EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 01:13:33.208 10/30/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 01:13:33.258 10/30/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 01:13:33.258 10/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 01:13:33.308 10/30/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3112 for TCP connection. 5 01:13:33.308 10/30/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 01:13:33.308 10/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 01:13:33.308 10/30/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3112, dst port 4005 8 01:13:34.200 10/30/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3112 9 01:13:34.200 10/30/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3112, dst port 4005 10 01:13:34.200 10/30/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 01:13:34.702 10/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 01:13:34.702 10/30/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 01:13:34.712 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 01:13:34.882 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 01:13:34.882 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 01:13:34.882 10/30/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 01:13:34.882 10/30/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 01:13:34.882 10/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 01:13:34.882 10/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 01:13:34.902 10/30/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 01:13:34.902 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 01:13:34.902 10/30/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 01:13:34.902 10/30/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 01:13:34.932 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 01:13:34.932 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 01:13:34.932 10/30/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 01:13:34.932 10/30/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=6ABA75D609FDBDE1 R_Cookie=6FFBCA23340E63A5) reason = DEL_REASON_LOAD_BALANCING 28 01:13:34.932 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 01:13:35.704 10/30/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=6ABA75D609FDBDE1 R_Cookie=6FFBCA23340E63A5) reason = DEL_REASON_LOAD_BALANCING 30 01:13:35.704 10/30/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 01:13:35.704 10/30/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 01:13:35.704 10/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 01:13:35.704 10/30/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 01:13:36.205 10/30/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3112, dst port 4005 35 01:13:36.205 10/30/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 3112, dst port 4005 36 01:13:36.205 10/30/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 3112 37 01:13:36.205 10/30/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 3112, dst port 4005 38 01:13:36.205 10/30/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 01:13:36.706 10/30/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 01:13:36.706 10/30/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 01:13:36.716 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 01:13:36.887 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 01:13:36.887 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 01:13:36.887 10/30/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 01:13:36.887 10/30/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 01:13:36.887 10/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 01:13:36.887 10/30/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 01:13:36.897 10/30/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 01:13:36.897 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 01:13:36.897 10/30/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 01:13:36.897 10/30/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 01:13:36.917 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 01:13:36.917 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 01:13:36.917 10/30/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 01:13:48.163 10/30/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 01:13:48.163 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 01:13:52.394 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 01:13:52.394 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 01:13:52.394 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 01:13:52.404 10/30/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 01:13:52.434 10/30/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 01:13:52.434 10/30/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 01:13:52.434 10/30/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 01:13:52.434 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 01:13:53.446 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.64 68 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 01:13:53.446 10/30/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 01:13:53.446 10/30/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 01:13:53.456 10/30/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.64, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 01:13:53.456 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 01:13:53.496 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 87 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 01:13:53.496 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 01:13:53.496 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B32FED17 OUTBOUND SPI = 0x74932F05 INBOUND SPI = 0x1A50985D) 92 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x74932F05 93 01:13:53.496 10/30/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1A50985D 94 01:13:54.087 10/30/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.64/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 01:13:54.157 10/30/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 01:13:54.197 10/30/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 01:13:54.307 10/30/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.2, 10.13.8.64. 98 01:13:54.307 10/30/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.64. Current address(es): 192.168.1.2, 10.13.8.64. 99 01:13:54.477 10/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 01:13:54.477 10/30/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 01:13:54.477 10/30/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 01:13:54.477 10/30/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x052f9374 into key list 103 01:13:54.477 10/30/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 01:13:54.477 10/30/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x5d98501a into key list 105 01:13:54.477 10/30/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.64 106 01:13:55.749 10/30/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x052f9374 for inbound key with SPI=0x5d98501a 107 01:18:37.654 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 108 01:23:38.086 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 109 01:25:54.282 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490108 110 01:25:54.282 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 111 01:25:54.312 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 112 01:25:54.312 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 113 01:25:54.312 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490109, seq# expected = 3874490109 114 01:28:38.518 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 115 01:33:38.950 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 116 01:37:30.784 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490109 117 01:37:30.784 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 118 01:37:30.814 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 119 01:37:30.814 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 120 01:37:30.814 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490110, seq# expected = 3874490110 121 01:38:38.882 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 122 01:40:07.008 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490110 123 01:40:07.008 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 124 01:40:12.016 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490111 125 01:40:12.016 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 126 01:40:12.066 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 127 01:40:12.066 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 128 01:40:12.066 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490112, seq# expected = 3874490112 129 01:41:57.677 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490112 130 01:41:57.677 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 131 01:41:57.708 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 132 01:41:57.708 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 133 01:41:57.708 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490113, seq# expected = 3874490113 134 01:43:39.324 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 135 01:44:38.429 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490113 136 01:44:38.429 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 137 01:44:38.449 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 138 01:44:38.449 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 139 01:44:38.449 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490114, seq# expected = 3874490114 140 01:46:19.073 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490114 141 01:46:19.073 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 142 01:46:19.103 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 143 01:46:19.103 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 144 01:46:19.103 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490115, seq# expected = 3874490115 145 01:46:29.588 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490115 146 01:46:29.588 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 147 01:46:29.609 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 148 01:46:29.609 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 149 01:46:29.609 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490116, seq# expected = 3874490116 150 01:46:45.111 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490116 151 01:46:45.111 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 152 01:46:45.131 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 153 01:46:45.131 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 154 01:46:45.131 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490117, seq# expected = 3874490117 155 01:48:40.296 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 156 01:51:36.259 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490117 157 01:51:36.259 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 158 01:51:36.279 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 159 01:51:36.279 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 160 01:51:36.279 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490118, seq# expected = 3874490118 161 01:52:16.818 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490118 162 01:52:16.818 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 163 01:52:16.838 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 164 01:52:16.838 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 165 01:52:16.838 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490119, seq# expected = 3874490119 166 01:53:39.937 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 167 01:56:49.770 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490119 168 01:56:49.770 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 169 01:56:49.790 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 170 01:56:49.790 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 171 01:56:49.790 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490120, seq# expected = 3874490120 172 01:57:00.285 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490120 173 01:57:00.285 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 174 01:57:00.305 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 175 01:57:00.305 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 176 01:57:00.305 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490121, seq# expected = 3874490121 177 01:57:41.124 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490121 178 01:57:41.124 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 179 01:57:41.154 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 180 01:57:41.154 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 181 01:57:41.154 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490122, seq# expected = 3874490122 182 01:58:40.429 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 183 02:02:19.244 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490122 184 02:02:19.244 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 185 02:02:19.274 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 186 02:02:19.274 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 187 02:02:19.274 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490123, seq# expected = 3874490123 188 02:03:40.881 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 189 02:05:41.074 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490123 190 02:05:41.074 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 191 02:05:41.124 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 192 02:05:41.124 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 193 02:05:41.124 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490124, seq# expected = 3874490124 194 02:06:27.140 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490124 195 02:06:27.140 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 196 02:06:27.160 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 197 02:06:27.160 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 198 02:06:27.160 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490125, seq# expected = 3874490125 199 02:07:27.728 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490125 200 02:07:27.728 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 201 02:07:27.748 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 202 02:07:27.748 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 203 02:07:27.748 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490126, seq# expected = 3874490126 204 02:08:03.279 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490126 205 02:08:03.279 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 02:08:03.299 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 02:08:03.299 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 02:08:03.299 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490127, seq# expected = 3874490127 209 02:08:41.333 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 210 02:09:43.923 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490127 211 02:09:43.923 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 212 02:09:43.943 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 213 02:09:43.943 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 214 02:09:43.943 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490128, seq# expected = 3874490128 215 02:13:42.326 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 216 02:14:00.352 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490128 217 02:14:00.352 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 02:14:00.372 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 02:14:00.372 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 02:14:00.372 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490129, seq# expected = 3874490129 221 02:16:21.054 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490129 222 02:16:21.054 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 02:16:21.085 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 02:16:21.085 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 02:16:21.085 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490130, seq# expected = 3874490130 226 02:18:42.758 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 227 02:21:27.495 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490130 228 02:21:27.495 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 229 02:21:27.525 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 230 02:21:27.525 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 231 02:21:27.525 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490131, seq# expected = 3874490131 232 02:23:42.880 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 233 02:28:00.250 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490131 234 02:28:00.250 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 235 02:28:00.280 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 236 02:28:00.280 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 237 02:28:00.280 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490132, seq# expected = 3874490132 238 02:28:42.821 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 239 02:33:43.744 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 240 02:37:54.685 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490132 241 02:37:54.685 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 242 02:37:54.715 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 243 02:37:54.715 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 244 02:37:54.715 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490133, seq# expected = 3874490133 245 02:38:25.219 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490133 246 02:38:25.219 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 247 02:38:25.249 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 248 02:38:25.249 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 249 02:38:25.249 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490134, seq# expected = 3874490134 250 02:38:41.242 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490134 251 02:38:41.242 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 02:38:41.262 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 253 02:38:41.272 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 254 02:38:41.272 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490135, seq# expected = 3874490135 255 02:38:43.755 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 256 02:43:44.187 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 257 02:44:40.268 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490135 258 02:44:40.268 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 02:44:40.298 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 02:44:40.298 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 02:44:40.298 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490136, seq# expected = 3874490136 262 02:48:44.629 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 263 02:53:45.061 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 264 02:54:00.083 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490136 265 02:54:00.083 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 266 02:54:00.103 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 267 02:54:00.103 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 268 02:54:00.103 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490137, seq# expected = 3874490137 269 02:57:01.844 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490137 270 02:57:01.844 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 271 02:57:01.874 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 272 02:57:01.874 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 273 02:57:01.874 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490138, seq# expected = 3874490138 274 02:58:44.992 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 275 02:59:14.034 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490138 276 02:59:14.034 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 277 02:59:19.041 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490139 278 02:59:19.041 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 02:59:19.071 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 02:59:19.071 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 02:59:19.071 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490140, seq# expected = 3874490140 282 02:59:29.557 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490140 283 02:59:29.557 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 284 02:59:34.564 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490141 285 02:59:34.564 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 286 02:59:34.594 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 287 02:59:34.594 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 288 02:59:34.594 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490142, seq# expected = 3874490142 289 03:03:45.935 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 290 03:08:44.885 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490142 291 03:08:44.885 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 292 03:08:44.915 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 293 03:08:44.915 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 294 03:08:44.915 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490143, seq# expected = 3874490143 295 03:08:46.387 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 296 03:09:45.472 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490143 297 03:09:45.472 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 298 03:09:45.502 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 299 03:09:45.502 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 300 03:09:45.502 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490144, seq# expected = 3874490144 301 03:10:01.495 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490144 302 03:10:01.495 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 303 03:10:01.525 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 304 03:10:01.525 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 305 03:10:01.525 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490145, seq# expected = 3874490145 306 03:13:46.819 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 307 03:16:14.532 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490145 308 03:16:14.532 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 309 03:16:14.612 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 310 03:16:14.612 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 311 03:16:14.612 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490146, seq# expected = 3874490146 312 03:20:02.860 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490146 313 03:20:02.860 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 314 03:20:02.930 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 315 03:20:02.930 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 316 03:20:02.930 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490147, seq# expected = 3874490147 317 03:20:43.919 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490147 318 03:20:43.919 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 319 03:20:43.949 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 320 03:20:43.949 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 321 03:20:43.949 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490148, seq# expected = 3874490148 322 03:23:47.683 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 323 03:28:48.115 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 324 03:30:34.268 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490148 325 03:30:34.268 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 326 03:30:34.288 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 327 03:30:34.288 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 328 03:30:34.288 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490149, seq# expected = 3874490149 329 03:30:44.783 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490149 330 03:30:44.783 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 331 03:30:44.803 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 332 03:30:44.803 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 333 03:30:44.803 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490150, seq# expected = 3874490150 334 03:32:48.461 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490150 335 03:32:48.461 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 336 03:32:53.468 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490151 337 03:32:53.468 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 338 03:32:53.498 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 339 03:32:53.498 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 340 03:32:53.498 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490152, seq# expected = 3874490152 341 03:33:48.047 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 342 03:38:48.999 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 343 03:40:44.175 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490152 344 03:40:44.175 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 345 03:40:44.205 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 346 03:40:44.205 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 347 03:40:44.205 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490153, seq# expected = 3874490153 348 03:40:54.700 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490153 349 03:40:54.700 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 350 03:40:54.720 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 351 03:40:54.720 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 352 03:40:54.720 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490154, seq# expected = 3874490154 353 03:43:49.441 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 354 03:44:46.523 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490154 355 03:44:46.523 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 356 03:44:46.553 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 357 03:44:46.553 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 358 03:44:46.553 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490155, seq# expected = 3874490155 359 03:51:19.629 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490155 360 03:51:19.629 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 361 03:51:19.659 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 362 03:51:19.659 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 363 03:51:19.659 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490156, seq# expected = 3874490156 364 03:51:40.158 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490156 365 03:51:40.158 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 366 03:51:40.188 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 367 03:51:40.188 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 368 03:51:40.188 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490157, seq# expected = 3874490157 369 03:53:50.355 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 370 03:53:56.364 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490157 371 03:53:56.364 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 372 03:53:56.394 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 373 03:53:56.394 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 374 03:53:56.394 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490158, seq# expected = 3874490158 375 03:56:47.610 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490158 376 03:56:47.610 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 377 03:56:47.680 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 378 03:56:47.680 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 379 03:56:47.680 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490159, seq# expected = 3874490159 380 03:57:33.176 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490159 381 03:57:33.176 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 382 03:57:33.196 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 383 03:57:33.196 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 384 03:57:33.196 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490160, seq# expected = 3874490160 385 03:58:50.307 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 386 04:01:19.010 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490160 387 04:01:19.010 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 388 04:01:19.081 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 389 04:01:19.081 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 390 04:01:19.081 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490161, seq# expected = 3874490161 391 04:01:44.547 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490161 392 04:01:44.547 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 393 04:01:44.577 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 394 04:01:44.577 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 395 04:01:44.577 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490162, seq# expected = 3874490162 396 04:01:55.062 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490162 397 04:01:55.062 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 398 04:02:00.070 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490163 399 04:02:00.070 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 400 04:02:00.100 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 401 04:02:00.100 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 402 04:02:00.100 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490164, seq# expected = 3874490164 403 04:03:50.749 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 404 04:08:48.196 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490164 405 04:08:48.196 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 406 04:08:48.226 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 407 04:08:48.226 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 408 04:08:48.226 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490165, seq# expected = 3874490165 409 04:08:51.201 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 410 04:12:24.007 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490165 411 04:12:24.007 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 412 04:12:24.047 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 413 04:12:24.047 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 414 04:12:24.047 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490166, seq# expected = 3874490166 415 04:13:51.643 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 416 04:16:20.367 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490166 417 04:16:20.367 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 418 04:16:20.397 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 419 04:16:20.397 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 420 04:16:20.397 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490167, seq# expected = 3874490167 421 04:18:52.095 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 422 04:20:47.250 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490167 423 04:20:47.250 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 424 04:20:47.280 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 425 04:20:47.280 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 426 04:20:47.280 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490168, seq# expected = 3874490168 427 04:22:42.917 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490168 428 04:22:42.917 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 429 04:22:42.947 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 430 04:22:42.947 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 431 04:22:42.947 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490169, seq# expected = 3874490169 432 04:22:53.432 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490169 433 04:22:53.432 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 434 04:22:53.452 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 435 04:22:53.452 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 436 04:22:53.452 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490170, seq# expected = 3874490170 437 04:23:52.527 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 438 04:24:24.062 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490170 439 04:24:24.062 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 440 04:24:24.092 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 441 04:24:24.092 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 442 04:24:24.092 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490171, seq# expected = 3874490171 443 04:28:53.970 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 444 04:31:22.183 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490171 445 04:31:22.183 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 446 04:31:22.213 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 447 04:31:22.213 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 448 04:31:22.213 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490172, seq# expected = 3874490172 449 04:32:38.303 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490172 450 04:32:38.303 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 451 04:32:38.333 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 452 04:32:38.333 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 453 04:32:38.333 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490173, seq# expected = 3874490173 454 04:32:48.818 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490173 455 04:32:48.818 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 456 04:32:48.848 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 457 04:32:48.848 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 458 04:32:48.848 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490174, seq# expected = 3874490174 459 04:33:19.362 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490174 460 04:33:19.362 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 461 04:33:19.392 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 462 04:33:19.392 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 463 04:33:19.392 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490175, seq# expected = 3874490175 464 04:33:53.411 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 465 04:38:53.873 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 466 04:43:22.749 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490175 467 04:43:22.749 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 468 04:43:22.790 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 469 04:43:22.790 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 470 04:43:22.790 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490176, seq# expected = 3874490176 471 04:43:43.279 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490176 472 04:43:43.279 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 473 04:43:43.309 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 474 04:43:43.309 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 475 04:43:43.309 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490177, seq# expected = 3874490177 476 04:43:54.295 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 477 04:44:46.380 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490177 478 04:44:46.380 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 04:44:46.400 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 480 04:44:46.400 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 481 04:44:46.400 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490178, seq# expected = 3874490178 482 04:46:22.007 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490178 483 04:46:22.007 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 484 04:46:22.037 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 485 04:46:22.037 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 486 04:46:22.037 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490179, seq# expected = 3874490179 487 04:48:55.228 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 488 04:53:48.159 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490179 489 04:53:48.159 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 490 04:53:48.189 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 491 04:53:48.189 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 492 04:53:48.189 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490180, seq# expected = 3874490180 493 04:53:55.169 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 494 04:53:58.674 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490180 495 04:53:58.674 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 496 04:53:58.704 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 497 04:53:58.704 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 498 04:53:58.704 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490181, seq# expected = 3874490181 499 04:56:44.923 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490181 500 04:56:44.923 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 501 04:56:44.963 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 502 04:56:44.963 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 503 04:56:44.963 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490182, seq# expected = 3874490182 504 04:57:20.474 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490182 505 04:57:20.474 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 506 04:57:20.494 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 507 04:57:20.494 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 508 04:57:20.494 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490183, seq# expected = 3874490183 509 04:58:55.621 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 510 05:01:21.330 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490183 511 05:01:21.330 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 512 05:01:21.370 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 513 05:01:21.370 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 514 05:01:21.370 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490184, seq# expected = 3874490184 515 05:08:49.975 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490184 516 05:08:49.975 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 517 05:08:50.046 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 518 05:08:50.046 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 519 05:08:50.046 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490185, seq# expected = 3874490185 520 05:08:56.485 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 521 05:13:57.418 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 522 05:14:45.487 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490185 523 05:14:45.487 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 524 05:14:45.517 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 525 05:14:45.517 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 526 05:14:45.517 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490186, seq# expected = 3874490186 527 05:14:56.002 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490186 528 05:14:56.002 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 529 05:14:56.042 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 530 05:14:56.042 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 531 05:14:56.042 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490187, seq# expected = 3874490187 532 05:16:22.126 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490187 533 05:16:22.126 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 534 05:16:22.156 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 535 05:16:22.156 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 536 05:16:22.156 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490188, seq# expected = 3874490188 537 05:16:32.641 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490188 538 05:16:32.641 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 539 05:16:32.661 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 540 05:16:32.661 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 541 05:16:32.661 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490189, seq# expected = 3874490189 542 05:16:48.664 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490189 543 05:16:48.674 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 544 05:16:48.694 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 545 05:16:48.694 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 546 05:16:48.694 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490190, seq# expected = 3874490190 547 05:18:57.860 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 548 05:20:45.514 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490190 549 05:20:45.514 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 550 05:20:45.544 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 551 05:20:45.544 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 552 05:20:45.544 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490191, seq# expected = 3874490191 553 05:23:58.792 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 554 05:25:22.913 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490191 555 05:25:22.913 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 556 05:25:22.943 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 557 05:25:22.943 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 558 05:25:22.943 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490192, seq# expected = 3874490192 559 05:28:58.724 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 560 05:31:19.927 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490192 561 05:31:19.927 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 562 05:31:19.957 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 563 05:31:19.957 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 564 05:31:19.957 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490193, seq# expected = 3874490193 565 05:32:46.050 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490193 566 05:32:46.050 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 567 05:32:46.081 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 568 05:32:46.081 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 569 05:32:46.081 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490194, seq# expected = 3874490194 570 05:33:58.655 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 571 05:35:27.282 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490194 572 05:35:27.282 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 573 05:35:27.312 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 574 05:35:27.312 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 575 05:35:27.312 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490195, seq# expected = 3874490195 576 05:35:47.812 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490195 577 05:35:47.812 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 578 05:35:47.832 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 579 05:35:47.832 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 580 05:35:47.832 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490196, seq# expected = 3874490196 581 05:38:59.598 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 582 05:44:00.030 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 583 05:44:47.598 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490196 584 05:44:47.598 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 585 05:44:47.628 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 586 05:44:47.628 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 587 05:44:47.628 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490197, seq# expected = 3874490197 588 05:45:53.703 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490197 589 05:45:53.703 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 590 05:45:53.723 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 591 05:45:53.723 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 592 05:45:53.723 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490198, seq# expected = 3874490198 593 05:46:20.241 10/30/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3874490198 594 05:46:20.241 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 595 05:46:20.261 10/30/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 596 05:46:20.261 10/30/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 597 05:46:20.261 10/30/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3874490199, seq# expected = 3874490199 598 05:49:00.462 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 599 05:54:00.914 10/30/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 3112, dst port 4005 600 09:01:02.932 10/30/06 Sev=Warning/2 CVPND/0xA3400011 Error -16 sending packet. Dst Addr: 0x89457310, Src Addr: 0x00000000 (DRVIFACE:2529). 601 09:01:02.932 10/30/06 Sev=Info/4 CM/0x6310002C Unable to send a TCP heartbeat 602 09:01:06.797 10/30/06 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x052f9374 is about to expire, requesting a new one 603 09:01:06.797 10/30/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 604 09:01:06.797 10/30/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.64, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 605 09:01:06.797 10/30/06 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=264AD486) Initiator = ID=10.13.8.64 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 606 09:01:06.797 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 607 09:01:08.450 10/30/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 608 09:01:08.450 10/30/06 Sev=Warning/2 IPSEC/0xE3700003 Function CniInjectSend() failed with an error code of 0xa4510009 (IPSecDrvCB:824) 609 09:01:08.460 10/30/06 Sev=Warning/3 CM/0xA310002C Adapter address changed from 192.168.1.2. Current address(es): 10.13.8.64. 610 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 611 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 612 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=264AD486 613 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 614 09:01:08.460 10/30/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 74932F05 INBOUND SPI = 1A50985D) 615 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B32FED17 616 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7FBFF36560369686 R_Cookie=1767C92DBF9B11E0) reason = DEL_REASON_ADDRESS_CHANGE 617 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 618 09:01:08.460 10/30/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7FBFF36560369686 R_Cookie=1767C92DBF9B11E0) reason = DEL_REASON_ADDRESS_CHANGE 619 09:01:08.460 10/30/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 620 09:01:08.460 10/30/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 621 09:01:09.641 10/30/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 622 09:01:09.641 10/30/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 3112 for TCP connection. 623 09:01:09.641 10/30/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 7:47:15 624 09:01:11.214 10/30/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 625 09:01:11.214 10/30/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 626 09:01:11.214 10/30/06 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 627 09:01:11.214 10/30/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 628 09:01:22.950 10/30/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 629 09:01:23.181 10/30/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 630 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x5d98501a 631 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x5d98501a 632 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x052f9374 633 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x052f9374 634 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 635 09:01:23.181 10/30/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 3112, dst port 4005 636 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x00000000 637 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 638 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 639 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 640 09:01:23.181 10/30/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 641 09:01:23.181 10/30/06 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511)