EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 02:04:22.548 11/06/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 02:04:22.681 11/06/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 02:04:22.681 11/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 02:04:22.701 11/06/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1295 for TCP connection. 5 02:04:22.865 11/06/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 02:04:22.865 11/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 02:04:22.865 11/06/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1295, dst port 4005 8 02:04:22.865 11/06/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1295 9 02:04:22.865 11/06/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1295, dst port 4005 10 02:04:22.865 11/06/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 02:04:23.377 11/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 02:04:23.388 11/06/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 02:04:23.418 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 02:04:23.593 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 02:04:23.593 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 02:04:23.593 11/06/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 02:04:23.593 11/06/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 02:04:23.593 11/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 02:04:23.593 11/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 02:04:23.603 11/06/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 02:04:23.603 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 02:04:23.603 11/06/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 02:04:23.603 11/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 02:04:23.634 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 02:04:23.634 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 02:04:23.634 11/06/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 02:04:23.634 11/06/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E3A0B28E50BD0160 R_Cookie=ECE8E027D3ACA0AF) reason = DEL_REASON_LOAD_BALANCING 28 02:04:23.634 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 02:04:24.402 11/06/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E3A0B28E50BD0160 R_Cookie=ECE8E027D3ACA0AF) reason = DEL_REASON_LOAD_BALANCING 30 02:04:24.402 11/06/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 02:04:24.402 11/06/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 02:04:24.402 11/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 02:04:24.412 11/06/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 02:04:24.914 11/06/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1295, dst port 4005 35 02:04:24.914 11/06/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1295, dst port 4005 36 02:04:24.914 11/06/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1295 37 02:04:24.914 11/06/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1295, dst port 4005 38 02:04:24.914 11/06/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 02:04:25.427 11/06/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 02:04:25.437 11/06/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 02:04:25.447 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 02:04:25.621 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 02:04:25.621 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 02:04:25.621 11/06/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 02:04:25.621 11/06/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 02:04:25.621 11/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 02:04:25.621 11/06/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 02:04:25.632 11/06/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 02:04:25.632 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 02:04:25.632 11/06/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 02:04:25.632 11/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 02:04:25.652 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 02:04:25.652 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 02:04:25.652 11/06/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 02:04:42.323 11/06/06 Sev=Info/4 CM/0x63100017 xAuth application returned 56 02:04:42.323 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 02:04:45.151 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 02:04:45.151 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 02:04:45.151 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 02:04:45.151 11/06/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 02:04:45.202 11/06/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 02:04:45.202 11/06/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 02:04:45.202 11/06/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 02:04:45.202 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 02:04:46.094 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.20 68 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 02:04:46.094 11/06/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 02:04:46.094 11/06/06 Sev=Info/4 CM/0x63100019 Mode Config data received 81 02:04:46.104 11/06/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.20, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 02:04:46.104 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 02:04:46.145 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 21 seconds, setting expiry to 86379 seconds from now 87 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 02:04:46.145 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 02:04:46.145 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=5299C2D6 OUTBOUND SPI = 0x717AA775 INBOUND SPI = 0xDB5F94A5) 92 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x717AA775 93 02:04:46.145 11/06/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xDB5F94A5 94 02:04:47.813 11/06/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.20/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 02:04:47.933 11/06/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 02:04:48.003 11/06/06 Sev=Info/4 CM/0x6310001A One secure connection established 97 02:04:48.033 11/06/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.2, 10.13.32.20. 98 02:04:48.043 11/06/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.20. Current address(es): 192.168.1.2, 10.13.32.20. 99 02:04:48.213 11/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 02:04:48.213 11/06/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 02:04:48.213 11/06/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 02:04:48.213 11/06/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x75a77a71 into key list 103 02:04:48.213 11/06/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 02:04:48.213 11/06/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa5945fdb into key list 105 02:04:48.213 11/06/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.20 106 02:04:53.471 11/06/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x75a77a71 for inbound key with SPI=0xa5945fdb 107 02:09:26.373 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 108 02:12:21.124 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354758 109 02:12:21.124 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 110 02:12:21.154 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 111 02:12:21.154 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 112 02:12:21.154 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354759, seq# expected = 2714354759 113 02:14:06.776 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354759 114 02:14:06.776 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 115 02:14:06.816 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 116 02:14:06.816 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 117 02:14:06.816 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354760, seq# expected = 2714354760 118 02:14:26.304 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 119 02:18:32.659 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354760 120 02:18:32.659 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 121 02:18:32.689 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 122 02:18:32.689 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 123 02:18:32.689 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354761, seq# expected = 2714354761 124 02:18:43.174 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354761 125 02:18:43.174 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 126 02:18:43.204 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 127 02:18:43.204 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 128 02:18:43.204 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354762, seq# expected = 2714354762 129 02:19:26.736 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 130 02:21:03.876 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354762 131 02:21:03.876 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 132 02:21:03.906 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 133 02:21:03.906 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 134 02:21:03.906 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354763, seq# expected = 2714354763 135 02:24:27.269 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 136 02:25:06.335 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354763 137 02:25:06.335 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 138 02:25:06.365 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 139 02:25:06.365 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 140 02:25:06.365 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354764, seq# expected = 2714354764 141 02:25:21.857 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354764 142 02:25:21.857 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 143 02:25:21.887 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 144 02:25:21.887 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 145 02:25:21.887 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354765, seq# expected = 2714354765 146 02:25:32.372 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354765 147 02:25:32.372 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 148 02:25:32.402 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 149 02:25:32.402 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 150 02:25:32.402 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354766, seq# expected = 2714354766 151 02:27:23.552 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354766 152 02:27:23.552 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 153 02:27:23.582 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 154 02:27:23.582 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 155 02:27:23.582 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354767, seq# expected = 2714354767 156 02:29:27.761 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 157 02:30:09.841 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354767 158 02:30:09.841 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 159 02:30:09.861 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 160 02:30:09.861 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 161 02:30:09.871 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354768, seq# expected = 2714354768 162 02:30:45.392 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354768 163 02:30:45.392 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 164 02:30:45.422 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 165 02:30:45.422 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 166 02:30:45.422 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354769, seq# expected = 2714354769 167 02:32:46.577 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354769 168 02:32:46.577 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 169 02:32:51.584 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354770 170 02:32:51.584 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 171 02:32:51.614 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 172 02:32:51.614 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 173 02:32:51.614 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354771, seq# expected = 2714354771 174 02:34:27.722 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 175 02:35:27.328 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354771 176 02:35:27.328 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 177 02:35:27.358 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 178 02:35:27.358 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 179 02:35:27.358 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354772, seq# expected = 2714354772 180 02:35:47.867 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354772 181 02:35:47.867 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 182 02:35:47.897 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 183 02:35:47.897 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 184 02:35:47.897 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354773, seq# expected = 2714354773 185 02:36:48.464 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354773 186 02:36:48.464 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 187 02:36:48.494 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 188 02:36:48.494 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 189 02:36:48.494 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354774, seq# expected = 2714354774 190 02:37:24.015 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354774 191 02:37:24.015 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 192 02:37:24.046 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 193 02:37:24.046 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 194 02:37:24.046 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354775, seq# expected = 2714354775 195 02:39:28.705 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 196 02:44:28.736 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 197 02:45:06.310 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354775 198 02:45:06.310 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 199 02:45:06.330 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 200 02:45:06.330 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 201 02:45:06.330 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354776, seq# expected = 2714354776 202 02:45:26.840 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354776 203 02:45:26.840 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 204 02:45:26.870 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 205 02:45:26.870 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 206 02:45:26.870 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354777, seq# expected = 2714354777 207 02:45:37.355 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354777 208 02:45:37.355 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 209 02:45:37.385 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 210 02:45:37.385 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 211 02:45:37.385 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354778, seq# expected = 2714354778 212 02:49:28.748 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 213 02:49:43.779 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354778 214 02:49:43.779 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 215 02:49:43.809 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 216 02:49:43.809 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 217 02:49:43.809 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354779, seq# expected = 2714354779 218 02:53:29.684 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354779 219 02:53:29.684 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 220 02:53:29.714 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 221 02:53:29.714 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 222 02:53:29.714 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354780, seq# expected = 2714354780 223 02:54:28.278 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 224 02:56:05.428 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354780 225 02:56:05.428 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 226 02:56:05.458 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 227 02:56:05.458 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 228 02:56:05.458 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354781, seq# expected = 2714354781 229 02:57:36.068 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354781 230 02:57:36.068 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 231 02:57:36.098 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 232 02:57:36.098 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 233 02:57:36.098 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354782, seq# expected = 2714354782 234 02:59:28.770 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 235 03:00:21.847 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354782 236 03:00:21.847 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 03:00:21.877 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 03:00:21.877 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 03:00:21.877 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354783, seq# expected = 2714354783 240 03:01:07.422 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354783 241 03:01:07.422 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 242 03:01:07.452 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 243 03:01:07.452 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 244 03:01:07.452 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354784, seq# expected = 2714354784 245 03:04:04.287 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354784 246 03:04:04.287 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 03:04:04.317 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 03:04:04.317 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 03:04:04.317 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354785, seq# expected = 2714354785 250 03:04:28.822 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 251 03:06:20.502 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354785 252 03:06:20.502 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 253 03:06:20.532 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 03:06:20.532 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 255 03:06:20.532 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354786, seq# expected = 2714354786 256 03:09:16.816 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354786 257 03:09:16.816 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 258 03:09:16.906 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 259 03:09:16.906 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 260 03:09:16.906 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354787, seq# expected = 2714354787 261 03:09:28.843 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 262 03:09:47.370 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354787 263 03:09:47.370 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 264 03:09:47.400 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 265 03:09:47.400 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 266 03:09:47.400 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354788, seq# expected = 2714354788 267 03:10:33.466 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354788 268 03:10:33.466 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 269 03:10:33.496 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 270 03:10:33.496 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 271 03:10:33.496 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354789, seq# expected = 2714354789 272 03:11:09.017 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354789 273 03:11:09.017 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 274 03:11:09.057 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 275 03:11:09.057 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 276 03:11:09.057 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354790, seq# expected = 2714354790 277 03:13:30.250 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354790 278 03:13:30.250 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 279 03:13:30.280 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 280 03:13:30.290 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 281 03:13:30.290 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354791, seq# expected = 2714354791 282 03:14:29.335 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 283 03:14:35.845 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354791 284 03:14:35.845 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 285 03:14:35.875 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 286 03:14:35.875 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 287 03:14:35.875 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354792, seq# expected = 2714354792 288 03:19:29.837 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 289 03:21:08.990 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354792 290 03:21:08.990 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 291 03:21:09.010 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 292 03:21:09.010 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 293 03:21:09.010 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354793, seq# expected = 2714354793 294 03:21:19.505 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354793 295 03:21:19.505 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 03:21:19.545 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 297 03:21:19.545 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 298 03:21:19.545 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354794, seq# expected = 2714354794 299 03:22:20.092 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354794 300 03:22:20.092 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 301 03:22:20.122 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 302 03:22:20.122 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 303 03:22:20.122 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354795, seq# expected = 2714354795 304 03:24:30.309 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 305 03:34:31.214 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 306 03:39:31.656 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 307 03:44:32.088 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 308 03:49:24.508 11/06/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2714354795 309 03:49:24.508 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 03:49:24.538 11/06/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 311 03:49:24.538 11/06/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 312 03:49:24.538 11/06/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2714354796, seq# expected = 2714354796 313 03:49:32.019 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 314 03:54:32.962 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 315 03:59:33.394 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 316 04:04:33.826 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 317 04:09:34.258 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 318 04:14:34.690 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 319 04:19:35.132 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 320 04:24:35.564 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 321 04:29:35.996 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 322 04:34:36.428 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 323 04:39:36.880 11/06/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1295, dst port 4005 324 04:42:26.173 11/06/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 325 04:42:26.173 11/06/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 326 04:42:26.173 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 327 04:42:26.173 11/06/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 717AA775 INBOUND SPI = DB5F94A5) 328 04:42:26.173 11/06/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=5299C2D6 329 04:42:26.173 11/06/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=79FFBA5820C646D2 R_Cookie=EB6F349A41115DDA) reason = DEL_REASON_RESET_SADB 330 04:42:26.173 11/06/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 331 04:42:26.173 11/06/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=79FFBA5820C646D2 R_Cookie=EB6F349A41115DDA) reason = DEL_REASON_RESET_SADB 332 04:42:26.173 11/06/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 333 04:42:26.173 11/06/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 334 04:42:26.173 11/06/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 335 04:42:26.173 11/06/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1295 for TCP connection. 336 04:42:26.173 11/06/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 2:37:38 337 04:42:26.213 11/06/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 338 04:42:27.765 11/06/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 339 04:42:27.765 11/06/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 340 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa5945fdb 341 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa5945fdb 342 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x75a77a71 343 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x75a77a71 344 04:42:27.765 11/06/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1295, dst port 4005 345 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 346 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 347 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 348 04:42:27.765 11/06/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys