EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 00:52:02.471 10/06/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 00:52:02.501 10/06/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 00:52:02.501 10/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 00:52:02.522 10/06/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1166 for TCP connection. 5 00:52:02.632 10/06/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 00:52:02.632 10/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 00:52:02.632 10/06/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1166, dst port 4005 8 00:52:02.632 10/06/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1166 9 00:52:02.632 10/06/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1166, dst port 4005 10 00:52:02.632 10/06/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 00:52:03.133 10/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 00:52:03.133 10/06/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 00:52:03.143 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 00:52:03.313 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 00:52:03.313 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 00:52:03.313 10/06/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 00:52:03.313 10/06/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 00:52:03.313 10/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 00:52:03.313 10/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 00:52:03.353 10/06/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 00:52:03.353 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 00:52:03.353 10/06/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 00:52:03.353 10/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 00:52:03.373 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 00:52:03.373 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 00:52:03.373 10/06/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 00:52:03.373 10/06/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C34995CE9D44D4B7 R_Cookie=B4A860DE861DD76A) reason = DEL_REASON_LOAD_BALANCING 28 00:52:03.373 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 00:52:04.135 10/06/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C34995CE9D44D4B7 R_Cookie=B4A860DE861DD76A) reason = DEL_REASON_LOAD_BALANCING 30 00:52:04.135 10/06/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 00:52:04.135 10/06/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 00:52:04.135 10/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 00:52:04.135 10/06/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 00:52:04.636 10/06/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1166, dst port 4005 35 00:52:04.636 10/06/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1166, dst port 4005 36 00:52:04.636 10/06/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1166 37 00:52:04.636 10/06/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1166, dst port 4005 38 00:52:04.636 10/06/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 00:52:05.137 10/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 00:52:05.137 10/06/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 00:52:05.147 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 00:52:05.317 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 00:52:05.317 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 00:52:05.317 10/06/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 00:52:05.317 10/06/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 00:52:05.317 10/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 00:52:05.317 10/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 00:52:05.327 10/06/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 00:52:05.327 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 00:52:05.327 10/06/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 00:52:05.327 10/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 00:52:35.364 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 00:52:35.364 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 00:52:35.364 10/06/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 00:52:46.185 10/06/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 00:52:46.185 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 00:52:48.539 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 00:52:48.539 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 00:52:48.549 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 00:52:48.549 10/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 00:52:48.629 10/06/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 00:52:48.629 10/06/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 00:52:48.629 10/06/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 00:52:48.629 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 00:52:49.471 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.112 68 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 00:52:49.471 10/06/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 00:52:49.491 10/06/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 00:52:49.491 10/06/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.112, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 00:52:49.491 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 00:52:49.521 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 00:52:49.521 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 00:52:49.521 10/06/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 00:52:49.521 10/06/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 44 seconds, setting expiry to 86356 seconds from now 87 00:52:49.531 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 00:52:49.531 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 00:52:49.531 10/06/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 00:52:49.531 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 00:52:49.531 10/06/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=71580C3B OUTBOUND SPI = 0x0533DD3B INBOUND SPI = 0x7DAFDB5E) 92 00:52:49.531 10/06/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0533DD3B 93 00:52:49.531 10/06/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x7DAFDB5E 94 00:52:51.465 10/06/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.112/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 00:52:51.515 10/06/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 00:52:51.595 10/06/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 00:52:51.615 10/06/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.2, 10.13.32.112. 98 00:52:51.615 10/06/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.112. Current address(es): 192.168.1.2, 10.13.32.112. 99 00:52:51.715 10/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 00:52:51.715 10/06/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 00:52:51.715 10/06/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 00:52:51.715 10/06/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3bdd3305 into key list 103 00:52:51.715 10/06/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 00:52:51.715 10/06/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x5edbaf7d into key list 105 00:52:51.715 10/06/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.112 106 00:52:53.728 10/06/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x3bdd3305 for inbound key with SPI=0x5edbaf7d 107 00:57:04.589 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903324 108 00:57:04.589 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 00:57:04.609 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 00:57:04.609 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 00:57:04.609 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903325, seq# expected = 65903325 112 00:57:05.590 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 113 01:00:30.385 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903325 114 01:00:30.385 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 115 01:00:30.405 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 116 01:00:30.405 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 117 01:00:30.405 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903326, seq# expected = 65903326 118 01:02:06.022 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 119 01:07:06.955 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 120 01:07:11.962 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903326 121 01:07:11.962 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 122 01:07:11.982 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 123 01:07:11.982 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 124 01:07:11.982 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903327, seq# expected = 65903327 125 01:07:22.477 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903327 126 01:07:22.477 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 127 01:07:22.497 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 128 01:07:22.497 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 129 01:07:22.497 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903328, seq# expected = 65903328 130 01:12:07.387 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 131 01:17:07.819 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 132 01:17:55.387 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903328 133 01:17:55.387 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 134 01:17:55.407 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 135 01:17:55.407 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 136 01:17:55.407 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903329, seq# expected = 65903329 137 01:22:08.251 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 138 01:24:31.457 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903329 139 01:24:31.457 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 140 01:24:31.477 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 141 01:24:31.477 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 142 01:24:31.477 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903330, seq# expected = 65903330 143 01:27:08.683 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 144 01:28:02.260 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903330 145 01:28:02.260 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 146 01:28:02.280 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 147 01:28:02.280 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 148 01:28:02.280 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903331, seq# expected = 65903331 149 01:28:12.775 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903331 150 01:28:12.775 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 151 01:28:12.795 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 152 01:28:12.795 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 153 01:28:12.795 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903332, seq# expected = 65903332 154 01:29:29.415 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903332 155 01:29:29.415 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 156 01:29:29.435 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 157 01:29:29.435 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 158 01:29:29.435 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903333, seq# expected = 65903333 159 01:29:39.920 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903333 160 01:29:39.920 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 161 01:29:39.950 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 162 01:29:39.950 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 163 01:29:39.950 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903334, seq# expected = 65903334 164 01:32:09.145 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 165 01:37:10.098 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 166 01:38:30.213 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903334 167 01:38:30.213 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 168 01:38:30.233 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 169 01:38:30.233 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 170 01:38:30.233 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903335, seq# expected = 65903335 171 01:41:10.944 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903335 172 01:41:10.944 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 173 01:41:10.984 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 174 01:41:10.984 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 175 01:41:10.984 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903336, seq# expected = 65903336 176 01:42:09.528 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 177 01:47:10.461 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 178 01:48:57.114 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903336 179 01:48:57.114 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 180 01:48:57.144 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 181 01:48:57.144 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 182 01:48:57.144 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903337, seq# expected = 65903337 183 01:49:07.629 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903337 184 01:49:07.629 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 185 01:49:07.669 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 186 01:49:07.669 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 187 01:49:07.669 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903338, seq# expected = 65903338 188 01:52:10.893 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 189 01:57:11.325 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 190 01:59:14.512 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903338 191 01:59:14.512 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 192 01:59:14.552 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 193 01:59:14.552 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 194 01:59:14.552 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903339, seq# expected = 65903339 195 01:59:30.535 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903339 196 01:59:30.535 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 197 01:59:30.565 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 198 01:59:30.565 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 199 01:59:30.565 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903340, seq# expected = 65903340 200 02:02:11.767 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 201 02:07:12.209 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 202 02:09:38.419 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903340 203 02:09:38.419 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 204 02:09:38.449 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 205 02:09:38.449 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 206 02:09:38.449 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903341, seq# expected = 65903341 207 02:09:48.934 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903341 208 02:09:48.934 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 209 02:09:53.941 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903342 210 02:09:53.941 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 211 02:09:53.971 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 212 02:09:53.971 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 213 02:09:53.971 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903343, seq# expected = 65903343 214 02:12:13.162 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 215 02:12:30.186 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903343 216 02:12:30.186 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 217 02:12:30.216 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 218 02:12:30.216 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 219 02:12:30.216 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903344, seq# expected = 65903344 220 02:13:50.802 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903344 221 02:13:50.802 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 222 02:13:50.822 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 223 02:13:50.822 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 224 02:13:50.822 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903345, seq# expected = 65903345 225 02:17:13.093 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 226 02:20:07.343 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903345 227 02:20:07.343 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 228 02:20:07.373 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 229 02:20:07.373 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 230 02:20:07.373 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903346, seq# expected = 65903346 231 02:22:13.525 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 232 02:27:13.967 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 233 02:30:37.760 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903346 234 02:30:37.760 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 235 02:30:42.767 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903347 236 02:30:42.767 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 02:30:42.797 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 02:30:42.797 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 02:30:42.797 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903348, seq# expected = 65903348 240 02:32:13.898 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 241 02:37:14.861 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 242 02:42:15.303 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 243 02:47:15.775 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 244 02:52:16.227 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 245 02:57:17.160 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 246 03:01:42.551 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903348 247 03:01:42.551 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 248 03:01:42.581 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 249 03:01:42.581 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 250 03:01:42.581 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903349, seq# expected = 65903349 251 03:01:53.066 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903349 252 03:01:53.066 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 253 03:01:53.087 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 03:01:53.087 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 255 03:01:53.087 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903350, seq# expected = 65903350 256 03:02:16.600 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 257 03:07:17.543 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 258 03:12:17.985 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 259 03:17:18.417 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 260 03:22:18.869 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 261 03:27:19.311 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 262 03:32:19.743 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 263 03:37:20.175 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 264 03:42:20.627 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 265 03:47:21.059 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 266 03:52:21.511 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 267 03:57:21.943 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 268 04:02:22.385 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 269 04:04:09.529 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903350 270 04:04:09.529 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 271 04:04:09.559 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 272 04:04:09.559 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 273 04:04:09.559 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903351, seq# expected = 65903351 274 04:07:22.807 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 275 04:12:23.239 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 276 04:14:40.937 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903351 277 04:14:40.937 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 04:14:40.957 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 04:14:40.967 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 04:14:40.967 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903352, seq# expected = 65903352 281 04:14:51.452 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903352 282 04:14:51.452 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 283 04:14:51.472 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 284 04:14:51.472 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 285 04:14:51.472 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903353, seq# expected = 65903353 286 04:17:23.681 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 287 04:21:13.512 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903353 288 04:21:13.512 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 04:21:13.542 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 04:21:13.542 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 04:21:13.542 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903354, seq# expected = 65903354 292 04:22:23.612 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 293 04:23:54.243 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903354 294 04:23:54.243 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 295 04:23:54.263 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 296 04:23:54.263 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 297 04:23:54.273 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903355, seq# expected = 65903355 298 04:24:04.758 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903355 299 04:24:04.758 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 300 04:24:04.788 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 301 04:24:04.788 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 302 04:24:04.788 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903356, seq# expected = 65903356 303 04:24:55.331 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903356 304 04:24:55.331 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 305 04:24:55.351 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 306 04:24:55.351 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 307 04:24:55.351 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903357, seq# expected = 65903357 308 04:25:05.846 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903357 309 04:25:05.846 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 04:25:05.866 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 311 04:25:05.866 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 312 04:25:05.866 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903358, seq# expected = 65903358 313 04:25:16.361 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903358 314 04:25:16.361 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 315 04:25:16.381 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 316 04:25:16.381 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 317 04:25:16.381 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903359, seq# expected = 65903359 318 04:27:24.555 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 319 04:32:24.997 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 320 04:33:01.049 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903359 321 04:33:01.049 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 322 04:33:01.079 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 323 04:33:01.079 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 324 04:33:01.079 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903360, seq# expected = 65903360 325 04:35:22.252 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903360 326 04:35:22.262 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 327 04:35:22.282 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 328 04:35:22.282 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 329 04:35:22.282 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903361, seq# expected = 65903361 330 04:37:25.429 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 331 04:42:25.861 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 332 04:45:50.656 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903361 333 04:45:50.666 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 334 04:45:50.706 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 335 04:45:50.706 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 336 04:45:50.706 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903362, seq# expected = 65903362 337 04:46:01.171 10/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 65903362 338 04:46:01.171 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 339 04:46:01.201 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 340 04:46:01.201 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 341 04:46:01.201 10/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 65903363, seq# expected = 65903363 342 04:47:25.792 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 343 04:52:26.735 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 344 04:57:27.197 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 345 05:02:27.609 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 346 05:07:28.051 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 347 05:12:28.483 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 348 05:17:28.915 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 349 05:22:29.347 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 350 05:27:29.789 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 351 05:32:30.021 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 352 05:37:30.463 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 353 05:42:30.895 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 354 05:47:31.828 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 355 05:52:31.759 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 356 05:57:32.191 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 357 06:02:32.623 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 358 06:07:33.055 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 359 06:12:33.497 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 360 06:17:33.939 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 361 06:22:34.371 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 362 06:27:34.803 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 363 06:32:35.235 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 364 06:37:35.667 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 365 06:42:36.109 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 366 06:47:36.541 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 367 06:52:36.983 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 368 06:57:37.425 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 369 07:02:37.867 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 370 07:07:38.299 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 371 07:12:38.741 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 372 07:16:50.603 10/06/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x3bdd3305 is about to expire, requesting a new one 373 07:16:50.603 10/06/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.112, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 374 07:16:50.603 10/06/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=0D6EFA96) Initiator = ID=10.13.32.112 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 375 07:16:50.603 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 376 07:16:50.653 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 07:16:50.653 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 378 07:16:50.653 10/06/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 379 07:16:50.653 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 380 07:16:50.653 10/06/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=0D6EFA96 OUTBOUND SPI = 0x34CDD1C1 INBOUND SPI = 0x4A48CE9A) 381 07:16:50.653 10/06/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x34CDD1C1 382 07:16:50.653 10/06/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4A48CE9A 383 07:16:50.653 10/06/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 384 07:16:51.114 10/06/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 385 07:16:51.114 10/06/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc1d1cd34 into key list 386 07:16:51.114 10/06/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 387 07:16:51.114 10/06/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9ace484a into key list 388 07:17:20.636 10/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 389 07:17:20.636 10/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 390 07:17:20.636 10/06/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 533DD3B INBOUND SPI = 7DAFDB5E) 391 07:17:20.636 10/06/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=71580C3B 392 07:17:20.646 10/06/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x5edbaf7d 393 07:17:20.646 10/06/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x5edbaf7d 394 07:17:20.646 10/06/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3bdd3305 395 07:17:20.646 10/06/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3bdd3305 396 07:17:23.150 10/06/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xc1d1cd34 for inbound key with SPI=0x9ace484a 397 07:17:38.672 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 398 07:22:39.605 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 399 07:27:40.037 10/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1166, dst port 4005 400 07:32:12.739 10/06/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 401 07:32:12.739 10/06/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 402 07:32:12.739 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 403 07:32:12.739 10/06/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 34CDD1C1 INBOUND SPI = 4A48CE9A) 404 07:32:12.739 10/06/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=0D6EFA96 405 07:32:12.739 10/06/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=08EA31DDA6A8B891 R_Cookie=BF743A18656B9045) reason = DEL_REASON_RESET_SADB 406 07:32:12.739 10/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 407 07:32:12.739 10/06/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=08EA31DDA6A8B891 R_Cookie=BF743A18656B9045) reason = DEL_REASON_RESET_SADB 408 07:32:12.739 10/06/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 409 07:32:12.739 10/06/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 410 07:32:12.739 10/06/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 411 07:32:12.739 10/06/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1166 for TCP connection. 412 07:32:12.739 10/06/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 6:39:21 413 07:32:12.819 10/06/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 414 07:32:15.253 10/06/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 415 07:32:15.253 10/06/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 416 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9ace484a 417 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9ace484a 418 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc1d1cd34 419 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc1d1cd34 420 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 421 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 422 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 423 07:32:15.263 10/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 424 07:32:15.263 10/06/06 Sev=Warning/3 CM/0xA310000C State violation caused by CTCP UP EVENT at IDLE STATE