EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:04:53.642 10/16/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:04:53.688 10/16/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:04:53.688 10/16/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:04:53.746 10/16/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1103 for TCP connection. 5 21:04:53.746 10/16/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:04:53.746 10/16/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:04:53.746 10/16/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1103, dst port 4005 8 21:04:54.264 10/16/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1103 9 21:04:54.264 10/16/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1103, dst port 4005 10 21:04:54.264 10/16/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:04:54.840 10/16/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:04:54.852 10/16/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:04:54.875 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:04:55.059 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:04:55.059 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:04:55.059 10/16/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:04:55.059 10/16/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:04:55.059 10/16/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:04:55.059 10/16/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:04:55.070 10/16/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:04:55.070 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:04:55.070 10/16/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:04:55.070 10/16/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:04:55.105 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:04:55.105 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:04:55.105 10/16/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 21:04:55.105 10/16/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=513AB9CAAC517D23 R_Cookie=B44AF2311B708C3D) reason = DEL_REASON_LOAD_BALANCING 28 21:04:55.105 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:04:55.992 10/16/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=513AB9CAAC517D23 R_Cookie=B44AF2311B708C3D) reason = DEL_REASON_LOAD_BALANCING 30 21:04:55.992 10/16/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:04:55.992 10/16/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 21:04:55.992 10/16/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 21:04:55.992 10/16/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:04:56.003 10/16/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1103, dst port 4005 35 21:04:56.003 10/16/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1103, dst port 4005 36 21:04:56.567 10/16/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1103 37 21:04:56.567 10/16/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1103, dst port 4005 38 21:04:56.567 10/16/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 21:04:57.143 10/16/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 21:04:57.143 10/16/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 21:04:57.155 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 21:04:57.350 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 21:04:57.350 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 21:04:57.350 10/16/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:04:57.350 10/16/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:04:57.350 10/16/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:04:57.350 10/16/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:04:57.362 10/16/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:04:57.362 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 21:04:57.362 10/16/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:04:57.362 10/16/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:04:57.385 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 21:04:57.385 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 21:04:57.385 10/16/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:05:11.526 10/16/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:05:11.526 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 21:05:14.335 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 21:05:14.335 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 21:05:14.335 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 21:05:14.335 10/16/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:05:14.439 10/16/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:05:14.439 10/16/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:05:14.439 10/16/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:05:14.439 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 21:05:15.395 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.230 68 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:05:15.395 10/16/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:05:15.406 10/16/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:05:15.406 10/16/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.230, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 21:05:15.406 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 21:05:15.464 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 18 seconds, setting expiry to 86382 seconds from now 87 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 21:05:15.464 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 21:05:15.464 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=2EAEE4B7 OUTBOUND SPI = 0x4B8B97C1 INBOUND SPI = 0xAEB0D034) 92 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4B8B97C1 93 21:05:15.464 10/16/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xAEB0D034 94 21:05:16.202 10/16/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.230/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 21:05:16.242 10/16/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 21:05:16.282 10/16/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 21:05:16.332 10/16/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.2, 10.13.32.230. 98 21:05:16.332 10/16/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.230. Current address(es): 192.168.1.2, 10.13.32.230. 99 21:05:16.502 10/16/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 21:05:16.502 10/16/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 21:05:16.502 10/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:05:16.502 10/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc1978b4b into key list 103 21:05:16.502 10/16/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:05:16.502 10/16/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x34d0b0ae into key list 105 21:05:16.502 10/16/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.230 106 21:05:18.645 10/16/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xc1978b4b for inbound key with SPI=0x34d0b0ae 107 21:09:58.047 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 108 21:14:58.479 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 109 21:19:58.911 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 110 21:24:59.343 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 111 21:27:11.533 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933802 112 21:27:11.533 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 113 21:27:11.553 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 114 21:27:11.563 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 115 21:27:11.563 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933803, seq# expected = 1748933803 116 21:29:59.775 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 117 21:35:00.207 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 118 21:37:30.423 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933803 119 21:37:30.423 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 120 21:37:30.443 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 121 21:37:30.443 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 122 21:37:30.443 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933804, seq# expected = 1748933804 123 21:37:40.938 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933804 124 21:37:40.938 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 125 21:37:40.958 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 126 21:37:40.958 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 127 21:37:40.958 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933805, seq# expected = 1748933805 128 21:40:00.639 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 129 21:45:01.071 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 130 21:50:01.503 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 131 21:55:01.935 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 132 21:56:03.023 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933805 133 21:56:03.023 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 134 21:56:03.043 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 135 21:56:03.043 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 136 21:56:03.043 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933806, seq# expected = 1748933806 137 22:00:02.367 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 138 22:05:02.799 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 139 22:09:00.140 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933806 140 22:09:00.140 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 22:09:00.160 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 22:09:00.160 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 22:09:00.160 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933807, seq# expected = 1748933807 144 22:10:02.730 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 145 22:15:03.663 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 146 22:20:04.095 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 147 22:25:04.527 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 148 22:30:04.959 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 149 22:35:05.391 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 150 22:40:05.823 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 151 22:45:06.255 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 152 22:50:06.697 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 153 22:50:41.737 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933807 154 22:50:41.737 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 155 22:50:41.757 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 156 22:50:41.757 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 157 22:50:41.757 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933808, seq# expected = 1748933808 158 22:55:07.119 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 159 22:56:03.200 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933808 160 22:56:03.200 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 161 22:56:03.220 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 162 22:56:03.220 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 163 22:56:03.220 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933809, seq# expected = 1748933809 164 23:00:07.551 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 165 23:00:44.604 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933809 166 23:00:44.604 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 167 23:00:44.624 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 168 23:00:44.624 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 169 23:00:44.624 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933810, seq# expected = 1748933810 170 23:00:55.119 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933810 171 23:00:55.119 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 172 23:00:55.139 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 173 23:00:55.139 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 174 23:00:55.139 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933811, seq# expected = 1748933811 175 23:02:31.258 10/16/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933811 176 23:02:31.258 10/16/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 177 23:02:31.288 10/16/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 178 23:02:31.288 10/16/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 179 23:02:31.288 10/16/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933812, seq# expected = 1748933812 180 23:05:07.993 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 181 23:10:08.425 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 182 23:15:08.857 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 183 23:20:09.169 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 184 23:25:09.601 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 185 23:30:10.033 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 186 23:35:10.465 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 187 23:40:10.897 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 188 23:45:11.329 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 189 23:50:11.761 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 190 23:55:12.193 10/16/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 191 00:00:12.625 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 192 00:05:13.057 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 193 00:10:13.489 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 194 00:13:41.288 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933812 195 00:13:41.288 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 196 00:13:41.308 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 197 00:13:41.308 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 198 00:13:41.308 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933813, seq# expected = 1748933813 199 00:13:56.810 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933813 200 00:13:56.810 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 201 00:13:56.830 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 202 00:13:56.830 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 203 00:13:56.830 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933814, seq# expected = 1748933814 204 00:15:13.420 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 205 00:20:07.843 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933814 206 00:20:07.843 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 207 00:20:07.863 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 208 00:20:07.863 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 209 00:20:07.863 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933815, seq# expected = 1748933815 210 00:20:13.852 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 211 00:24:13.697 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933815 212 00:24:13.697 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 213 00:24:13.717 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 214 00:24:13.717 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 215 00:24:13.717 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933816, seq# expected = 1748933816 216 00:25:14.284 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 217 00:30:15.217 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 218 00:32:01.369 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933816 219 00:32:01.369 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 220 00:32:01.399 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 221 00:32:01.399 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 222 00:32:01.399 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933817, seq# expected = 1748933817 223 00:35:15.148 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 224 00:40:16.081 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 225 00:45:16.513 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 226 00:50:16.945 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 227 00:55:17.377 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 228 01:00:17.809 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 229 01:05:18.241 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 230 01:10:18.673 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 231 01:15:19.105 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 232 01:20:19.577 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 233 01:25:20.009 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 234 01:30:20.441 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 235 01:32:00.084 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933817 236 01:32:00.084 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 01:32:00.104 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 01:32:00.104 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 01:32:00.104 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933818, seq# expected = 1748933818 240 01:35:20.372 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 241 01:36:56.010 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933818 242 01:36:56.010 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 243 01:36:56.050 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 244 01:36:56.050 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 245 01:36:56.050 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933819, seq# expected = 1748933819 246 01:37:11.532 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933819 247 01:37:11.532 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 248 01:37:11.552 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 249 01:37:11.552 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 250 01:37:11.552 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933820, seq# expected = 1748933820 251 01:40:21.305 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 252 01:45:21.737 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 253 01:47:23.912 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933820 254 01:47:23.912 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 255 01:47:23.932 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 256 01:47:23.932 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 257 01:47:23.932 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933821, seq# expected = 1748933821 258 01:47:39.435 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933821 259 01:47:39.435 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 260 01:47:39.455 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 261 01:47:39.455 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 262 01:47:39.455 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933822, seq# expected = 1748933822 263 01:50:22.169 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 264 01:55:22.601 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 265 01:57:46.808 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933822 266 01:57:46.808 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 267 01:57:46.828 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 268 01:57:46.828 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 269 01:57:46.828 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933823, seq# expected = 1748933823 270 01:57:57.323 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933823 271 01:57:57.323 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 272 01:57:57.343 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 273 01:57:57.343 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 274 01:57:57.343 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933824, seq# expected = 1748933824 275 02:00:23.033 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 276 02:05:23.465 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 277 02:10:23.897 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 278 02:15:24.329 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 279 02:20:24.761 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 280 02:25:25.193 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 281 02:29:11.017 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933824 282 02:29:11.017 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 283 02:29:11.038 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 284 02:29:11.038 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 285 02:29:11.038 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933825, seq# expected = 1748933825 286 02:30:25.124 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 287 02:32:01.763 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933825 288 02:32:01.763 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 289 02:32:01.783 10/17/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 290 02:32:01.783 10/17/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 291 02:32:01.783 10/17/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1748933826, seq# expected = 1748933826 292 02:35:26.057 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 293 02:40:26.489 10/17/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1103, dst port 4005 294 02:44:04.803 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933826 295 02:44:04.803 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 02:44:09.810 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933827 297 02:44:09.810 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 298 02:44:14.817 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933828 299 02:44:14.817 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 300 02:44:19.824 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933829 301 02:44:19.824 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 302 02:44:24.831 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933830 303 02:44:24.831 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 304 02:44:29.839 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933831 305 02:44:29.839 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 306 02:44:34.846 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933832 307 02:44:34.846 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 308 02:44:39.853 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933833 309 02:44:39.853 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 02:44:44.860 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933834 311 02:44:44.860 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 312 02:44:49.867 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933835 313 02:44:49.867 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 314 02:44:54.875 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933836 315 02:44:54.875 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 316 02:44:59.882 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933837 317 02:44:59.882 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 318 02:45:00.383 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 319 02:45:00.383 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 320 02:45:00.383 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 321 02:45:01.384 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 322 02:45:01.384 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 323 02:45:02.385 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 324 02:45:02.385 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 325 02:45:02.886 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 326 02:45:02.886 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 327 02:45:03.387 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 328 02:45:04.388 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 329 02:45:04.388 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 330 02:45:04.388 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 331 02:45:04.388 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 332 02:45:04.889 10/17/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1748933838 333 02:45:04.889 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 334 02:45:05.390 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 335 02:45:05.390 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 336 02:45:05.390 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 337 02:45:05.390 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 338 02:45:07.393 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 339 02:45:07.393 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 340 02:45:07.393 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 341 02:45:07.393 10/17/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 342 02:45:09.396 10/17/06 Sev=Warning/3 CM/0xA310002C Adapter address changed from 192.168.1.2. Current address(es): 10.13.32.230. 343 02:45:09.396 10/17/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 344 02:45:09.396 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 345 02:45:09.396 10/17/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4B8B97C1 INBOUND SPI = AEB0D034) 346 02:45:09.396 10/17/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=2EAEE4B7 347 02:45:09.396 10/17/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=2A248C7137C06B90 R_Cookie=787A5B87B22DE5DB) reason = DEL_REASON_ADDRESS_CHANGE 348 02:45:09.396 10/17/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 349 02:45:09.396 10/17/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=2A248C7137C06B90 R_Cookie=787A5B87B22DE5DB) reason = DEL_REASON_ADDRESS_CHANGE 350 02:45:09.396 10/17/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 351 02:45:09.396 10/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 352 02:45:09.396 10/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 353 02:45:09.396 10/17/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1103 for TCP connection. 354 02:45:09.396 10/17/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 5:39:53 355 02:45:09.416 10/17/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 356 02:45:09.416 10/17/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 357 02:45:09.416 10/17/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 358 02:45:09.416 10/17/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 359 02:45:11.659 10/17/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 360 02:45:11.659 10/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 361 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x34d0b0ae 362 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x34d0b0ae 363 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc1978b4b 364 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc1978b4b 365 02:45:11.669 10/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1103, dst port 4005 366 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 367 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 368 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 369 02:45:11.669 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 370 02:45:40.166 10/17/06 Sev=Info/4 CM/0x63100002 Begin connection process 371 02:45:40.177 10/17/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 372 02:45:40.177 10/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 373 02:45:40.200 10/17/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1820 for TCP connection. 374 02:45:40.478 10/17/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 375 02:45:40.478 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 376 02:45:40.478 10/17/06 Sev=Info/6 IPSEC/0x6370002B Sent 74352 packets, 0 were fragmented. 377 02:45:40.478 10/17/06 Sev=Info/4 IPSEC/0x6370000D Key(s) deleted by Interface (10.13.32.230) 378 02:45:40.478 10/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1820, dst port 4005 379 02:45:45.494 10/17/06 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw3.emc.com" 380 02:45:45.494 10/17/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 381 02:45:45.594 10/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 382 02:45:45.594 10/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1820, dst port 4005 383 02:45:45.594 10/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1820, dst port 4005 384 02:45:51.067 10/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1820, dst port 4005 385 02:45:56.640 10/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1820, dst port 4005 386 02:46:01.656 10/17/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1820, dst port 4005 387 02:46:01.901 10/17/06 Sev=Info/4 CM/0x63100026 Abort connection attempt before TCP session up 388 02:46:01.901 10/17/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 389 02:46:01.901 10/17/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 390 02:46:01.901 10/17/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1820 for TCP connection. 391 02:46:02.214 10/17/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1820, dst port 4005 392 02:46:02.214 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 393 02:46:02.214 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 394 02:46:02.214 10/17/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 395 02:46:30.681 10/17/06 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 396 02:46:33.022 10/17/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys