EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 02:26:33.467 09/25/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 02:26:33.507 09/25/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 02:26:33.507 09/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 02:26:33.557 09/25/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 2005 for TCP connection. 5 02:26:33.597 09/25/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 02:26:33.597 09/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 02:26:33.597 09/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2005, dst port 4005 8 02:26:33.597 09/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 2005 9 02:26:33.597 09/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 2005, dst port 4005 10 02:26:33.597 09/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 02:26:34.098 09/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 02:26:34.098 09/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 02:26:34.118 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 02:26:34.288 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 02:26:34.288 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 02:26:34.288 09/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 02:26:34.288 09/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 02:26:34.288 09/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 02:26:34.288 09/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 02:26:34.298 09/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 02:26:34.298 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 02:26:34.298 09/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 02:26:34.298 09/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 02:26:34.328 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 02:26:34.328 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 02:26:34.328 09/25/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 02:26:34.328 09/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=CB963ADE27D24EB1 R_Cookie=75239C6680FC33B9) reason = DEL_REASON_LOAD_BALANCING 28 02:26:34.328 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 02:26:35.099 09/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=CB963ADE27D24EB1 R_Cookie=75239C6680FC33B9) reason = DEL_REASON_LOAD_BALANCING 30 02:26:35.099 09/25/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 02:26:35.099 09/25/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 02:26:35.099 09/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 02:26:35.099 09/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 02:26:35.600 09/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 2005, dst port 4005 35 02:26:35.600 09/25/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 2005, dst port 4005 36 02:26:35.600 09/25/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 2005 37 02:26:35.600 09/25/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 2005, dst port 4005 38 02:26:35.600 09/25/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 02:26:36.100 09/25/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 02:26:36.100 09/25/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 02:26:36.111 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 02:26:36.281 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 02:26:36.281 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 02:26:36.281 09/25/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 02:26:36.281 09/25/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 02:26:36.281 09/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 02:26:36.281 09/25/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 02:26:36.291 09/25/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 02:26:36.291 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 02:26:36.291 09/25/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 02:26:36.291 09/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 02:26:36.321 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 02:26:36.321 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 02:26:36.321 09/25/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 02:26:47.427 09/25/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 02:26:47.427 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 02:26:51.883 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 02:26:51.883 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 02:26:51.883 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 02:26:51.883 09/25/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 02:26:51.993 09/25/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 02:26:51.993 09/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 02:26:51.993 09/25/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 02:26:51.993 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 02:26:52.965 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.146 68 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 02:26:52.965 09/25/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 02:26:52.965 09/25/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 02:26:52.975 09/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.146, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 02:26:52.975 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 02:26:53.015 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 02:26:53.015 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 02:26:53.015 09/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 02:26:53.015 09/25/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 87 02:26:53.025 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 02:26:53.025 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 02:26:53.025 09/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 02:26:53.025 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 02:26:53.025 09/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B0531FF3 OUTBOUND SPI = 0x2510451A INBOUND SPI = 0x7B9385AA) 92 02:26:53.025 09/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x2510451A 93 02:26:53.025 09/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x7B9385AA 94 02:26:55.899 09/25/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.146/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 02:26:55.909 09/25/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 02:26:55.969 09/25/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 02:26:56.730 09/25/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.4. Current address(es): 192.168.1.4, 10.13.8.146. 98 02:26:56.730 09/25/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.146. Current address(es): 192.168.1.4, 10.13.8.146. 99 02:26:57.451 09/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 02:26:57.451 09/25/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 02:26:57.451 09/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 02:26:57.451 09/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x1a451025 into key list 103 02:26:57.451 09/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 02:26:57.451 09/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xaa85937b into key list 105 02:26:57.451 09/25/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.146 106 02:27:03.640 09/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x1a451025 for inbound key with SPI=0xaa85937b 107 02:31:37.033 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 108 02:36:37.465 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 109 02:41:37.897 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 110 02:42:42.991 09/25/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 111 02:42:42.991 09/25/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 112 02:42:42.991 09/25/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 113 02:46:38.389 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 114 02:51:38.771 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 115 02:52:04.308 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402306 116 02:52:04.318 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 117 02:52:04.348 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 118 02:52:04.348 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 119 02:52:04.348 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402307, seq# expected = 3854402307 120 02:52:15.324 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402307 121 02:52:15.324 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 122 02:52:15.344 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 123 02:52:15.344 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 124 02:52:15.344 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402308, seq# expected = 3854402308 125 02:56:38.783 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 126 03:01:39.215 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 127 03:06:39.647 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 128 03:11:40.079 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 129 03:16:40.511 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 130 03:21:40.943 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 131 03:23:09.570 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402308 132 03:23:09.570 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 133 03:23:09.590 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 134 03:23:09.590 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 135 03:23:09.590 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402309, seq# expected = 3854402309 136 03:23:20.085 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402309 137 03:23:20.085 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 138 03:23:20.105 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 139 03:23:20.105 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 140 03:23:20.105 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402310, seq# expected = 3854402310 141 03:24:05.651 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402310 142 03:24:05.651 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 03:24:05.671 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 03:24:05.671 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 03:24:05.671 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402311, seq# expected = 3854402311 146 03:26:42.376 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 147 03:31:42.257 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 148 03:33:33.918 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402311 149 03:33:33.918 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 150 03:33:33.938 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 151 03:33:33.938 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 152 03:33:33.938 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402312, seq# expected = 3854402312 153 03:33:44.433 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402312 154 03:33:44.433 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 155 03:33:44.453 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 156 03:33:44.453 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 157 03:33:44.453 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402313, seq# expected = 3854402313 158 03:33:54.948 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402313 159 03:33:54.948 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 160 03:33:54.968 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 161 03:33:54.968 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 162 03:33:54.968 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402314, seq# expected = 3854402314 163 03:36:42.689 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 164 03:41:43.121 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 165 03:44:06.828 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402314 166 03:44:06.828 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 167 03:44:06.858 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 168 03:44:06.858 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 169 03:44:06.858 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402315, seq# expected = 3854402315 170 03:44:17.343 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402315 171 03:44:17.343 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 172 03:44:17.363 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 173 03:44:17.363 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 174 03:44:17.363 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402316, seq# expected = 3854402316 175 03:46:43.553 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 176 03:48:03.168 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402316 177 03:48:03.168 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 178 03:48:03.188 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 179 03:48:03.188 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 180 03:48:03.188 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402317, seq# expected = 3854402317 181 03:51:43.985 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 182 03:54:34.230 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402317 183 03:54:34.230 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 184 03:54:34.270 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 185 03:54:34.270 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 186 03:54:34.270 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402318, seq# expected = 3854402318 187 03:54:44.745 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402318 188 03:54:44.745 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 189 03:54:44.765 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 190 03:54:44.765 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 191 03:54:44.765 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402319, seq# expected = 3854402319 192 03:56:43.917 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 193 04:00:05.707 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402319 194 04:00:05.707 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 195 04:00:05.737 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 196 04:00:05.737 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 197 04:00:05.737 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402320, seq# expected = 3854402320 198 04:01:44.319 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 199 04:04:52.089 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402320 200 04:04:52.089 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 201 04:04:52.109 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 202 04:04:52.109 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 203 04:04:52.109 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402321, seq# expected = 3854402321 204 04:05:02.604 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402321 205 04:05:02.604 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 04:05:02.624 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 04:05:02.624 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 04:05:02.624 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402322, seq# expected = 3854402322 209 04:06:44.751 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 210 04:11:45.683 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 211 04:12:03.709 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402322 212 04:12:03.709 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 213 04:12:03.729 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 214 04:12:03.729 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 215 04:12:03.729 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402323, seq# expected = 3854402323 216 04:15:14.483 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402323 217 04:15:14.483 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 04:15:14.514 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 04:15:14.514 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 04:15:14.514 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402324, seq# expected = 3854402324 221 04:15:35.013 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402324 222 04:15:35.013 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 04:15:35.033 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 04:15:35.033 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 04:15:35.033 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402325, seq# expected = 3854402325 226 04:16:45.615 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 227 04:21:46.547 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 228 04:24:01.241 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402325 229 04:24:01.251 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 04:24:01.281 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 231 04:24:01.281 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 232 04:24:01.281 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402326, seq# expected = 3854402326 233 04:25:41.886 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402326 234 04:25:41.886 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 235 04:25:41.906 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 236 04:25:41.906 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 237 04:25:41.906 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402327, seq# expected = 3854402327 238 04:25:52.401 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402327 239 04:25:52.401 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 240 04:25:52.421 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 241 04:25:52.421 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 242 04:25:52.421 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402328, seq# expected = 3854402328 243 04:26:46.479 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 244 04:31:47.411 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 245 04:36:47.843 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 246 04:41:48.275 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 247 04:46:44.701 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402328 248 04:46:44.701 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 249 04:46:44.732 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 250 04:46:44.732 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 251 04:46:44.732 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402329, seq# expected = 3854402329 252 04:46:48.207 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 253 04:48:06.319 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402329 254 04:48:06.319 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 255 04:48:06.349 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 256 04:48:06.349 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 257 04:48:06.349 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402330, seq# expected = 3854402330 258 04:51:49.139 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 259 04:56:49.571 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 260 04:56:52.576 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402330 261 04:56:52.576 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 262 04:56:52.606 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 263 04:56:52.606 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 264 04:56:52.606 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402331, seq# expected = 3854402331 265 04:57:08.098 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402331 266 04:57:08.098 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 267 04:57:08.118 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 268 04:57:08.118 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 269 04:57:08.118 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402332, seq# expected = 3854402332 270 05:00:03.851 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402332 271 05:00:03.851 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 272 05:00:03.881 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 273 05:00:03.881 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 274 05:00:03.881 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402333, seq# expected = 3854402333 275 05:01:49.503 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 276 05:06:50.435 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 277 05:07:19.978 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402333 278 05:07:19.978 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 05:07:20.008 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 05:07:20.008 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 05:07:20.008 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402334, seq# expected = 3854402334 282 05:07:40.507 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402334 283 05:07:40.507 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 284 05:07:40.537 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 285 05:07:40.537 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 286 05:07:40.537 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402335, seq# expected = 3854402335 287 05:11:50.867 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 288 05:12:06.390 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402335 289 05:12:06.390 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 290 05:12:06.420 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 291 05:12:06.420 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 292 05:12:06.420 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402336, seq# expected = 3854402336 293 05:16:51.299 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 294 05:17:42.373 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402336 295 05:17:42.373 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 296 05:17:42.403 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 297 05:17:42.403 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 298 05:17:42.403 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402337, seq# expected = 3854402337 299 05:17:52.888 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402337 300 05:17:52.888 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 301 05:17:52.908 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 302 05:17:52.908 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 303 05:17:52.908 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402338, seq# expected = 3854402338 304 05:18:03.403 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402338 305 05:18:03.403 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 306 05:18:03.433 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 307 05:18:03.433 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 308 05:18:03.433 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402339, seq# expected = 3854402339 309 05:21:51.731 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 310 05:24:09.429 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402339 311 05:24:09.429 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 312 05:24:09.459 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 313 05:24:09.459 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 314 05:24:09.459 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402340, seq# expected = 3854402340 315 05:26:52.163 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 316 05:28:10.276 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402340 317 05:28:10.276 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 05:28:10.296 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 05:28:10.296 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 05:28:10.296 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402341, seq# expected = 3854402341 321 05:28:20.791 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402341 322 05:28:20.791 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 323 05:28:20.821 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 324 05:28:20.821 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 325 05:28:20.821 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402342, seq# expected = 3854402342 326 05:31:52.595 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 327 05:36:53.027 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 328 05:38:32.671 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402342 329 05:38:32.671 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 330 05:38:32.691 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 331 05:38:32.691 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 332 05:38:32.691 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402343, seq# expected = 3854402343 333 05:38:43.186 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402343 334 05:38:43.186 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 335 05:38:43.216 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 336 05:38:43.216 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 337 05:38:43.216 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402344, seq# expected = 3854402344 338 05:38:53.701 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402344 339 05:38:53.701 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 340 05:38:53.721 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 341 05:38:53.721 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 342 05:38:53.721 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402345, seq# expected = 3854402345 343 05:41:53.459 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 344 05:46:53.891 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 345 05:48:05.494 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402345 346 05:48:05.494 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 347 05:48:05.544 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 348 05:48:05.544 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 349 05:48:05.544 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402346, seq# expected = 3854402346 350 05:49:01.074 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402346 351 05:49:01.074 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 352 05:49:01.104 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 353 05:49:01.104 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 354 05:49:01.104 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402347, seq# expected = 3854402347 355 05:49:11.589 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402347 356 05:49:11.589 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 357 05:49:11.609 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 358 05:49:11.609 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 359 05:49:11.609 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402348, seq# expected = 3854402348 360 05:51:54.323 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 361 05:56:54.755 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 362 05:59:32.983 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402348 363 05:59:32.983 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 364 05:59:33.003 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 365 05:59:33.003 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 366 05:59:33.003 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402349, seq# expected = 3854402349 367 05:59:43.498 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402349 368 05:59:43.498 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 369 05:59:43.528 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 370 05:59:43.528 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 371 05:59:43.528 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402350, seq# expected = 3854402350 372 06:00:04.528 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402350 373 06:00:04.528 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 374 06:00:04.548 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 375 06:00:04.558 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 376 06:00:04.558 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402351, seq# expected = 3854402351 377 06:01:54.687 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 378 06:06:55.619 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 379 06:10:00.886 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402351 380 06:10:00.886 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 381 06:10:00.916 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 382 06:10:00.916 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 383 06:10:00.916 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402352, seq# expected = 3854402352 384 06:11:55.551 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 385 06:12:06.566 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402352 386 06:12:06.566 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 387 06:12:06.596 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 388 06:12:06.596 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 389 06:12:06.596 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402353, seq# expected = 3854402353 390 06:16:56.483 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 391 06:20:12.765 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402353 392 06:20:12.765 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 393 06:20:12.796 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 394 06:20:12.796 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 395 06:20:12.796 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402354, seq# expected = 3854402354 396 06:20:33.295 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402354 397 06:20:33.295 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 398 06:20:33.315 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 399 06:20:33.315 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 400 06:20:33.315 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402355, seq# expected = 3854402355 401 06:21:56.415 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 402 06:24:09.105 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402355 403 06:24:09.105 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 404 06:24:09.135 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 405 06:24:09.135 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 406 06:24:09.135 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402356, seq# expected = 3854402356 407 06:26:57.347 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 408 06:30:38.665 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402356 409 06:30:38.665 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 410 06:30:38.716 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 411 06:30:38.716 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 412 06:30:38.716 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402357, seq# expected = 3854402357 413 06:30:54.188 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402357 414 06:30:54.188 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 415 06:30:54.218 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 416 06:30:54.218 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 417 06:30:54.218 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402358, seq# expected = 3854402358 418 06:31:57.279 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 419 06:36:58.211 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 420 06:41:05.567 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402358 421 06:41:05.567 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 422 06:41:05.667 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 423 06:41:05.667 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 424 06:41:05.667 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402359, seq# expected = 3854402359 425 06:41:16.082 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402359 426 06:41:16.082 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 427 06:41:16.122 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 428 06:41:16.122 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 429 06:41:16.122 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402360, seq# expected = 3854402360 430 06:41:58.143 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 431 06:46:59.075 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 432 06:48:02.166 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402360 433 06:48:02.166 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 434 06:48:02.186 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 435 06:48:02.186 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 436 06:48:02.186 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402361, seq# expected = 3854402361 437 06:51:37.976 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402361 438 06:51:37.976 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 439 06:51:38.006 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 440 06:51:38.006 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 441 06:51:38.006 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402362, seq# expected = 3854402362 442 06:51:48.491 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402362 443 06:51:48.491 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 444 06:51:48.521 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 445 06:51:48.521 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 446 06:51:48.521 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402363, seq# expected = 3854402363 447 06:51:59.007 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 448 06:56:59.939 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 449 07:00:04.705 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402363 450 07:00:04.705 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 451 07:00:04.725 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 452 07:00:04.725 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 453 07:00:04.725 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402364, seq# expected = 3854402364 454 07:01:55.364 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402364 455 07:01:55.364 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 456 07:01:55.394 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 457 07:01:55.394 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 458 07:01:55.394 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402365, seq# expected = 3854402365 459 07:01:59.871 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 460 07:02:05.879 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402365 461 07:02:05.879 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 462 07:02:05.899 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 463 07:02:05.899 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 464 07:02:05.899 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402366, seq# expected = 3854402366 465 07:07:00.803 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 466 07:12:01.235 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 467 07:12:03.238 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402366 468 07:12:03.238 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 07:12:03.268 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 470 07:12:03.268 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 471 07:12:03.268 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402367, seq# expected = 3854402367 472 07:12:18.760 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402367 473 07:12:18.760 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 474 07:12:18.780 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 475 07:12:18.780 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 476 07:12:18.780 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402368, seq# expected = 3854402368 477 07:12:39.290 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402368 478 07:12:39.290 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 07:12:39.320 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 480 07:12:39.320 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 481 07:12:39.320 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402369, seq# expected = 3854402369 482 07:17:01.667 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 483 07:22:02.099 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402369 484 07:22:02.099 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 485 07:22:02.099 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 486 07:22:02.119 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 487 07:22:02.119 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 488 07:22:02.119 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402370, seq# expected = 3854402370 489 07:22:57.679 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402370 490 07:22:57.679 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 491 07:22:57.699 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 492 07:22:57.699 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 493 07:22:57.699 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402371, seq# expected = 3854402371 494 07:27:02.531 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 495 07:32:02.963 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 496 07:33:09.559 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402371 497 07:33:09.559 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 498 07:33:09.599 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 499 07:33:09.599 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 500 07:33:09.599 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402372, seq# expected = 3854402372 501 07:33:20.074 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402372 502 07:33:20.074 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 503 07:33:20.094 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 504 07:33:20.094 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 505 07:33:20.104 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402373, seq# expected = 3854402373 506 07:37:03.395 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 507 07:42:03.827 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 508 07:43:31.453 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402373 509 07:43:31.453 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 510 07:43:31.473 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 511 07:43:31.473 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 512 07:43:31.473 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402374, seq# expected = 3854402374 513 07:43:41.968 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402374 514 07:43:41.968 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 515 07:43:41.988 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 516 07:43:41.988 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 517 07:43:41.988 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402375, seq# expected = 3854402375 518 07:47:04.259 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 519 07:48:02.843 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402375 520 07:48:02.843 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 521 07:48:02.863 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 522 07:48:02.863 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 523 07:48:02.863 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402376, seq# expected = 3854402376 524 07:51:58.683 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402376 525 07:51:58.683 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 526 07:51:58.713 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 527 07:51:58.713 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 528 07:51:58.713 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402377, seq# expected = 3854402377 529 07:52:04.191 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 530 07:57:05.123 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 531 07:59:59.875 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402377 532 07:59:59.875 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 533 07:59:59.905 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 534 07:59:59.905 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 535 07:59:59.905 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402378, seq# expected = 3854402378 536 08:02:05.555 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 537 08:04:20.750 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402378 538 08:04:20.750 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 539 08:04:20.780 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 540 08:04:20.780 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 541 08:04:20.780 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402379, seq# expected = 3854402379 542 08:04:36.272 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402379 543 08:04:36.272 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 544 08:04:36.302 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 545 08:04:36.302 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 546 08:04:36.302 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402380, seq# expected = 3854402380 547 08:07:05.987 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 548 08:12:02.413 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402380 549 08:12:02.413 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 550 08:12:02.444 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 551 08:12:02.444 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 552 08:12:02.444 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402381, seq# expected = 3854402381 553 08:12:05.919 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 554 08:14:48.152 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402381 555 08:14:48.152 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 556 08:14:48.192 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 557 08:14:48.192 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 558 08:14:48.192 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402382, seq# expected = 3854402382 559 08:14:58.667 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402382 560 08:14:58.667 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 561 08:14:58.687 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 562 08:14:58.687 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 563 08:14:58.687 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402383, seq# expected = 3854402383 564 08:15:09.182 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402383 565 08:15:09.182 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 566 08:15:09.212 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 567 08:15:09.212 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 568 08:15:09.212 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402384, seq# expected = 3854402384 569 08:17:06.351 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 570 08:22:03.277 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402384 571 08:22:03.277 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 572 08:22:03.308 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 573 08:22:03.308 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 574 08:22:03.308 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402385, seq# expected = 3854402385 575 08:22:06.783 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 576 08:25:14.052 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402385 577 08:25:14.142 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 578 08:25:14.172 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 579 08:25:14.172 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 580 08:25:14.172 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402386, seq# expected = 3854402386 581 08:26:09.632 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402386 582 08:26:09.632 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 583 08:26:09.652 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 584 08:26:09.652 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 585 08:26:09.652 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402387, seq# expected = 3854402387 586 08:26:20.147 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402387 587 08:26:20.147 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 588 08:26:20.167 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 589 08:26:20.167 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 590 08:26:20.167 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402388, seq# expected = 3854402388 591 08:27:07.215 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 592 08:32:08.147 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 593 08:35:37.448 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402388 594 08:35:37.448 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 595 08:35:37.468 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 596 08:35:37.468 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 597 08:35:37.468 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402389, seq# expected = 3854402389 598 08:35:47.963 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402389 599 08:35:47.963 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 600 08:35:47.993 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 601 08:35:48.003 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 602 08:35:48.003 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402390, seq# expected = 3854402390 603 08:35:58.478 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402390 604 08:35:58.478 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 605 08:35:58.508 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 606 08:35:58.508 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 607 08:35:58.508 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402391, seq# expected = 3854402391 608 08:37:08.079 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 609 08:42:09.011 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 610 08:45:59.843 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402391 611 08:45:59.843 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 612 08:45:59.903 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 613 08:45:59.903 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 614 08:45:59.903 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402392, seq# expected = 3854402392 615 08:46:10.358 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402392 616 08:46:10.358 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 617 08:46:10.378 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 618 08:46:10.378 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 619 08:46:10.378 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402393, seq# expected = 3854402393 620 08:46:20.873 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402393 621 08:46:20.873 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 622 08:46:20.903 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 623 08:46:20.903 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 624 08:46:20.903 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402394, seq# expected = 3854402394 625 08:47:08.943 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 626 08:48:01.518 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402394 627 08:48:01.518 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 628 08:48:01.548 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 629 08:48:01.548 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 630 08:48:01.548 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402395, seq# expected = 3854402395 631 08:50:17.213 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402395 632 08:50:17.213 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 633 08:50:17.253 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 634 08:50:17.253 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 635 08:50:17.253 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402396, seq# expected = 3854402396 636 08:50:32.736 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402396 637 08:50:32.736 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 638 08:50:32.756 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 639 08:50:32.756 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 640 08:50:32.756 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402397, seq# expected = 3854402397 641 08:50:53.796 09/25/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x1a451025 is about to expire, requesting a new one 642 08:50:53.796 09/25/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.146, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 643 08:50:53.806 09/25/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=FB6C9739) Initiator = ID=10.13.8.146 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 644 08:50:53.816 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 645 08:50:53.856 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 646 08:50:53.856 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 647 08:50:53.856 09/25/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 648 08:50:53.856 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 649 08:50:53.856 09/25/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=FB6C9739 OUTBOUND SPI = 0x62B15CE0 INBOUND SPI = 0xA6D4A3C6) 650 08:50:53.856 09/25/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x62B15CE0 651 08:50:53.856 09/25/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xA6D4A3C6 652 08:50:53.856 09/25/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 653 08:50:54.797 09/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 654 08:50:54.797 09/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe05cb162 into key list 655 08:50:54.797 09/25/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 656 08:50:54.797 09/25/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc6a3d4a6 into key list 657 08:51:23.849 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 658 08:51:23.869 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 659 08:51:23.889 09/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2510451A INBOUND SPI = 7B9385AA) 660 08:51:23.889 09/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B0531FF3 661 08:51:23.889 09/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xaa85937b 662 08:51:23.889 09/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xaa85937b 663 08:51:23.889 09/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x1a451025 664 08:51:23.889 09/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x1a451025 665 08:51:24.860 09/25/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xe05cb162 for inbound key with SPI=0xc6a3d4a6 666 08:52:09.164 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 667 08:53:24.282 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402397 668 08:53:24.282 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 669 08:53:24.312 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 670 08:53:24.312 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 671 08:53:24.312 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402398, seq# expected = 3854402398 672 08:56:01.008 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402398 673 08:56:01.008 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 674 08:56:01.028 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 675 08:56:01.028 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 676 08:56:01.028 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402399, seq# expected = 3854402399 677 08:56:26.534 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402399 678 08:56:26.534 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 679 08:56:26.564 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 680 08:56:26.564 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 681 08:56:26.564 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402400, seq# expected = 3854402400 682 08:56:37.049 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402400 683 08:56:37.049 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 684 08:56:37.079 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 685 08:56:37.079 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 686 08:56:37.079 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402401, seq# expected = 3854402401 687 08:57:10.097 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 688 09:01:33.976 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402401 689 09:01:33.976 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 690 09:01:34.006 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 691 09:01:34.006 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 692 09:01:34.006 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402402, seq# expected = 3854402402 693 09:02:10.028 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 694 09:03:35.151 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402402 695 09:03:35.151 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 696 09:03:35.181 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 697 09:03:35.181 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 698 09:03:35.181 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402403, seq# expected = 3854402403 699 09:07:04.932 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402403 700 09:07:04.932 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 701 09:07:04.962 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 702 09:07:04.962 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 703 09:07:04.962 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402404, seq# expected = 3854402404 704 09:07:10.961 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 705 09:12:11.693 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 706 09:17:12.125 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 707 09:17:14.128 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402404 708 09:17:14.128 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 709 09:17:14.158 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 710 09:17:14.158 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 711 09:17:14.158 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402405, seq# expected = 3854402405 712 09:17:24.643 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402405 713 09:17:24.643 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 714 09:17:24.673 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 715 09:17:24.673 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 716 09:17:24.673 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402406, seq# expected = 3854402406 717 09:17:35.158 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402406 718 09:17:35.158 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 719 09:17:35.189 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 720 09:17:35.189 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 721 09:17:35.189 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402407, seq# expected = 3854402407 722 09:22:01.542 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402407 723 09:22:01.542 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 724 09:22:01.572 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 725 09:22:01.572 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 726 09:22:01.572 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402408, seq# expected = 3854402408 727 09:22:12.057 