EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 07:24:02.648 08/21/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 07:24:02.718 08/21/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 07:24:02.718 08/21/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 4 07:24:02.748 08/21/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 5 07:24:02.788 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 6 07:24:02.788 08/21/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 07:24:02.788 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 07:24:02.818 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 9 07:24:02.818 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 10 07:24:02.818 08/21/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 11 07:24:02.818 08/21/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 12 07:24:02.838 08/21/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 13 07:24:02.838 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 14 07:24:02.838 08/21/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 15 07:24:02.838 08/21/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 16 07:24:02.868 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 17 07:24:02.868 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 18 07:24:02.868 08/21/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 19 07:24:03.389 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 20 07:24:03.389 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 21 07:24:04.390 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 22 07:24:04.390 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 23 07:24:06.403 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 24 07:24:06.403 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 25 07:24:10.429 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 26 07:24:10.429 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 27 07:24:13.043 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 10.0.0.1 28 07:24:13.043 08/21/06 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 29 07:24:16.397 08/21/06 Sev=Info/4 CM/0x63100017 xAuth application returned 30 07:24:16.397 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 31 07:24:19.522 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 32 07:24:19.522 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 33 07:24:19.522 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 34 07:24:19.522 08/21/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 35 07:24:19.983 08/21/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 36 07:24:19.983 08/21/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 37 07:24:19.983 08/21/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 38 07:24:19.983 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 39 07:24:19.993 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 40 07:24:19.993 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 41 07:24:19.993 08/21/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.24.199.2 42 07:24:19.993 08/21/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.255 43 07:24:19.993 08/21/06 Sev=Info/4 CM/0x63100019 Mode Config data received 44 07:24:20.013 08/21/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.199.2, GW IP = 10.0.0.1, Remote IP = 0.0.0.0 45 07:24:20.013 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 46 07:24:20.033 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 47 07:24:20.033 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 48 07:24:20.033 08/21/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 49 07:24:20.033 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 50 07:24:20.033 08/21/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=76DC3D72 OUTBOUND SPI = 0xB946D2F7 INBOUND SPI = 0x2796F1D2) 51 07:24:20.033 08/21/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0xB946D2F7 52 07:24:20.033 08/21/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x2796F1D2 53 07:24:22.526 08/21/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.24.199.2/255.255.255.255 DNS=0.0.0.0,0.0.0.0 WINS=0.0.0.0,0.0.0.0 Domain= Split DNS Names= 54 07:24:22.546 08/21/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 55 07:24:22.576 08/21/06 Sev=Info/4 CM/0x6310001A One secure connection established 56 07:24:22.596 08/21/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.24.199.2. Current address(es): 10.24.199.2. 57 07:24:22.596 08/21/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.24.199.2. Current address(es): 10.24.199.2. 58 07:24:22.817 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 59 07:24:22.817 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(Retransmission) from 10.0.0.1 60 07:24:22.817 08/21/06 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 61 07:24:22.817 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(Retransmission) to 10.0.0.1 62 07:24:22.817 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 63 07:24:22.817 08/21/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 64 07:24:22.817 08/21/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf7d246b9 into key list 65 07:24:22.817 08/21/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 66 07:24:22.817 08/21/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xd2f19627 into key list 67 07:24:22.817 08/21/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.24.199.2 68 07:24:25.561 08/21/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xf7d246b9 for inbound key with SPI=0xd2f19627 69 07:44:17.914 08/21/06 Sev=Warning/3 CM/0xA310002C Adapter address changed from 10.24.199.2. Current address(es): 169.254.209.145. 70 07:44:17.914 08/21/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 71 07:44:17.914 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 72 07:44:17.914 08/21/06 Sev=Warning/3 IKE/0xE3000068 Failed to send 76 bytes to 10.0.0.1, error = 0xFFFFFFF0 73 07:44:17.914 08/21/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = B946D2F7 INBOUND SPI = 2796F1D2) 74 07:44:17.924 08/21/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=76DC3D72 75 07:44:17.924 08/21/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3BD952775B07AAD8 R_Cookie=2E71CFC1B3F768B2) reason = DEL_REASON_ADDRESS_CHANGE 76 07:44:17.924 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 77 07:44:17.924 08/21/06 Sev=Warning/3 IKE/0xE3000068 Failed to send 84 bytes to 10.0.0.1, error = 0xFFFFFFF0 78 07:44:17.924 08/21/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3BD952775B07AAD8 R_Cookie=2E71CFC1B3F768B2) reason = DEL_REASON_ADDRESS_CHANGE 79 07:44:17.924 08/21/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 80 07:44:17.924 08/21/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 81 07:44:17.924 08/21/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 10.0.0.1 disconnected: duration: 0 days 0:19:55 82 07:44:17.984 08/21/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 83 07:44:17.984 08/21/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 84 07:44:17.984 08/21/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 85 07:44:17.984 08/21/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 86 07:44:17.984 08/21/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 87 07:44:20.378 08/21/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 88 07:44:20.378 08/21/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 89 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd2f19627 90 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd2f19627 91 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf7d246b9 92 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf7d246b9 93 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 94 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 95 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 96 07:44:20.378 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 97 07:57:50.463 08/21/06 Sev=Info/4 CM/0x63100002 Begin connection process 98 07:57:50.463 08/21/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 99 07:57:50.463 08/21/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "10.0.0.1" 100 07:57:50.473 08/21/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 10.0.0.1. 101 07:57:50.483 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.0.0.1 102 07:57:50.513 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 103 07:57:50.513 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(?), VID(Xauth), VID(Unity)) from 10.0.0.1 104 07:57:50.513 08/21/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 105 07:57:50.513 08/21/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 106 07:57:50.523 08/21/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 107 07:57:50.523 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 10.0.0.1 108 07:57:50.523 08/21/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 109 07:57:50.523 08/21/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 110 07:57:50.593 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 111 07:57:50.593 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 112 07:57:50.593 08/21/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 113 07:57:50.813 08/21/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 114 07:57:50.813 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 115 07:57:50.813 08/21/06 Sev=Info/6 IPSEC/0x6370002B Sent 562 packets, 0 were fragmented. 116 07:57:51.124 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 117 07:57:51.124 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 118 07:57:52.135 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 119 07:57:52.135 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 120 07:57:54.148 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 121 07:57:54.148 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 122 07:57:58.164 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 123 07:57:58.174 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 10.0.0.1 124 07:58:00.818 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:HEARTBEAT) to 10.0.0.1 125 07:58:00.818 08/21/06 Sev=Info/6 IKE/0x63000052 Sent a keepalive on the IKE SA 126 07:58:01.288 08/21/06 Sev=Info/4 CM/0x63100017 xAuth application returned 127 07:58:01.288 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 128 07:58:03.882 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 129 07:58:03.882 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 130 07:58:03.882 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 131 07:58:03.882 08/21/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 132 07:58:03.892 08/21/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 133 07:58:03.892 08/21/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 134 07:58:03.892 08/21/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 135 07:58:03.892 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 10.0.0.1 136 07:58:03.912 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 137 07:58:03.912 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.0.0.1 138 07:58:03.912 08/21/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.24.199.2 139 07:58:03.912 08/21/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.255.255 140 07:58:03.912 08/21/06 Sev=Info/4 CM/0x63100019 Mode Config data received 141 07:58:03.912 08/21/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.24.199.2, GW IP = 10.0.0.1, Remote IP = 0.0.0.0 142 07:58:03.912 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.0.0.1 143 07:58:03.942 08/21/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 10.0.0.1 144 07:58:03.942 08/21/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 10.0.0.1 145 07:58:03.942 08/21/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 57600 seconds 146 07:58:03.942 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 10.0.0.1 147 07:58:03.942 08/21/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=D241BA6F OUTBOUND SPI = 0x9BB22B98 INBOUND SPI = 0x898848BB) 148 07:58:03.942 08/21/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x9BB22B98 149 07:58:03.942 08/21/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x898848BB 150 07:58:04.743 08/21/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.24.199.2/255.255.255.255 DNS=0.0.0.0,0.0.0.0 WINS=0.0.0.0,0.0.0.0 Domain= Split DNS Names= 151 07:58:04.753 08/21/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 152 07:58:04.763 08/21/06 Sev=Info/4 CM/0x6310001A One secure connection established 153 07:58:04.813 08/21/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.24.199.2. Current address(es): 10.24.199.2. 154 07:58:04.813 08/21/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.24.199.2. Current address(es): 10.24.199.2. 155 07:58:04.843 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 156 07:58:04.843 08/21/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 157 07:58:04.843 08/21/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x982bb29b into key list 158 07:58:04.843 08/21/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 159 07:58:04.843 08/21/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xbb488889 into key list 160 07:58:04.843 08/21/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.24.199.2 161 07:58:05.825 08/21/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x982bb29b for inbound key with SPI=0xbb488889 162 20:38:16.441 08/21/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 163 20:38:16.441 08/21/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 164 20:38:16.441 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 165 20:38:16.441 08/21/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 9BB22B98 INBOUND SPI = 898848BB) 166 20:38:16.441 08/21/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=D241BA6F 167 20:38:16.441 08/21/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=842FCF56B2C209EE R_Cookie=7C05CF7FF7A497AF) reason = DEL_REASON_RESET_SADB 168 20:38:16.441 08/21/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 10.0.0.1 169 20:38:16.441 08/21/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=842FCF56B2C209EE R_Cookie=7C05CF7FF7A497AF) reason = DEL_REASON_RESET_SADB 170 20:38:16.441 08/21/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 171 20:38:16.441 08/21/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 172 20:38:16.471 08/21/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 10.0.0.1 disconnected: duration: 0 days 12:40:12 173 20:38:16.481 08/21/06 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 174 20:38:16.481 08/21/06 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 175 20:38:16.481 08/21/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 176 20:38:18.641 08/21/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 177 20:38:18.641 08/21/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 178 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xbb488889 179 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xbb488889 180 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x982bb29b 181 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x982bb29b 182 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 183 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 184 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 185 20:38:18.641 08/21/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys