:56.842 08/11/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8808b629 394 08:36:56.842 08/11/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8808b629 395 08:37:10.362 08/11/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xea316313 for inbound key with SPI=0x2e35982c 396 08:37:15.870 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 397 08:38:40.002 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627228 398 08:38:40.002 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 399 08:38:40.022 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 400 08:38:40.022 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 401 08:38:40.022 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627229, seq# expected = 1329627229 402 08:42:16.816 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 403 08:47:17.261 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 404 08:50:39.053 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627229 405 08:50:39.053 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 406 08:50:39.083 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 407 08:50:39.083 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 408 08:50:39.083 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627230, seq# expected = 1329627230 409 08:52:05.178 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627230 410 08:52:05.178 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 411 08:52:05.208 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 412 08:52:05.208 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 413 08:52:05.208 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627231, seq# expected = 1329627231 414 08:52:17.696 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 415 08:57:18.131 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 416 09:02:18.576 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 417 09:07:15.045 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627231 418 09:07:15.045 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 419 09:07:15.115 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 420 09:07:15.115 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 421 09:07:15.115 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627232, seq# expected = 1329627232 422 09:07:18.550 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 423 09:07:45.589 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627232 424 09:07:45.589 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 425 09:07:45.609 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 426 09:07:45.609 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 427 09:07:45.609 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627233, seq# expected = 1329627233 428 09:08:21.141 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627233 429 09:08:21.141 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 430 09:08:21.161 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 431 09:08:21.161 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 432 09:08:21.161 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627234, seq# expected = 1329627234 433 09:12:19.486 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 434 09:14:37.686 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627234 435 09:14:37.686 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 436 09:14:42.693 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627235 437 09:14:42.693 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 438 09:14:42.713 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 439 09:14:42.713 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 440 09:14:42.713 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627236, seq# expected = 1329627236 441 09:17:09.406 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627236 442 09:17:09.406 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 443 09:17:09.436 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 444 09:17:09.436 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 445 09:17:09.436 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627237, seq# expected = 1329627237 446 09:17:19.420 08/11/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1100, dst port 4005 447 09:20:16.186 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627237 448 09:20:16.186 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 449 09:20:16.206 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 450 09:20:16.206 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 451 09:20:16.206 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627238, seq# expected = 1329627238 452 09:20:51.737 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627238 453 09:20:51.737 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 454 09:20:51.768 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 455 09:20:51.768 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 456 09:20:51.768 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627239, seq# expected = 1329627239 457 09:21:42.811 08/11/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1329627239 458 09:21:42.811 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 459 09:21:42.841 08/11/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 460 09:21:42.841 08/11/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 461 09:21:42.841 08/11/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1329627240, seq# expected = 1329627240 462 09:22:01.168 08/11/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 463 09:22:01.168 08/11/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 464 09:22:01.168 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 465 09:22:01.168 08/11/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 136331EA INBOUND SPI = 2C98352E) 466 09:22:01.168 08/11/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=23DAB41F 467 09:22:01.168 08/11/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=70A6806FB65032F8 R_Cookie=F5A0D6D776CB71E1) reason = DEL_REASON_RESET_SADB 468 09:22:01.168 08/11/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 469 09:22:01.168 08/11/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=70A6806FB65032F8 R_Cookie=F5A0D6D776CB71E1) reason = DEL_REASON_RESET_SADB 470 09:22:01.168 08/11/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 471 09:22:01.168 08/11/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 472 09:22:01.168 08/11/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 473 09:22:01.168 08/11/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1100 for TCP connection. 474 09:22:01.168 08/11/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 7:10:0 475 09:22:01.178 08/11/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 476 09:22:03.441 08/11/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 477 09:22:03.441 08/11/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 478 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x2e35982c 479 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x2e35982c 480 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xea316313 481 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xea316313 482 09:22:03.451 08/11/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1100, dst port 4005 483 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 484 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 485 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 486 09:22:03.451 08/11/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys