EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 01:46:10.438 10/07/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 01:46:10.448 10/07/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 01:46:10.448 10/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 01:46:10.458 10/07/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1265 for TCP connection. 5 01:46:10.849 10/07/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 01:46:10.849 10/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 01:46:10.849 10/07/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1265, dst port 4005 8 01:46:10.849 10/07/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1265 9 01:46:10.849 10/07/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1265, dst port 4005 10 01:46:10.849 10/07/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 01:46:11.349 10/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 01:46:11.349 10/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 01:46:11.399 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 01:46:11.570 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 01:46:11.570 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 01:46:11.570 10/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 01:46:11.570 10/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 01:46:11.570 10/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 01:46:11.570 10/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 01:46:11.600 10/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 01:46:11.600 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 01:46:11.600 10/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 01:46:11.600 10/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 01:46:11.620 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 01:46:11.620 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 01:46:11.620 10/07/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 01:46:11.620 10/07/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=00AFA8ACF8CB8A09 R_Cookie=272338D7F555AACC) reason = DEL_REASON_LOAD_BALANCING 28 01:46:11.620 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 01:46:12.351 10/07/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=00AFA8ACF8CB8A09 R_Cookie=272338D7F555AACC) reason = DEL_REASON_LOAD_BALANCING 30 01:46:12.351 10/07/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 01:46:12.351 10/07/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 01:46:12.351 10/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 01:46:12.351 10/07/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 01:46:12.851 10/07/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1265, dst port 4005 35 01:46:12.851 10/07/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1265, dst port 4005 36 01:46:12.851 10/07/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1265 37 01:46:12.851 10/07/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1265, dst port 4005 38 01:46:12.851 10/07/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 01:46:13.352 10/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 01:46:13.352 10/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 01:46:13.362 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 01:46:13.532 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 01:46:13.532 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 01:46:13.532 10/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 01:46:13.532 10/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 01:46:13.532 10/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 01:46:13.532 10/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 01:46:13.542 10/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 01:46:13.542 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 01:46:13.542 10/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 01:46:13.542 10/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 01:46:13.562 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 01:46:13.562 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 01:46:13.562 10/07/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 01:46:26.932 10/07/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 01:46:26.932 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 01:46:29.445 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 01:46:29.445 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 01:46:29.445 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 01:46:29.445 10/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 01:46:29.495 10/07/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 01:46:29.495 10/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 01:46:29.495 10/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 01:46:29.495 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 01:46:30.447 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.62 68 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 01:46:30.447 10/07/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 01:46:30.447 10/07/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 01:46:30.457 10/07/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.62, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 01:46:30.457 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 01:46:30.497 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 87 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 01:46:30.497 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 01:46:30.497 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=46DF39FB OUTBOUND SPI = 0x3D611B1B INBOUND SPI = 0x97A8DD00) 92 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3D611B1B 93 01:46:30.497 10/07/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x97A8DD00 94 01:46:32.930 10/07/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.62/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 01:46:32.970 10/07/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 01:46:32.990 10/07/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 01:46:33.150 10/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.2, 10.13.8.62. 98 01:46:33.150 10/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.62. Current address(es): 192.168.1.2, 10.13.8.62. 99 01:46:33.240 10/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 01:46:33.240 10/07/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 01:46:33.240 10/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 01:46:33.240 10/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x1b1b613d into key list 103 01:46:33.240 10/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 01:46:33.240 10/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x00dda897 into key list 105 01:46:33.240 10/07/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.62 106 01:46:36.385 10/07/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x1b1b613d for inbound key with SPI=0x00dda897 107 01:48:35.556 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409790 108 01:48:35.556 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 01:48:35.576 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 01:48:35.576 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 01:48:35.576 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409791, seq# expected = 3890409791 112 01:48:51.078 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409791 113 01:48:51.078 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 01:48:51.098 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 01:48:51.098 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 01:48:51.098 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409792, seq# expected = 3890409792 117 01:51:14.284 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 118 01:56:14.716 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 119 01:57:12.299 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409792 120 01:57:12.299 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 121 01:57:12.329 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 122 01:57:12.329 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 123 01:57:12.329 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409793, seq# expected = 3890409793 124 01:59:02.958 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409793 125 01:59:02.958 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 126 01:59:02.978 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 127 01:59:02.978 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 128 01:59:02.978 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409794, seq# expected = 3890409794 129 01:59:13.473 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409794 130 01:59:13.473 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 131 01:59:13.493 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 132 01:59:13.493 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 133 01:59:13.493 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409795, seq# expected = 3890409795 134 02:01:15.148 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 135 02:06:15.580 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 136 02:09:10.331 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409795 137 02:09:10.331 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 138 02:09:10.361 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 139 02:09:10.361 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 140 02:09:10.361 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409796, seq# expected = 3890409796 141 02:09:25.854 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409796 142 02:09:25.854 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 02:09:25.874 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 02:09:25.874 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 02:09:25.874 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409797, seq# expected = 3890409797 146 02:09:36.369 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409797 147 02:09:36.369 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 148 02:09:36.389 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 149 02:09:36.389 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 150 02:09:36.389 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409798, seq# expected = 3890409798 151 02:09:46.884 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409798 152 02:09:46.884 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 153 02:09:46.904 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 154 02:09:46.904 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 155 02:09:46.904 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409799, seq# expected = 3890409799 156 02:11:15.511 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 157 02:16:16.494 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 158 02:19:49.250 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409799 159 02:19:49.250 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 160 02:19:49.270 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 161 02:19:49.270 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 162 02:19:49.270 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409800, seq# expected = 3890409800 163 02:20:04.772 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409800 164 02:20:04.772 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 165 02:20:04.793 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 166 02:20:04.793 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 167 02:20:04.793 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409801, seq# expected = 3890409801 168 02:21:16.375 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 169 02:26:17.308 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 170 02:30:12.647 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409801 171 02:30:12.647 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 172 02:30:12.667 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 173 02:30:12.667 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 174 02:30:12.667 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409802, seq# expected = 3890409802 175 02:30:23.162 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409802 176 02:30:23.162 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 177 02:30:23.182 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 178 02:30:23.182 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 179 02:30:23.182 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409803, seq# expected = 3890409803 180 02:30:33.677 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409803 181 02:30:33.677 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 182 02:30:33.697 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 183 02:30:33.697 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 184 02:30:33.697 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409804, seq# expected = 3890409804 185 02:31:17.239 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 186 02:33:10.402 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409804 187 02:33:10.402 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 188 02:33:10.422 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 189 02:33:10.422 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 190 02:33:10.422 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409805, seq# expected = 3890409805 191 02:36:18.172 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 192 02:40:37.044 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409805 193 02:40:37.044 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 194 02:40:37.074 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 195 02:40:37.074 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 196 02:40:37.074 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409806, seq# expected = 3890409806 197 02:40:52.567 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409806 198 02:40:52.567 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 199 02:40:52.587 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 200 02:40:52.587 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 201 02:40:52.587 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409807, seq# expected = 3890409807 202 02:41:18.103 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 203 02:46:19.036 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 204 02:51:19.468 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 205 02:56:19.900 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 206 02:57:10.974 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409807 207 02:57:10.974 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 208 02:57:10.994 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 209 02:57:10.994 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 210 02:57:10.994 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409808, seq# expected = 3890409808 211 03:01:20.332 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 212 03:01:47.872 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409808 213 03:01:47.872 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 214 03:01:47.902 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 215 03:01:47.902 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 216 03:01:47.902 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409809, seq# expected = 3890409809 217 03:06:20.764 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 218 03:09:11.019 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409809 219 03:09:11.019 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 220 03:09:11.039 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 221 03:09:11.039 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 222 03:09:11.039 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409810, seq# expected = 3890409810 223 03:11:51.750 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409810 224 03:11:51.750 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 225 03:11:51.780 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 226 03:11:51.780 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 227 03:11:51.780 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409811, seq# expected = 3890409811 228 03:12:07.272 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409811 229 03:12:07.272 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 03:12:07.292 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 231 03:12:07.292 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 232 03:12:07.292 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409812, seq# expected = 3890409812 233 03:16:21.638 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 234 03:21:14.059 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409812 235 03:21:14.059 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 236 03:21:14.089 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 237 03:21:14.089 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 238 03:21:14.089 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409813, seq# expected = 3890409813 239 03:21:21.569 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 240 03:22:14.646 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409813 241 03:22:14.646 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 242 03:22:14.666 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 243 03:22:14.666 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 244 03:22:14.666 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409814, seq# expected = 3890409814 245 03:22:25.161 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409814 246 03:22:25.161 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 247 03:22:25.191 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 248 03:22:25.191 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 249 03:22:25.191 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409815, seq# expected = 3890409815 250 03:26:22.502 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 251 03:31:22.934 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 252 03:32:49.559 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409815 253 03:32:49.559 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 254 03:32:49.579 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 255 03:32:49.579 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 256 03:32:49.579 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409816, seq# expected = 3890409816 257 03:33:00.074 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409816 258 03:33:00.074 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 03:33:00.094 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 03:33:00.094 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 03:33:00.094 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409817, seq# expected = 3890409817 262 03:33:10.589 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409817 263 03:33:10.589 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 264 03:33:10.619 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 265 03:33:10.619 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 266 03:33:10.619 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409818, seq# expected = 3890409818 267 03:36:23.366 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 268 03:41:23.808 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 269 03:43:07.587 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409818 270 03:43:07.587 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 271 03:43:07.617 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 272 03:43:07.617 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 273 03:43:07.617 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409819, seq# expected = 3890409819 274 03:43:18.113 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409819 275 03:43:18.113 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 276 03:43:18.133 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 277 03:43:18.133 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 278 03:43:18.133 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409820, seq# expected = 3890409820 279 03:46:23.900 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 280 03:56:24.764 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 281 04:06:25.628 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 282 04:09:13.369 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409820 283 04:09:13.369 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 284 04:09:13.429 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 285 04:09:13.429 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 286 04:09:13.429 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409821, seq# expected = 3890409821 287 04:11:26.060 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 288 04:16:26.492 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 289 04:21:26.924 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 290 04:26:27.356 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 291 04:31:28.369 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 292 04:33:36.973 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409821 293 04:33:36.973 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 294 04:33:37.044 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 295 04:33:37.044 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 296 04:33:37.044 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409822, seq# expected = 3890409822 297 04:35:22.625 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409822 298 04:35:22.625 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 299 04:35:22.645 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 300 04:35:22.645 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 301 04:35:22.645 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409823, seq# expected = 3890409823 302 04:36:27.719 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 303 04:41:28.652 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 304 04:45:34.505 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409823 305 04:45:34.505 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 306 04:45:34.535 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 307 04:45:34.535 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 308 04:45:34.535 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409824, seq# expected = 3890409824 309 04:45:45.020 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409824 310 04:45:45.020 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 311 04:45:45.040 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 312 04:45:45.040 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 313 04:45:45.040 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409825, seq# expected = 3890409825 314 04:45:55.535 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409825 315 04:45:55.535 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 316 04:45:55.565 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 317 04:45:55.565 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 318 04:45:55.565 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409826, seq# expected = 3890409826 319 04:46:28.583 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 320 04:51:29.516 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 321 04:56:29.948 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 322 05:01:30.380 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 323 05:06:23.301 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409826 324 05:06:23.301 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 325 05:06:23.331 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 326 05:06:23.331 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 327 05:06:23.331 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409827, seq# expected = 3890409827 328 05:06:30.311 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 329 05:06:33.816 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409827 330 05:06:33.816 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 331 05:06:33.846 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 332 05:06:33.846 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 333 05:06:33.846 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409828, seq# expected = 3890409828 334 05:06:44.331 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409828 335 05:06:44.331 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 336 05:06:44.351 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 337 05:06:44.351 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 338 05:06:44.351 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409829, seq# expected = 3890409829 339 05:09:15.048 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409829 340 05:09:15.048 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 341 05:09:15.078 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 342 05:09:15.078 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 343 05:09:15.078 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409830, seq# expected = 3890409830 344 05:11:31.244 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 345 05:16:31.676 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 346 05:17:01.218 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409830 347 05:17:01.218 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 348 05:17:01.238 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 349 05:17:01.238 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 350 05:17:01.238 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409831, seq# expected = 3890409831 351 05:21:32.108 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 352 05:23:52.309 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409831 353 05:23:52.309 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 354 05:23:52.329 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 355 05:23:52.329 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 356 05:23:52.329 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409832, seq# expected = 3890409832 357 05:24:57.904 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409832 358 05:24:57.904 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 359 05:24:57.924 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 360 05:24:57.924 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 361 05:24:57.924 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409833, seq# expected = 3890409833 362 05:26:32.039 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 363 05:27:22.111 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409833 364 05:27:22.111 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 365 05:27:22.131 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 366 05:27:22.131 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 367 05:27:22.131 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409834, seq# expected = 3890409834 368 05:31:32.972 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 369 05:36:33.404 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 370 05:37:38.497 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409834 371 05:37:38.497 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 372 05:37:38.517 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 373 05:37:38.517 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 374 05:37:38.517 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409835, seq# expected = 3890409835 375 05:37:49.012 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409835 376 05:37:49.012 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 377 05:37:49.032 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 378 05:37:49.032 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 379 05:37:49.032 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409836, seq# expected = 3890409836 380 05:41:33.836 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 381 05:46:34.268 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 382 05:48:15.413 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409836 383 05:48:15.413 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 384 05:48:15.433 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 385 05:48:15.433 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 386 05:48:15.433 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409837, seq# expected = 3890409837 387 05:51:34.700 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 388 05:56:35.132 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 389 05:58:26.792 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409837 390 05:58:26.792 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 391 05:58:26.812 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 392 05:58:26.812 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 393 05:58:26.812 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409838, seq# expected = 3890409838 394 05:58:37.307 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409838 395 05:58:37.307 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 396 05:58:37.327 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 397 05:58:37.327 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 398 05:58:37.327 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409839, seq# expected = 3890409839 399 06:01:35.564 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 400 06:06:35.996 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 401 06:08:54.194 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409839 402 06:08:54.194 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 403 06:08:54.214 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 404 06:08:54.214 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 405 06:08:54.214 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409840, seq# expected = 3890409840 406 06:11:36.428 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 407 06:16:36.860 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 408 06:19:20.595 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409840 409 06:19:20.595 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 410 06:19:20.625 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 411 06:19:20.625 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 412 06:19:20.625 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409841, seq# expected = 3890409841 413 06:21:37.292 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 414 06:26:37.724 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 415 06:29:41.989 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409841 416 06:29:41.989 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 417 06:29:42.009 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 418 06:29:42.009 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 419 06:29:42.009 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409842, seq# expected = 3890409842 420 06:31:37.655 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 421 06:36:38.588 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 422 06:40:13.397 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409842 423 06:40:13.397 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 424 06:40:13.427 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 425 06:40:13.427 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 426 06:40:13.427 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409843, seq# expected = 3890409843 427 06:40:28.919 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409843 428 06:40:28.919 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 429 06:40:28.939 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 430 06:40:28.939 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 431 06:40:28.939 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409844, seq# expected = 3890409844 432 06:41:38.519 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 433 06:46:39.452 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 434 06:50:35.291 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409844 435 06:50:35.291 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 436 06:50:35.311 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 437 06:50:35.311 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 438 06:50:35.311 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409845, seq# expected = 3890409845 439 06:50:50.813 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409845 440 06:50:50.813 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 441 06:50:50.833 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 442 06:50:50.833 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 443 06:50:50.833 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409846, seq# expected = 3890409846 444 06:51:39.383 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 445 06:56:40.316 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 446 07:00:57.185 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409846 447 07:00:57.185 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 448 07:00:57.215 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 449 07:00:57.215 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 450 07:00:57.215 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409847, seq# expected = 3890409847 451 07:01:17.715 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409847 452 07:01:17.715 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 453 07:01:17.735 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 454 07:01:17.735 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 455 07:01:17.735 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409848, seq# expected = 3890409848 456 07:01:40.247 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 457 07:06:41.180 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 458 07:11:41.612 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 459 07:16:42.054 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 460 07:21:42.486 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 461 07:26:28.898 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409848 462 07:26:28.898 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 463 07:26:28.968 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 464 07:26:28.968 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 465 07:26:28.968 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409849, seq# expected = 3890409849 466 07:26:42.417 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 467 07:31:43.350 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 468 07:32:23.908 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409849 469 07:32:23.908 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 470 07:32:23.938 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 471 07:32:23.938 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 472 07:32:23.938 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409850, seq# expected = 3890409850 473 07:36:43.782 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 474 07:41:44.214 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 475 07:42:46.804 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409850 476 07:42:46.804 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 477 07:42:46.824 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 478 07:42:46.824 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 479 07:42:46.824 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409851, seq# expected = 3890409851 480 07:42:57.319 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409851 481 07:42:57.319 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 482 07:42:57.339 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 483 07:42:57.339 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 484 07:42:57.339 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409852, seq# expected = 3890409852 485 07:45:28.036 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409852 486 07:45:28.036 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 487 07:45:28.066 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 488 07:45:28.066 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 489 07:45:28.066 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409853, seq# expected = 3890409853 490 07:46:44.185 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 491 07:51:21.053 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409853 492 07:51:21.053 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 493 07:51:21.083 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 494 07:51:21.083 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 495 07:51:21.083 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409854, seq# expected = 3890409854 496 07:51:44.587 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 497 07:53:21.727 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409854 498 07:53:21.727 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 499 07:53:21.767 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 500 07:53:21.767 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 501 07:53:21.767 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409855, seq# expected = 3890409855 502 07:56:45.520 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 503 07:59:23.247 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409855 504 07:59:23.247 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 505 07:59:23.277 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 506 07:59:23.277 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 507 07:59:23.277 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409856, seq# expected = 3890409856 508 08:01:45.952 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 509 08:03:24.093 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409856 510 08:03:24.093 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 511 08:03:24.123 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 512 08:03:24.123 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 513 08:03:24.123 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409857, seq# expected = 3890409857 514 08:06:46.384 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 515 08:09:31.431 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409857 516 08:09:31.431 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 517 08:09:31.451 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 518 08:09:31.451 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 519 08:09:31.451 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409858, seq# expected = 3890409858 520 08:10:32.519 10/07/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x1b1b613d is about to expire, requesting a new one 521 08:10:32.519 10/07/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.62, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 522 08:10:32.519 10/07/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=C756CCC6) Initiator = ID=10.13.8.62 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 523 08:10:32.519 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 524 08:10:32.549 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 525 08:10:32.549 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 526 08:10:32.549 10/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 527 08:10:32.549 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 528 08:10:32.549 10/07/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=C756CCC6 OUTBOUND SPI = 0x57AB91E3 INBOUND SPI = 0xD8C3428D) 529 08:10:32.549 10/07/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x57AB91E3 530 08:10:32.549 10/07/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xD8C3428D 531 08:10:32.559 10/07/06 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 532 08:10:33.030 10/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 533 08:10:33.030 10/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe391ab57 into key list 534 08:10:33.030 10/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 535 08:10:33.030 10/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8d42c3d8 into key list 536 08:10:42.533 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409858 537 08:10:42.533 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 538 08:10:42.563 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 539 08:10:42.563 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 540 08:10:42.563 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409859, seq# expected = 3890409859 541 08:11:02.552 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 542 08:11:02.552 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 543 08:11:02.552 10/07/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3D611B1B INBOUND SPI = 97A8DD00) 544 08:11:02.552 10/07/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=46DF39FB 545 08:11:02.572 10/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x00dda897 546 08:11:02.572 10/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x00dda897 547 08:11:02.572 10/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x1b1b613d 548 08:11:02.572 10/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x1b1b613d 549 08:11:03.073 10/07/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xe391ab57 for inbound key with SPI=0x8d42c3d8 550 08:11:46.125 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 551 08:13:58.816 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409859 552 08:13:58.816 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 553 08:14:03.823 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409860 554 08:14:03.823 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 555 08:14:03.853 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 556 08:14:03.853 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 557 08:14:03.853 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409861, seq# expected = 3890409861 558 08:16:47.558 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 559 08:21:25.458 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409861 560 08:21:25.458 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 561 08:21:25.498 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 562 08:21:25.498 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 563 08:21:25.498 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409862, seq# expected = 3890409862 564 08:21:47.489 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 565 08:24:21.711 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409862 566 08:24:21.711 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 567 08:24:21.741 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 568 08:24:21.741 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 569 08:24:21.741 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409863, seq# expected = 3890409863 570 08:24:32.226 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409863 571 08:24:32.226 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 572 08:24:32.256 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 573 08:24:32.256 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 574 08:24:32.256 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409864, seq# expected = 3890409864 575 08:26:48.422 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 576 08:31:48.854 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 577 08:33:33.505 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409864 578 08:33:33.505 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 579 08:33:33.535 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 580 08:33:33.535 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 581 08:33:33.535 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409865, seq# expected = 3890409865 582 08:34:54.621 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409865 583 08:34:54.621 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 584 08:34:54.651 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 585 08:34:54.651 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 586 08:34:54.651 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409866, seq# expected = 3890409866 587 08:36:48.295 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 588 08:41:49.227 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 589 08:45:06.521 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409866 590 08:45:06.521 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 591 08:45:06.551 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 592 08:45:06.551 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 593 08:45:06.551 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409867, seq# expected = 3890409867 594 08:45:22.043 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409867 595 08:45:22.043 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 596 08:45:22.064 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 597 08:45:22.074 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 598 08:45:22.074 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409868, seq# expected = 3890409868 599 08:45:32.559 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409868 600 08:45:32.559 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 601 08:45:32.589 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 602 08:45:32.589 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 603 08:45:32.589 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409869, seq# expected = 3890409869 604 08:46:49.169 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 605 08:51:50.101 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 606 08:55:23.909 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409869 607 08:55:23.909 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 608 08:55:23.939 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 609 08:55:23.939 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 610 08:55:23.939 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409870, seq# expected = 3890409870 611 08:55:34.424 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409870 612 08:55:34.424 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 613 08:55:34.444 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 614 08:55:34.444 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 615 08:55:34.444 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409871, seq# expected = 3890409871 616 08:56:50.033 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 617 09:01:28.433 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409871 618 09:01:28.433 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 619 09:01:28.463 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 620 09:01:28.463 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 621 09:01:28.463 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409872, seq# expected = 3890409872 622 09:01:50.465 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 623 09:05:59.323 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409872 624 09:05:59.323 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 625 09:05:59.353 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 626 09:05:59.353 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 627 09:05:59.353 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409873, seq# expected = 3890409873 628 09:06:50.897 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 629 09:09:35.133 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409873 630 09:09:35.133 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 631 09:09:35.163 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 632 09:09:35.163 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 633 09:09:35.163 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409874, seq# expected = 3890409874 634 09:11:51.329 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 635 09:16:31.231 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409874 636 09:16:31.231 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 637 09:16:31.261 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 638 09:16:31.261 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 639 09:16:31.261 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409875, seq# expected = 3890409875 640 09:16:51.761 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 641 09:21:32.164 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409875 642 09:21:32.164 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 643 09:21:32.194 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 644 09:21:32.194 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 645 09:21:32.194 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409876, seq# expected = 3890409876 646 09:21:52.193 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 647 09:26:43.111 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409876 648 09:26:43.111 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 649 09:26:43.141 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 650 09:26:43.141 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 651 09:26:43.141 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409877, seq# expected = 3890409877 652 09:26:52.625 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 653 09:31:53.557 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 654 09:33:39.710 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409877 655 09:33:39.710 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 656 09:33:39.740 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 657 09:33:39.740 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 658 09:33:39.740 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409878, seq# expected = 3890409878 659 09:36:53.989 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 660 09:37:20.528 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409878 661 09:37:20.528 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 662 09:37:20.558 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 663 09:37:20.558 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 664 09:37:20.558 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409879, seq# expected = 3890409879 665 09:41:54.431 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 666 09:46:54.863 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 667 09:47:37.425 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409879 668 09:47:37.425 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 669 09:47:37.455 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 670 09:47:37.455 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 671 09:47:37.455 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409880, seq# expected = 3890409880 672 09:49:23.577 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409880 673 09:49:23.577 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 674 09:49:23.607 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 675 09:49:23.607 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 676 09:49:23.607 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409881, seq# expected = 3890409881 677 09:51:55.295 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 678 09:56:55.727 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 679 10:01:56.170 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 680 10:06:56.602 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 681 10:07:42.668 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409881 682 10:07:42.668 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 683 10:07:42.698 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 684 10:07:42.698 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 685 10:07:42.698 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409882, seq# expected = 3890409882 686 10:08:23.226 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409882 687 10:08:23.226 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 688 10:08:23.256 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 689 10:08:23.256 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 690 10:08:23.256 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409883, seq# expected = 3890409883 691 10:09:28.820 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409883 692 10:09:28.820 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 693 10:09:28.850 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 694 10:09:28.850 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 695 10:09:28.850 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409884, seq# expected = 3890409884 696 10:11:56.533 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 697 10:16:57.466 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 698 10:18:55.135 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409884 699 10:18:55.135 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 700 10:18:55.165 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 701 10:18:55.165 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 702 10:18:55.165 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409885, seq# expected = 3890409885 703 10:21:31.359 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409885 704 10:21:31.359 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 705 10:21:31.399 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 706 10:21:31.399 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 707 10:21:31.399 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409886, seq# expected = 3890409886 708 10:21:57.397 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 709 10:26:58.330 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 710 10:29:22.036 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409886 711 10:29:22.036 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 712 10:29:22.066 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 713 10:29:22.066 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 714 10:29:22.066 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409887, seq# expected = 3890409887 715 10:29:32.551 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409887 716 10:29:32.551 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 717 10:29:32.581 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 718 10:29:32.581 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 719 10:29:32.581 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409888, seq# expected = 3890409888 720 10:31:58.762 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 721 10:33:28.390 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409888 722 10:33:28.390 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 723 10:33:28.420 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 724 10:33:28.420 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 725 10:33:28.420 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409889, seq# expected = 3890409889 726 10:36:59.194 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 727 10:39:34.917 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409889 728 10:39:34.917 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 729 10:39:34.947 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 730 10:39:34.947 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 731 10:39:34.947 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409890, seq# expected = 3890409890 732 10:39:55.447 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409890 733 10:39:55.447 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 734 10:39:55.477 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 735 10:39:55.477 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 736 10:39:55.477 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409891, seq# expected = 3890409891 737 10:41:59.626 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 738 10:47:00.058 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 739 10:50:02.320 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409891 740 10:50:02.320 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 741 10:50:02.350 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 742 10:50:02.350 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 743 10:50:02.350 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409892, seq# expected = 3890409892 744 10:51:59.989 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 745 10:57:00.932 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 746 10:57:28.461 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409892 747 10:57:28.461 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 748 10:57:28.491 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 749 10:57:28.491 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 750 10:57:28.491 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409893, seq# expected = 3890409893 751 11:00:34.228 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409893 752 11:00:34.228 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 753 11:00:34.258 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 754 11:00:34.258 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 755 11:00:34.258 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409894, seq# expected = 3890409894 756 11:02:00.853 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 757 11:07:02.286 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 758 11:08:57.452 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409894 759 11:08:57.452 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 760 11:08:57.492 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 761 11:08:57.492 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 762 11:08:57.492 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409895, seq# expected = 3890409895 763 11:09:33.003 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409895 764 11:09:33.003 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 765 11:09:33.023 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 766 11:09:33.023 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 767 11:09:33.023 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409896, seq# expected = 3890409896 768 11:10:58.626 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409896 769 11:10:58.626 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 770 11:10:58.646 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 771 11:10:58.646 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 772 11:10:58.646 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409897, seq# expected = 3890409897 773 11:11:09.141 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409897 774 11:11:09.141 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 775 11:11:09.171 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 776 11:11:09.171 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 777 11:11:09.171 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409898, seq# expected = 3890409898 778 11:12:02.218 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 779 11:17:02.149 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 780 11:21:16.014 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409898 781 11:21:16.014 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 782 11:21:16.054 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 783 11:21:16.054 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 784 11:21:16.054 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409899, seq# expected = 3890409899 785 11:22:02.080 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 786 11:27:03.013 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 787 11:31:42.915 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409899 788 11:31:42.915 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 789 11:31:42.935 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 790 11:31:42.935 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 791 11:31:42.935 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409900, seq# expected = 3890409900 792 11:32:02.944 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 793 11:37:03.877 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 794 11:42:04.309 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 795 11:42:16.326 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409900 796 11:42:16.326 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 797 11:42:16.356 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 798 11:42:16.356 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 799 11:42:16.356 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409901, seq# expected = 3890409901 800 11:47:04.741 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 801 11:50:14.013 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409901 802 11:50:14.013 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 803 11:50:14.043 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 804 11:50:14.043 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 805 11:50:14.043 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409902, seq# expected = 3890409902 806 11:51:14.600 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409902 807 11:51:14.600 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 808 11:51:14.630 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 809 11:51:14.630 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 810 11:51:14.630 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409903, seq# expected = 3890409903 811 11:52:04.672 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 812 11:52:40.223 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409903 813 11:52:40.223 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 814 11:52:40.253 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 815 11:52:40.253 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 816 11:52:40.253 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409904, seq# expected = 3890409904 817 11:57:05.605 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 818 12:02:06.037 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 819 12:02:54.607 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409904 820 12:02:54.607 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 821 12:02:54.637 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 822 12:02:54.637 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 823 12:02:54.637 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409905, seq# expected = 3890409905 824 12:07:06.469 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 825 12:09:12.650 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409905 826 12:09:12.650 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 827 12:09:12.680 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 828 12:09:12.680 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 829 12:09:12.680 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409906, seq# expected = 3890409906 830 12:12:06.901 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 831 12:13:27.517 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409906 832 12:13:27.517 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 833 12:13:27.557 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 834 12:13:27.557 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 835 12:13:27.557 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409907, seq# expected = 3890409907 836 12:15:18.677 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409907 837 12:15:18.677 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 838 12:15:18.717 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 839 12:15:18.717 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 840 12:15:18.717 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409908, seq# expected = 3890409908 841 12:17:06.832 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 842 12:22:07.765 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 843 12:27:08.197 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 844 12:32:08.629 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 845 12:34:19.817 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409908 846 12:34:19.817 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 847 12:34:19.847 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 848 12:34:19.847 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 849 12:34:19.847 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409909, seq# expected = 3890409909 850 12:37:09.031 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 851 12:42:09.463 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 852 12:44:40.179 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409909 853 12:44:40.189 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 854 12:44:40.210 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 855 12:44:40.210 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 856 12:44:40.210 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409910, seq# expected = 3890409910 857 12:47:09.895 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 858 12:52:10.327 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 859 12:55:07.081 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409910 860 12:55:07.081 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 861 12:55:07.111 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 862 12:55:07.111 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 863 12:55:07.111 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409911, seq# expected = 3890409911 864 12:57:10.769 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 865 13:02:11.201 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 866 13:05:27.974 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409911 867 13:05:27.974 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 868 13:05:28.004 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 869 13:05:28.004 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 870 13:05:28.004 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409912, seq# expected = 3890409912 871 13:07:11.122 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 872 13:12:12.065 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 873 13:16:00.884 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409912 874 13:16:00.884 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 875 13:16:00.924 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 876 13:16:00.924 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 877 13:16:00.924 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409913, seq# expected = 3890409913 878 13:17:11.986 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 879 13:22:12.919 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 880 13:25:01.661 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409913 881 13:25:01.661 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 882 13:25:01.691 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 883 13:25:01.701 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 884 13:25:01.701 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409914, seq# expected = 3890409914 885 13:26:12.764 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409914 886 13:26:12.764 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 887 13:26:12.794 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 888 13:26:12.794 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 889 13:26:12.794 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409915, seq# expected = 3890409915 890 13:27:13.361 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 891 13:32:13.783 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 892 13:33:39.406 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409915 893 13:33:39.406 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 894 13:33:39.436 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 895 13:33:39.436 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 896 13:33:39.436 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409916, seq# expected = 3890409916 897 13:36:41.668 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409916 898 13:36:41.668 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 899 13:36:41.718 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 900 13:36:41.718 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 901 13:36:41.718 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409917, seq# expected = 3890409917 902 13:37:14.215 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 903 13:38:39.337 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409917 904 13:38:39.337 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 905 13:38:39.367 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 906 13:38:39.367 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 907 13:38:39.367 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409918, seq# expected = 3890409918 908 13:42:14.647 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 909 13:47:13.577 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409918 910 13:47:13.577 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 911 13:47:13.607 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 912 13:47:13.607 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 913 13:47:13.607 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409919, seq# expected = 3890409919 914 13:47:15.089 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 915 13:51:39.970 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409919 916 13:51:39.970 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 917 13:51:40.000 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 918 13:51:40.000 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 919 13:51:40.000 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409920, seq# expected = 3890409920 920 13:52:15.521 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 921 13:53:16.609 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409920 922 13:53:16.609 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 923 13:53:16.639 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 924 13:53:16.639 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 925 13:53:16.639 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409921, seq# expected = 3890409921 926 13:53:27.124 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409921 927 13:53:27.124 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 928 13:53:27.514 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 929 13:53:27.514 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 930 13:53:27.514 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409922, seq# expected = 3890409922 931 13:55:12.776 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409922 932 13:55:12.776 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 933 13:55:12.806 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 934 13:55:12.806 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 935 13:55:12.806 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409923, seq# expected = 3890409923 936 13:57:15.452 10/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1265, dst port 4005 937 13:57:24.465 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409923 938 13:57:24.465 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 939 13:57:24.495 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 940 13:57:24.495 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 941 13:57:24.495 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409924, seq# expected = 3890409924 942 13:57:39.987 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409924 943 13:57:39.987 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 944 13:57:40.017 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 945 13:57:40.017 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 946 13:57:40.017 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409925, seq# expected = 3890409925 947 14:01:10.790 10/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3890409925 948 14:01:10.790 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 949 14:01:10.820 10/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 950 14:01:10.820 10/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 951 14:01:10.820 10/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3890409926, seq# expected = 3890409926 952 14:01:45.731 10/07/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 953 14:01:45.731 10/07/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 954 14:01:45.731 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 955 14:01:45.731 10/07/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 57AB91E3 INBOUND SPI = D8C3428D) 956 14:01:45.731 10/07/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=C756CCC6 957 14:01:45.731 10/07/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=BAFBD0E0AE4D29AB R_Cookie=5B5D58D0B0CB533D) reason = DEL_REASON_RESET_SADB 958 14:01:45.731 10/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 959 14:01:45.731 10/07/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=BAFBD0E0AE4D29AB R_Cookie=5B5D58D0B0CB533D) reason = DEL_REASON_RESET_SADB 960 14:01:45.731 10/07/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 961 14:01:45.731 10/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 962 14:01:45.751 10/07/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 963 14:01:45.751 10/07/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1265 for TCP connection. 964 14:01:45.751 10/07/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 12:15:12 965 14:01:45.761 10/07/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 966 14:01:48.134 10/07/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 967 14:01:48.144 10/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 968 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8d42c3d8 969 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8d42c3d8 970 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe391ab57 971 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe391ab57 972 14:01:48.144 10/07/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1265, dst port 4005 973 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 974 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 975 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 976 14:01:48.144 10/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 977 14:01:48.144 10/07/06 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511)