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 728 09:27:12.989 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 729 09:27:38.526 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402408 730 09:27:38.526 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 731 09:27:38.556 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 732 09:27:38.556 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 733 09:27:38.556 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402409, seq# expected = 3854402409 734 09:32:13.421 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 735 09:35:15.683 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402409 736 09:35:15.683 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 737 09:35:15.713 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 738 09:35:15.713 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 739 09:35:15.713 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402410, seq# expected = 3854402410 740 09:35:26.199 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402410 741 09:35:26.199 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 742 09:35:26.229 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 743 09:35:26.229 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 744 09:35:26.229 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402411, seq# expected = 3854402411 745 09:37:13.353 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 746 09:38:02.924 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402411 747 09:38:02.924 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 748 09:38:02.954 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 749 09:38:02.954 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 750 09:38:02.954 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402412, seq# expected = 3854402412 751 09:38:13.439 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402412 752 09:38:13.439 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 753 09:38:13.469 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 754 09:38:13.469 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 755 09:38:13.469 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402413, seq# expected = 3854402413 756 09:38:23.954 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402413 757 09:38:23.954 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 758 09:38:23.984 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 759 09:38:23.984 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 760 09:38:23.984 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402414, seq# expected = 3854402414 761 09:42:14.285 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 762 09:47:14.727 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 763 09:52:00.148 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402414 764 09:52:00.148 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 765 09:52:00.178 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 766 09:52:00.178 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 767 09:52:00.178 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402415, seq# expected = 3854402415 768 09:52:14.669 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 769 09:57:15.601 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 770 10:02:16.053 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 771 10:05:05.797 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402415 772 10:05:05.797 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 773 10:05:05.828 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 774 10:05:05.828 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 775 10:05:05.828 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402416, seq# expected = 3854402416 776 10:05:22.321 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402416 777 10:05:22.321 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 778 10:05:22.351 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 779 10:05:22.351 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 780 10:05:22.351 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402417, seq# expected = 3854402417 781 10:06:09.499 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402417 782 10:06:09.509 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 783 10:06:10.280 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 784 10:06:10.350 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 785 10:06:10.410 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402418, seq# expected = 3854402418 786 10:07:16.545 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 787 10:08:12.626 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402418 788 10:08:12.626 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 789 10:08:12.656 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 790 10:08:12.656 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 791 10:08:12.656 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402419, seq# expected = 3854402419 792 10:12:17.999 09/25/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2005, dst port 4005 793 10:13:18.095 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402419 794 10:13:18.095 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 795 10:13:18.115 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 796 10:13:18.115 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 797 10:13:18.115 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402420, seq# expected = 3854402420 798 10:13:28.600 09/25/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3854402420 799 10:13:28.600 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 800 10:13:28.631 09/25/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 801 10:13:28.631 09/25/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 802 10:13:28.631 09/25/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3854402421, seq# expected = 3854402421 803 10:16:38.924 09/25/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 804 10:16:38.934 09/25/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 805 10:16:38.934 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 806 10:16:38.934 09/25/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 62B15CE0 INBOUND SPI = A6D4A3C6) 807 10:16:38.934 09/25/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=FB6C9739 808 10:16:38.934 09/25/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A953C1BA3B706C37 R_Cookie=950C7483BA8F29DB) reason = DEL_REASON_RESET_SADB 809 10:16:38.934 09/25/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 810 10:16:38.934 09/25/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A953C1BA3B706C37 R_Cookie=950C7483BA8F29DB) reason = DEL_REASON_RESET_SADB 811 10:16:38.944 09/25/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 812 10:16:38.944 09/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 813 10:16:38.984 09/25/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 814 10:16:38.984 09/25/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 2005 for TCP connection. 815 10:16:38.984 09/25/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 7:49:43 816 10:16:39.395 09/25/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 817 10:16:45.774 09/25/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 818 10:16:46.084 09/25/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 819 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc6a3d4a6 820 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc6a3d4a6 821 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe05cb162 822 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe05cb162 823 10:16:46.084 09/25/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 2005, dst port 4005 824 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 825 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 826 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 827 10:16:46.084 09/25/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys