EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 09:28:03.379 09/22/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 09:28:03.439 09/22/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 09:28:03.439 09/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 09:28:03.479 09/22/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1839 for TCP connection. 5 09:28:03.489 09/22/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 09:28:03.489 09/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 09:28:03.489 09/22/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1839, dst port 4005 8 09:28:04.440 09/22/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1839 9 09:28:04.440 09/22/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1839, dst port 4005 10 09:28:04.440 09/22/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 09:28:04.941 09/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 09:28:04.961 09/22/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 09:28:04.981 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 09:28:05.161 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 09:28:05.161 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 09:28:05.161 09/22/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 09:28:05.161 09/22/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 09:28:05.161 09/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 09:28:05.161 09/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 09:28:05.171 09/22/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 09:28:05.171 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 09:28:05.171 09/22/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 09:28:05.171 09/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 09:28:05.221 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 09:28:05.221 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 09:28:05.221 09/22/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 09:28:05.221 09/22/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7162E5C2CB72C271 R_Cookie=2E30A678BCF96EA5) reason = DEL_REASON_LOAD_BALANCING 28 09:28:05.221 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 09:28:05.962 09/22/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7162E5C2CB72C271 R_Cookie=2E30A678BCF96EA5) reason = DEL_REASON_LOAD_BALANCING 30 09:28:05.962 09/22/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 09:28:05.962 09/22/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 09:28:05.962 09/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 09:28:05.972 09/22/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 09:28:06.944 09/22/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1839, dst port 4005 35 09:28:06.944 09/22/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1839, dst port 4005 36 09:28:06.944 09/22/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1839 37 09:28:06.944 09/22/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1839, dst port 4005 38 09:28:06.944 09/22/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 09:28:07.444 09/22/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 09:28:07.455 09/22/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 09:28:07.465 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 09:28:07.635 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 09:28:07.635 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 09:28:07.635 09/22/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 09:28:07.635 09/22/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 09:28:07.635 09/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 09:28:07.635 09/22/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 09:28:07.645 09/22/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 09:28:07.645 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 09:28:07.645 09/22/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 09:28:07.645 09/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 09:28:07.665 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 09:28:07.665 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 09:28:07.675 09/22/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 09:28:14.284 09/22/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 09:28:14.284 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 09:28:16.648 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 09:28:16.648 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 09:28:16.648 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 09:28:16.648 09/22/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 09:28:16.758 09/22/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 09:28:16.758 09/22/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 09:28:16.758 09/22/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 09:28:16.758 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 09:28:17.709 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.34 68 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 09:28:17.709 09/22/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 09:28:17.719 09/22/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 09:28:17.729 09/22/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.34, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 09:28:17.729 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 09:28:17.729 09/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 09:28:17.729 09/22/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 09:28:17.789 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 10 seconds, setting expiry to 86390 seconds from now 89 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 09:28:17.789 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 09:28:17.789 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=7D37C81B OUTBOUND SPI = 0x25BA10FC INBOUND SPI = 0x1F900928) 94 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x25BA10FC 95 09:28:17.789 09/22/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1F900928 96 09:28:20.533 09/22/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.34/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 09:28:20.583 09/22/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 09:28:20.613 09/22/06 Sev=Info/4 CM/0x6310001A One secure connection established 99 09:28:20.633 09/22/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.32.34. 100 09:28:20.633 09/22/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.34. Current address(es): 192.168.1.4, 10.13.32.34. 101 09:28:21.214 09/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 09:28:21.214 09/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfc10ba25 into key list 103 09:28:21.214 09/22/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 09:28:21.214 09/22/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x2809901f into key list 105 09:28:21.214 09/22/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.34 106 09:28:52.509 09/22/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xfc10ba25 for inbound key with SPI=0x2809901f 107 09:29:36.573 09/22/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 108 09:31:07.734 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875277 109 09:31:07.734 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 110 09:31:07.764 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 111 09:31:07.764 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 112 09:31:07.764 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875278, seq# expected = 231875278 113 09:32:18.836 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875278 114 09:32:18.836 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 115 09:32:18.866 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 116 09:32:18.866 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 117 09:32:18.866 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875279, seq# expected = 231875279 118 09:33:07.907 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 119 09:33:49.466 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875279 120 09:33:49.466 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 121 09:33:49.496 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 122 09:33:49.496 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 123 09:33:49.496 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875280, seq# expected = 231875280 124 09:35:00.709 09/22/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 125 09:35:00.709 09/22/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 126 09:35:00.709 09/22/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 127 09:38:09.400 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 128 09:42:51.315 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875280 129 09:42:51.315 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 130 09:42:51.355 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 131 09:42:51.355 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 132 09:42:51.355 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875281, seq# expected = 231875281 133 09:43:02.331 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875281 134 09:43:02.331 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 135 09:43:02.371 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 136 09:43:02.371 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 137 09:43:02.371 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875282, seq# expected = 231875282 138 09:43:08.851 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 139 09:43:32.875 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875282 140 09:43:32.875 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 09:43:32.905 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 09:43:32.905 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 09:43:32.905 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875283, seq# expected = 231875283 144 09:44:23.959 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875283 145 09:44:23.959 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 146 09:44:23.979 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 147 09:44:23.979 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 148 09:44:23.979 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875284, seq# expected = 231875284 149 09:48:09.783 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 150 09:53:10.215 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 151 09:53:24.236 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875284 152 09:53:24.236 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 153 09:53:24.306 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 154 09:53:24.306 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 155 09:53:24.306 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875285, seq# expected = 231875285 156 09:56:20.489 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875285 157 09:56:20.489 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 158 09:56:20.529 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 159 09:56:20.529 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 160 09:56:20.529 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875286, seq# expected = 231875286 161 09:58:10.317 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 162 10:03:10.799 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 163 10:03:44.838 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875286 164 10:03:44.838 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 165 10:03:44.868 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 166 10:03:44.868 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 167 10:03:44.868 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875287, seq# expected = 231875287 168 10:08:10.840 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 169 10:08:21.325 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875287 170 10:08:21.325 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 171 10:08:21.366 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 172 10:08:21.366 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 173 10:08:21.366 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875288, seq# expected = 231875288 174 10:13:10.882 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 175 10:13:58.510 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875288 176 10:13:58.510 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 177 10:13:58.540 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 178 10:13:58.540 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 179 10:13:58.540 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875289, seq# expected = 231875289 180 10:14:09.035 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875289 181 10:14:09.035 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 182 10:14:09.066 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 183 10:14:09.066 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 184 10:14:09.066 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875290, seq# expected = 231875290 185 10:17:17.466 09/22/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 186 10:18:11.264 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 187 10:20:19.989 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875290 188 10:20:19.989 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 189 10:20:20.019 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 190 10:20:20.019 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 191 10:20:20.019 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875291, seq# expected = 231875291 192 10:23:12.237 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 193 10:24:22.337 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875291 194 10:24:22.337 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 195 10:24:22.367 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 196 10:24:22.367 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 197 10:24:22.367 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875292, seq# expected = 231875292 198 10:24:32.852 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875292 199 10:24:32.852 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 200 10:24:32.893 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 201 10:24:32.893 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 202 10:24:32.893 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875293, seq# expected = 231875293 203 10:28:12.168 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 204 10:33:12.870 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 205 10:38:12.411 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 206 10:43:12.422 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 207 10:48:12.464 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 208 10:53:12.525 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 209 10:55:32.777 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875293 210 10:55:32.777 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 211 10:55:32.807 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 212 10:55:32.807 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 213 10:55:32.807 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875294, seq# expected = 231875294 214 10:55:48.299 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875294 215 10:55:48.299 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 216 10:55:48.349 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 217 10:55:48.349 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 218 10:55:48.349 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875295, seq# expected = 231875295 219 10:56:23.880 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875295 220 10:56:23.880 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 221 10:56:23.910 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 222 10:56:23.910 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 223 10:56:23.910 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875296, seq# expected = 231875296 224 10:58:12.076 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 225 11:03:12.668 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 226 11:04:11.773 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875296 227 11:04:11.773 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 228 11:04:11.813 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 229 11:04:11.813 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 230 11:04:11.813 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875297, seq# expected = 231875297 231 11:06:02.953 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875297 232 11:06:02.953 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 233 11:06:02.993 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 234 11:06:02.993 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 235 11:06:02.993 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875298, seq# expected = 231875298 236 11:06:13.468 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875298 237 11:06:13.468 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 238 11:06:13.498 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 239 11:06:13.498 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 240 11:06:13.498 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875299, seq# expected = 231875299 241 11:08:12.640 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 242 11:13:13.582 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 243 11:18:14.024 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 244 11:23:14.046 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 245 11:26:55.374 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875299 246 11:26:55.374 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 11:26:55.404 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 11:26:55.404 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 11:26:55.404 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875300, seq# expected = 231875300 250 11:28:13.987 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 251 11:29:38.849 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875300 252 11:29:38.849 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 253 11:29:38.879 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 11:29:38.879 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 255 11:29:38.879 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875301, seq# expected = 231875301 256 11:32:04.559 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875301 257 11:32:04.559 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 258 11:32:04.599 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 259 11:32:04.599 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 260 11:32:04.599 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875302, seq# expected = 231875302 261 11:33:14.169 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 262 11:37:12.571 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875302 263 11:37:12.571 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 264 11:37:12.601 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 265 11:37:12.601 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 266 11:37:12.601 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875303, seq# expected = 231875303 267 11:38:14.230 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 268 11:38:33.758 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875303 269 11:38:33.758 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 270 11:38:33.778 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 271 11:38:33.778 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 272 11:38:33.778 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875304, seq# expected = 231875304 273 11:43:15.213 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 274 11:44:45.342 09/22/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 275 11:47:44.100 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875304 276 11:47:44.100 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 277 11:47:44.140 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 278 11:47:44.140 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 279 11:47:44.140 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875305, seq# expected = 231875305 280 11:48:15.144 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 281 11:53:16.107 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 282 11:56:41.412 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875305 283 11:56:41.412 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 284 11:56:41.442 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 285 11:56:41.442 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 286 11:56:41.442 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875306, seq# expected = 231875306 287 11:58:12.042 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875306 288 11:58:12.042 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 11:58:12.073 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 11:58:12.073 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 11:58:12.073 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875307, seq# expected = 231875307 292 11:58:17.550 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 293 12:02:55.480 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875307 294 12:02:55.480 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 295 12:02:55.520 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 296 12:02:55.520 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 297 12:02:55.520 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875308, seq# expected = 231875308 298 12:03:17.011 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 299 12:08:17.643 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 300 12:08:28.279 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875308 301 12:08:28.279 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 302 12:08:28.329 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 303 12:08:28.329 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 304 12:08:28.329 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875309, seq# expected = 231875309 305 12:10:29.353 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875309 306 12:10:29.353 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 307 12:10:29.383 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 308 12:10:29.383 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 309 12:10:29.383 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875310, seq# expected = 231875310 310 12:13:17.695 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 311 12:18:18.377 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 312 12:18:52.426 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875310 313 12:18:52.426 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 314 12:18:52.456 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 315 12:18:52.456 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 316 12:18:52.456 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875311, seq# expected = 231875311 317 12:19:02.941 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875311 318 12:19:02.941 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 319 12:19:02.961 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 320 12:19:02.971 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 321 12:19:02.971 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875312, seq# expected = 231875312 322 12:23:18.338 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 323 12:28:18.820 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 324 12:29:13.399 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875312 325 12:29:13.399 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 326 12:29:13.439 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 327 12:29:13.439 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 328 12:29:13.439 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875313, seq# expected = 231875313 329 12:29:28.921 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875313 330 12:29:28.921 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 331 12:29:28.951 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 332 12:29:28.951 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 333 12:29:28.951 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875314, seq# expected = 231875314 334 12:33:18.842 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 335 12:38:19.324 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 336 12:39:43.966 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875314 337 12:39:43.966 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 338 12:39:44.016 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 339 12:39:44.016 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 340 12:39:44.016 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875315, seq# expected = 231875315 341 12:43:19.816 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 342 12:48:20.238 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 343 12:50:02.385 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875315 344 12:50:02.385 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 345 12:50:02.415 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 346 12:50:02.415 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 347 12:50:02.415 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875316, seq# expected = 231875316 348 12:53:20.670 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 349 12:53:33.188 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875316 350 12:53:33.188 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 351 12:53:33.218 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 352 12:53:33.218 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 353 12:53:33.218 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875317, seq# expected = 231875317 354 12:55:28.854 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875317 355 12:55:28.854 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 356 12:55:28.884 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 357 12:55:28.884 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 358 12:55:28.884 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875318, seq# expected = 231875318 359 12:56:44.473 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875318 360 12:56:44.473 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 361 12:56:44.513 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 362 12:56:44.513 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 363 12:56:44.513 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875319, seq# expected = 231875319 364 12:57:50.618 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875319 365 12:57:50.618 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 366 12:57:50.678 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 367 12:57:50.678 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 368 12:57:50.678 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875320, seq# expected = 231875320 369 12:58:20.832 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 370 13:00:47.503 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875320 371 13:00:47.503 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 372 13:00:47.533 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 373 13:00:47.533 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 374 13:00:47.533 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875321, seq# expected = 231875321 375 13:03:21.234 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 376 13:08:21.696 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 377 13:10:52.412 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875321 378 13:10:52.412 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 379 13:10:52.452 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 380 13:10:52.452 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 381 13:10:52.452 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875322, seq# expected = 231875322 382 13:13:22.208 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 383 13:18:27.437 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 384 13:21:32.373 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875322 385 13:21:32.373 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 386 13:21:32.413 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 387 13:21:32.413 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 388 13:21:32.413 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875323, seq# expected = 231875323 389 13:23:40.907 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 390 13:28:42.741 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 391 13:31:52.154 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875323 392 13:31:52.154 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 393 13:31:52.184 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 394 13:31:52.184 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 395 13:31:52.184 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875324, seq# expected = 231875324 396 13:33:47.009 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 397 13:38:49.574 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 398 13:43:49.666 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 399 13:44:29.733 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875324 400 13:44:29.733 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 401 13:44:29.783 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 402 13:44:29.783 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 403 13:44:29.783 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875325, seq# expected = 231875325 404 13:48:49.727 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 405 13:52:33.288 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875325 406 13:52:33.288 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 407 13:52:33.359 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 408 13:52:33.359 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 409 13:52:33.359 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875326, seq# expected = 231875326 410 13:52:43.824 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875326 411 13:52:43.824 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 412 13:52:43.854 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 413 13:52:43.854 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 414 13:52:43.854 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875327, seq# expected = 231875327 415 13:53:49.448 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 416 13:56:42.367 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875327 417 13:56:42.367 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 418 13:56:42.397 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 419 13:56:42.397 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 420 13:56:42.397 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875328, seq# expected = 231875328 421 13:58:50.070 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 422 14:03:10.595 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875328 423 14:03:10.595 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 424 14:03:10.635 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 425 14:03:10.635 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 426 14:03:10.635 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875329, seq# expected = 231875329 427 14:03:49.661 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 428 14:05:43.935 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875329 429 14:05:43.935 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 430 14:05:43.965 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 431 14:05:43.965 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 432 14:05:43.965 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875330, seq# expected = 231875330 433 14:08:50.784 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 434 14:13:38.348 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875330 435 14:13:38.348 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 436 14:13:38.388 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 437 14:13:38.388 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 438 14:13:38.388 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875331, seq# expected = 231875331 439 14:13:49.994 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 440 14:18:50.526 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 441 14:20:28.718 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875331 442 14:20:28.718 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 443 14:20:28.738 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 444 14:20:28.738 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 445 14:20:28.738 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875332, seq# expected = 231875332 446 14:23:47.073 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875332 447 14:23:47.073 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 448 14:23:47.103 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 449 14:23:47.103 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 450 14:23:47.103 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875333, seq# expected = 231875333 451 14:23:50.067 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 452 14:28:50.780 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 453 14:34:00.665 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 454 14:39:06.745 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 455 14:39:38.901 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875333 456 14:39:38.901 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 457 14:39:38.962 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 458 14:39:38.962 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 459 14:39:38.972 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875334, seq# expected = 231875334 460 14:44:03.572 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 461 14:44:45.663 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875334 462 14:44:45.663 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 463 14:44:45.693 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 464 14:44:45.693 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 465 14:44:45.693 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875335, seq# expected = 231875335 466 14:44:56.188 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875335 467 14:44:56.188 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 468 14:44:56.218 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 469 14:44:56.218 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 470 14:44:56.218 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875336, seq# expected = 231875336 471 14:49:04.395 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 472 14:54:04.025 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 473 14:55:05.624 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875336 474 14:55:05.624 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 475 14:55:05.654 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 476 14:55:05.654 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 477 14:55:05.654 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875337, seq# expected = 231875337 478 14:55:16.149 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875337 479 14:55:16.149 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 480 14:55:16.189 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 481 14:55:16.189 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 482 14:55:16.189 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875338, seq# expected = 231875338 483 14:56:41.842 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875338 484 14:56:41.842 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 485 14:56:41.862 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 486 14:56:41.862 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 487 14:56:41.862 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875339, seq# expected = 231875339 488 14:59:04.217 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 489 15:04:04.299 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 490 15:05:42.981 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875339 491 15:05:42.981 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 492 15:05:43.011 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 493 15:05:43.011 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 494 15:05:43.011 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875340, seq# expected = 231875340 495 15:08:28.849 09/22/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 231875340 496 15:08:28.849 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 497 15:08:28.879 09/22/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 498 15:08:28.879 09/22/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 499 15:08:28.879 09/22/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 231875341, seq# expected = 231875341 500 15:09:03.899 09/22/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1839, dst port 4005 501 15:09:35.325 09/22/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 502 15:09:35.325 09/22/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 503 15:09:35.325 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 504 15:09:35.325 09/22/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 25BA10FC INBOUND SPI = 1F900928) 505 15:09:35.325 09/22/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=7D37C81B 506 15:09:35.325 09/22/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8546A7A415D16A80 R_Cookie=78106F8DFEE08A8B) reason = DEL_REASON_RESET_SADB 507 15:09:35.325 09/22/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 508 15:09:35.325 09/22/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8546A7A415D16A80 R_Cookie=78106F8DFEE08A8B) reason = DEL_REASON_RESET_SADB 509 15:09:35.325 09/22/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 510 15:09:35.325 09/22/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 511 15:09:35.325 09/22/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 512 15:09:35.325 09/22/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1839 for TCP connection. 513 15:09:35.325 09/22/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 5:41:15 514 15:09:35.505 09/22/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 515 15:09:38.339 09/22/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 516 15:09:38.339 09/22/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 517 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x2809901f 518 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x2809901f 519 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xfc10ba25 520 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xfc10ba25 521 15:09:38.349 09/22/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1839, dst port 4005 522 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 523 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 524 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 525 15:09:38.349 09/22/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys