EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 03:25:50.773 11/07/06 Sev=Info/4 CM/0x63100002 Begin connection process 2 03:25:50.783 11/07/06 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 03:25:50.783 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 03:25:50.804 11/07/06 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1135 for TCP connection. 5 03:25:50.855 11/07/06 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 03:25:50.855 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 03:25:50.855 11/07/06 Sev=Info/4 IPSEC/0x6370000D Key(s) deleted by Interface (169.254.170.37) 8 03:25:50.855 11/07/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1135, dst port 4005 9 03:25:50.855 11/07/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1135 10 03:25:50.855 11/07/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1135, dst port 4005 11 03:25:50.855 11/07/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 03:25:51.366 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 03:25:51.386 11/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 03:25:51.448 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 03:25:51.632 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 03:25:51.632 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 03:25:51.632 11/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 03:25:51.632 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 03:25:51.632 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 03:25:51.632 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 03:25:51.662 11/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 03:25:51.662 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 03:25:51.662 11/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 03:25:51.662 11/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 03:25:51.693 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 03:25:51.693 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 03:25:51.693 11/07/06 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 03:25:51.693 11/07/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=FEC6C3A90D5F0663 R_Cookie=D44E9FDD4D6A8A39) reason = DEL_REASON_LOAD_BALANCING 29 03:25:51.693 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 03:25:52.388 11/07/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=FEC6C3A90D5F0663 R_Cookie=D44E9FDD4D6A8A39) reason = DEL_REASON_LOAD_BALANCING 31 03:25:52.388 11/07/06 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 03:25:52.388 11/07/06 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 03:25:52.388 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 03:25:52.398 11/07/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 03:25:52.899 11/07/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1135, dst port 4005 36 03:25:52.899 11/07/06 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1135, dst port 4005 37 03:25:52.899 11/07/06 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1135 38 03:25:52.899 11/07/06 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1135, dst port 4005 39 03:25:52.899 11/07/06 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 40 03:25:53.410 11/07/06 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 41 03:25:53.421 11/07/06 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 42 03:25:53.431 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 43 03:25:53.594 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 44 03:25:53.594 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 45 03:25:53.594 11/07/06 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 03:25:53.594 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 03:25:53.594 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 03:25:53.594 11/07/06 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 03:25:53.605 11/07/06 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 03:25:53.605 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 51 03:25:53.605 11/07/06 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 03:25:53.605 11/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 03:25:53.635 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 54 03:25:53.635 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 55 03:25:53.635 11/07/06 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 03:26:01.558 11/07/06 Sev=Info/4 CM/0x63100017 xAuth application returned 57 03:26:01.558 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 58 03:26:04.369 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 59 03:26:04.369 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 60 03:26:04.369 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 61 03:26:04.369 11/07/06 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 62 03:26:04.410 11/07/06 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 63 03:26:04.410 11/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 64 03:26:04.410 11/07/06 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 65 03:26:04.410 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 66 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 67 03:26:05.463 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 68 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.69 69 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 70 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 71 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 72 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 73 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 74 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 75 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 76 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 77 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 78 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 79 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 80 03:26:05.463 11/07/06 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 81 03:26:05.463 11/07/06 Sev=Info/4 CM/0x63100019 Mode Config data received 82 03:26:05.473 11/07/06 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.69, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 83 03:26:05.473 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 84 03:26:05.504 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 85 03:26:05.514 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 86 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 87 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 12 seconds, setting expiry to 86388 seconds from now 88 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 89 03:26:05.514 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 90 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 91 03:26:05.514 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 92 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=8B9A3AC8 OUTBOUND SPI = 0x03D55F4B INBOUND SPI = 0x4F04C98A) 93 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x03D55F4B 94 03:26:05.514 11/07/06 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x4F04C98A 95 03:26:07.893 11/07/06 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.69/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 96 03:26:07.943 11/07/06 Sev=Warning/2 CVPND/0xE3400013 AddRoute failed to add a route: code 87 Destination 255.255.255.255 Netmask 255.255.255.255 Gateway 192.168.1.1 Interface 192.168.1.140 97 03:26:07.943 11/07/06 Sev=Warning/3 CM/0xA3100023 Failed to add route to the dhcp server. 98 03:26:07.953 11/07/06 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 99 03:26:08.013 11/07/06 Sev=Info/4 CM/0x6310001A One secure connection established 100 03:26:08.083 11/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.140. Current address(es): 192.168.1.140, 192.168.1.2, 10.13.32.69. 101 03:26:08.093 11/07/06 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.69. Current address(es): 192.168.1.140, 192.168.1.2, 10.13.32.69. 102 03:26:08.303 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 103 03:26:08.303 11/07/06 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 104 03:26:08.303 11/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 105 03:26:08.303 11/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4b5fd503 into key list 106 03:26:08.303 11/07/06 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 107 03:26:08.303 11/07/06 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8ac9044f into key list 108 03:26:08.303 11/07/06 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.69 109 03:26:10.727 11/07/06 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4b5fd503 for inbound key with SPI=0x8ac9044f 110 03:29:24.506 11/07/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 111 03:29:24.506 11/07/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 112 03:29:24.506 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 113 03:30:46.624 11/07/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 114 03:30:53.634 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 115 03:31:34.192 11/07/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 116 03:31:34.192 11/07/06 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 117 03:31:34.192 11/07/06 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 118 03:32:20.258 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001004 119 03:32:20.258 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 120 03:32:20.298 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 121 03:32:20.298 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 122 03:32:20.298 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001005, seq# expected = 1158001005 123 03:33:40.874 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001005 124 03:33:40.874 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 125 03:33:40.904 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 126 03:33:40.904 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 127 03:33:40.904 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001006, seq# expected = 1158001006 128 03:35:54.566 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 129 03:38:57.329 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001006 130 03:38:57.329 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 131 03:38:57.389 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 132 03:38:57.389 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 133 03:38:57.389 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001007, seq# expected = 1158001007 134 03:39:17.859 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001007 135 03:39:17.859 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 136 03:39:17.889 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 137 03:39:17.889 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 138 03:39:17.889 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001008, seq# expected = 1158001008 139 03:39:33.381 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001008 140 03:39:33.381 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 03:39:33.411 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 03:39:33.411 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 03:39:33.411 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001009, seq# expected = 1158001009 144 03:40:54.498 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 145 03:45:55.430 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 146 03:48:39.677 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001009 147 03:48:39.677 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 148 03:48:39.707 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 149 03:48:39.707 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 150 03:48:39.707 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001010, seq# expected = 1158001010 151 03:49:50.278 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001010 152 03:49:50.278 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 153 03:49:50.308 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 154 03:49:50.308 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 155 03:49:50.308 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001011, seq# expected = 1158001011 156 03:50:00.803 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001011 157 03:50:00.803 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 158 03:50:00.833 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 159 03:50:00.833 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 160 03:50:00.833 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001012, seq# expected = 1158001012 161 03:50:55.382 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 162 03:55:55.423 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 163 03:58:37.657 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001012 164 03:58:37.657 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 165 03:58:37.687 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 166 03:58:37.687 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 167 03:58:37.687 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001013, seq# expected = 1158001013 168 04:00:08.287 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001013 169 04:00:08.287 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 170 04:00:08.317 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 171 04:00:08.317 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 172 04:00:08.317 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001014, seq# expected = 1158001014 173 04:00:18.802 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001014 174 04:00:18.802 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 175 04:00:18.822 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 176 04:00:18.822 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 177 04:00:18.822 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001015, seq# expected = 1158001015 178 04:00:55.855 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 179 04:05:56.798 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 180 04:10:30.702 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001015 181 04:10:30.702 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 182 04:10:30.742 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 183 04:10:30.742 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 184 04:10:30.742 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001016, seq# expected = 1158001016 185 04:10:41.217 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001016 186 04:10:41.217 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 187 04:10:41.247 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 188 04:10:41.247 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 189 04:10:41.247 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001017, seq# expected = 1158001017 190 04:10:51.732 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001017 191 04:10:51.732 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 192 04:10:51.762 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 193 04:10:51.762 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 194 04:10:51.762 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001018, seq# expected = 1158001018 195 04:10:56.739 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 196 04:13:37.470 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001018 197 04:13:37.470 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 198 04:13:37.500 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 199 04:13:37.500 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 200 04:13:37.500 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001019, seq# expected = 1158001019 201 04:14:58.086 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001019 202 04:14:58.086 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 04:14:58.136 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 04:14:58.136 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 04:14:58.136 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001020, seq# expected = 1158001020 206 04:15:57.171 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 207 04:20:54.108 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001020 208 04:20:54.108 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 209 04:20:54.138 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 210 04:20:54.138 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 211 04:20:54.138 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001021, seq# expected = 1158001021 212 04:20:57.613 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 213 04:21:09.631 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001021 214 04:21:09.631 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 215 04:21:09.661 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 216 04:21:09.661 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 217 04:21:09.661 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001022, seq# expected = 1158001022 218 04:22:35.254 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001022 219 04:22:35.254 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 220 04:22:35.284 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 221 04:22:35.284 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 222 04:22:35.284 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001023, seq# expected = 1158001023 223 04:25:58.556 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 224 04:26:56.139 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001023 225 04:26:56.139 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 226 04:26:56.169 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 227 04:26:56.169 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 228 04:26:56.169 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001024, seq# expected = 1158001024 229 04:28:41.791 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001024 230 04:28:41.791 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 231 04:28:41.821 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 232 04:28:41.821 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 233 04:28:41.821 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001025, seq# expected = 1158001025 234 04:30:58.998 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 235 04:31:27.539 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001025 236 04:31:27.539 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 237 04:31:27.589 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 238 04:31:27.589 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 239 04:31:27.589 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001026, seq# expected = 1158001026 240 04:35:59.430 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 241 04:38:58.698 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001026 242 04:38:58.698 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 243 04:38:58.728 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 244 04:38:58.728 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 245 04:38:58.728 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001027, seq# expected = 1158001027 246 04:40:59.371 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 247 04:41:59.458 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001027 248 04:41:59.458 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 249 04:41:59.488 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 250 04:41:59.488 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 251 04:41:59.488 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001028, seq# expected = 1158001028 252 04:46:00.304 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 253 04:51:00.736 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 254 04:52:10.837 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001028 255 04:52:10.837 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 256 04:52:10.877 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 257 04:52:10.877 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 258 04:52:10.877 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001029, seq# expected = 1158001029 259 04:52:21.352 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001029 260 04:52:21.352 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 261 04:52:21.372 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 262 04:52:21.372 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 263 04:52:21.372 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001030, seq# expected = 1158001030 264 04:53:56.989 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001030 265 04:53:56.989 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 266 04:53:57.020 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 267 04:53:57.020 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 268 04:53:57.020 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001031, seq# expected = 1158001031 269 04:56:01.168 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 270 04:58:37.893 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001031 271 04:58:37.893 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 272 04:58:37.923 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 273 04:58:37.923 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 274 04:58:37.923 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001032, seq# expected = 1158001032 275 05:01:01.600 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 276 05:02:33.733 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001032 277 05:02:33.733 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 05:02:33.753 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 05:02:33.753 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 05:02:33.753 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001033, seq# expected = 1158001033 281 05:02:44.248 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001033 282 05:02:44.248 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 283 05:02:44.278 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 284 05:02:44.278 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 285 05:02:44.278 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001034, seq# expected = 1158001034 286 05:02:54.763 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001034 287 05:02:54.763 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 288 05:02:54.783 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 289 05:02:54.793 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 290 05:02:54.793 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001035, seq# expected = 1158001035 291 05:05:55.523 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001035 292 05:05:55.523 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 293 05:05:55.553 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 294 05:05:55.553 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 295 05:05:55.553 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001036, seq# expected = 1158001036 296 05:06:01.531 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 297 05:11:02.464 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 298 05:12:56.628 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001036 299 05:12:56.628 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 300 05:12:56.658 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 301 05:12:56.658 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 302 05:12:56.658 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001037, seq# expected = 1158001037 303 05:13:07.143 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001037 304 05:13:07.143 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 305 05:13:07.173 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 306 05:13:07.173 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 307 05:13:07.173 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001038, seq# expected = 1158001038 308 05:13:17.658 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001038 309 05:13:17.658 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 05:13:17.688 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 311 05:13:17.688 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 312 05:13:17.688 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001039, seq# expected = 1158001039 313 05:13:38.188 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001039 314 05:13:38.188 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 315 05:13:38.218 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 316 05:13:38.218 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 317 05:13:38.218 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001040, seq# expected = 1158001040 318 05:16:02.926 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 319 05:17:59.604 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001040 320 05:17:59.604 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 321 05:17:59.634 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 322 05:17:59.634 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 323 05:17:59.634 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001041, seq# expected = 1158001041 324 05:21:02.867 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 325 05:22:35.511 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001041 326 05:22:35.511 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 327 05:22:35.581 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 328 05:22:35.581 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 329 05:22:35.581 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001042, seq# expected = 1158001042 330 05:23:41.105 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001042 331 05:23:41.105 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 332 05:23:41.145 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 333 05:23:41.145 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 334 05:23:41.145 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001043, seq# expected = 1158001043 335 05:26:03.810 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 336 05:28:42.038 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001043 337 05:28:42.038 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 338 05:28:42.068 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 339 05:28:42.068 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 340 05:28:42.068 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001044, seq# expected = 1158001044 341 05:31:03.741 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 342 05:31:57.819 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001044 343 05:31:57.819 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 344 05:31:57.849 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 345 05:31:57.849 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 346 05:31:57.849 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001045, seq# expected = 1158001045 347 05:33:48.478 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001045 348 05:33:48.478 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 349 05:33:48.508 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 350 05:33:48.508 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 351 05:33:48.508 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001046, seq# expected = 1158001046 352 05:33:58.993 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001046 353 05:33:58.993 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 354 05:33:59.043 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 355 05:33:59.043 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 356 05:33:59.043 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001047, seq# expected = 1158001047 357 05:36:04.674 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 358 05:41:04.615 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 359 05:42:00.195 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001047 360 05:42:00.195 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 361 05:42:00.225 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 362 05:42:00.225 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 363 05:42:00.225 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001048, seq# expected = 1158001048 364 05:43:40.840 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001048 365 05:43:40.840 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 366 05:43:40.860 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 367 05:43:40.860 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 368 05:43:40.860 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001049, seq# expected = 1158001049 369 05:44:16.391 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001049 370 05:44:16.391 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 371 05:44:16.431 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 372 05:44:16.431 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 373 05:44:16.431 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001050, seq# expected = 1158001050 374 05:44:26.906 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001050 375 05:44:26.906 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 376 05:44:26.936 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 377 05:44:26.936 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 378 05:44:26.936 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001051, seq# expected = 1158001051 379 05:46:05.047 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 380 05:51:05.990 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 381 05:54:00.241 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001051 382 05:54:00.241 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 383 05:54:00.281 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 384 05:54:00.281 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 385 05:54:00.281 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001052, seq# expected = 1158001052 386 05:54:35.802 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001052 387 05:54:35.802 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 388 05:54:35.832 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 389 05:54:35.832 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 390 05:54:35.832 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001053, seq# expected = 1158001053 391 05:54:46.317 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001053 392 05:54:46.317 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 393 05:54:46.347 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 394 05:54:46.347 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 395 05:54:46.347 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001054, seq# expected = 1158001054 396 05:56:05.931 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 397 05:58:37.149 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001054 398 05:58:37.149 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 399 05:58:37.179 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 400 05:58:37.179 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 401 05:58:37.179 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001055, seq# expected = 1158001055 402 06:01:06.864 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 403 06:04:58.207 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001055 404 06:04:58.207 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 405 06:04:58.257 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 406 06:04:58.257 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 407 06:04:58.257 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001056, seq# expected = 1158001056 408 06:05:08.722 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001056 409 06:05:08.722 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 410 06:05:08.772 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 411 06:05:08.772 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 412 06:05:08.772 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001057, seq# expected = 1158001057 413 06:05:19.237 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001057 414 06:05:19.237 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 415 06:05:19.267 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 416 06:05:19.267 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 417 06:05:19.267 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001058, seq# expected = 1158001058 418 06:05:59.805 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001058 419 06:05:59.805 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 420 06:05:59.896 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 421 06:05:59.896 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 422 06:05:59.896 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001059, seq# expected = 1158001059 423 06:06:06.805 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 424 06:11:07.748 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 425 06:13:37.974 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001059 426 06:13:37.974 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 427 06:13:37.994 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 428 06:13:37.994 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 429 06:13:37.994 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001060, seq# expected = 1158001060 430 06:15:23.636 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001060 431 06:15:23.636 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 432 06:15:23.666 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 433 06:15:23.666 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 434 06:15:23.666 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001061, seq# expected = 1158001061 435 06:15:34.151 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001061 436 06:15:34.151 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 437 06:15:34.211 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 438 06:15:34.211 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 439 06:15:34.211 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001062, seq# expected = 1158001062 440 06:16:07.699 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 441 06:17:59.861 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001062 442 06:17:59.861 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 443 06:17:59.891 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 444 06:17:59.891 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 445 06:17:59.891 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001063, seq# expected = 1158001063 446 06:21:08.131 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 447 06:22:35.757 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001063 448 06:22:35.757 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 449 06:22:35.788 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 450 06:22:35.788 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 451 06:22:35.788 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001064, seq# expected = 1158001064 452 06:25:47.033 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001064 453 06:25:47.033 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 454 06:25:47.063 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 455 06:25:47.063 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 456 06:25:47.063 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001065, seq# expected = 1158001065 457 06:25:57.548 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001065 458 06:25:57.548 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 459 06:25:57.588 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 460 06:25:57.588 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 461 06:25:57.588 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001066, seq# expected = 1158001066 462 06:26:08.063 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001066 463 06:26:08.063 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 464 06:26:08.093 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 465 06:26:08.093 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 466 06:26:08.093 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001067, seq# expected = 1158001067 467 06:26:08.563 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 468 06:29:53.887 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001067 469 06:29:53.887 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 470 06:29:53.958 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 471 06:29:53.958 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 472 06:29:53.958 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001068, seq# expected = 1158001068 473 06:31:08.995 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 474 06:36:09.928 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001068 475 06:36:09.928 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 476 06:36:09.928 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 477 06:36:09.958 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 478 06:36:09.958 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 479 06:36:09.958 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001069, seq# expected = 1158001069 480 06:41:09.870 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 481 06:41:56.436 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001069 482 06:41:56.436 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 483 06:41:56.467 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 484 06:41:56.467 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 485 06:41:56.467 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001070, seq# expected = 1158001070 486 06:43:47.596 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001070 487 06:43:47.596 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 488 06:43:47.626 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 489 06:43:47.626 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 490 06:43:47.626 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001071, seq# expected = 1158001071 491 06:46:10.302 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 492 06:46:43.850 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001071 493 06:46:43.860 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 494 06:46:43.880 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 495 06:46:43.880 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 496 06:46:43.880 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001072, seq# expected = 1158001072 497 06:46:54.365 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001072 498 06:46:54.365 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 499 06:46:54.395 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 500 06:46:54.395 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 501 06:46:54.395 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001073, seq# expected = 1158001073 502 06:51:11.244 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 503 06:53:58.485 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001073 504 06:53:58.485 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 505 06:53:58.525 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 506 06:53:58.525 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 507 06:53:58.525 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001074, seq# expected = 1158001074 508 06:56:11.686 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 509 06:56:59.755 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001074 510 06:56:59.755 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 511 06:56:59.785 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 512 06:56:59.785 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 513 06:56:59.785 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001075, seq# expected = 1158001075 514 06:57:10.271 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001075 515 06:57:10.271 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 516 06:57:10.301 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 517 06:57:10.301 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 518 06:57:10.301 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001076, seq# expected = 1158001076 519 06:58:46.409 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001076 520 06:58:46.409 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 521 06:58:46.449 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 522 06:58:46.449 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 523 06:58:46.449 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001077, seq# expected = 1158001077 524 07:01:12.118 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 525 07:06:02.536 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001077 526 07:06:02.536 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 527 07:06:02.576 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 528 07:06:02.576 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 529 07:06:02.576 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001078, seq# expected = 1158001078 530 07:06:12.050 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 531 07:07:28.169 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001078 532 07:07:28.169 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 533 07:07:28.199 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 534 07:07:28.199 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 535 07:07:28.199 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001079, seq# expected = 1158001079 536 07:07:38.684 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001079 537 07:07:38.694 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 538 07:07:38.724 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 539 07:07:38.724 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 540 07:07:38.724 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001080, seq# expected = 1158001080 541 07:11:12.992 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 542 07:13:45.221 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001080 543 07:13:45.221 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 544 07:13:45.261 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 545 07:13:45.261 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 546 07:13:45.261 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001081, seq# expected = 1158001081 547 07:16:13.434 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 548 07:17:46.568 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001081 549 07:17:46.568 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 550 07:17:46.598 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 551 07:17:46.598 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 552 07:17:46.598 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001082, seq# expected = 1158001082 553 07:18:02.091 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001082 554 07:18:02.091 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 555 07:18:02.121 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 556 07:18:02.121 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 557 07:18:02.121 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001083, seq# expected = 1158001083 558 07:21:13.866 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 559 07:22:32.980 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001083 560 07:22:32.980 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 561 07:22:33.010 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 562 07:22:33.010 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 563 07:22:33.010 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001084, seq# expected = 1158001084 564 07:24:08.618 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001084 565 07:24:08.618 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 566 07:24:08.648 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 567 07:24:08.648 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 568 07:24:08.648 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001085, seq# expected = 1158001085 569 07:25:09.205 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001085 570 07:25:09.205 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 571 07:25:09.235 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 572 07:25:09.235 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 573 07:25:09.235 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001086, seq# expected = 1158001086 574 07:25:44.756 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001086 575 07:25:44.756 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 576 07:25:44.786 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 577 07:25:44.786 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 578 07:25:44.786 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001087, seq# expected = 1158001087 579 07:26:05.285 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001087 580 07:26:05.285 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 581 07:26:05.315 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 582 07:26:05.315 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 583 07:26:05.315 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001088, seq# expected = 1158001088 584 07:26:13.798 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 585 07:28:10.966 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001088 586 07:28:10.966 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 587 07:28:11.006 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 588 07:28:11.006 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 589 07:28:11.006 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001089, seq# expected = 1158001089 590 07:28:26.488 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001089 591 07:28:26.488 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 592 07:28:26.508 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 593 07:28:26.508 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 594 07:28:26.508 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001090, seq# expected = 1158001090 595 07:28:47.018 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001090 596 07:28:47.018 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 597 07:28:47.038 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 598 07:28:47.038 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 599 07:28:47.038 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001091, seq# expected = 1158001091 600 07:30:12.641 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001091 601 07:30:12.641 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 602 07:30:12.671 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 603 07:30:12.671 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 604 07:30:12.671 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001092, seq# expected = 1158001092 605 07:31:14.230 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 606 07:32:13.315 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001092 607 07:32:13.315 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 608 07:32:13.345 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 609 07:32:13.345 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 610 07:32:13.345 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001093, seq# expected = 1158001093 611 07:35:09.067 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001093 612 07:35:09.067 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 613 07:35:09.087 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 614 07:35:09.087 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 615 07:35:09.087 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001094, seq# expected = 1158001094 616 07:36:14.662 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 617 07:38:34.863 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001094 618 07:38:34.863 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 619 07:38:34.903 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 620 07:38:34.903 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 621 07:38:34.903 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001095, seq# expected = 1158001095 622 07:38:50.385 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001095 623 07:38:50.385 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 624 07:38:50.416 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 625 07:38:50.416 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 626 07:38:50.416 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001096, seq# expected = 1158001096 627 07:40:05.994 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001096 628 07:40:05.994 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 629 07:40:06.044 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 630 07:40:06.044 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 631 07:40:06.044 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001097, seq# expected = 1158001097 632 07:41:15.094 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 633 07:41:24.607 11/07/06 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 634 07:42:01.661 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001097 635 07:42:01.661 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 636 07:42:01.691 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 637 07:42:01.691 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 638 07:42:01.691 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001098, seq# expected = 1158001098 639 07:43:47.322 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001098 640 07:43:47.322 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 641 07:43:47.363 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 642 07:43:47.363 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 643 07:43:47.363 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001099, seq# expected = 1158001099 644 07:45:07.938 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001099 645 07:45:07.938 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 646 07:45:07.968 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 647 07:45:07.968 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 648 07:45:07.968 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001100, seq# expected = 1158001100 649 07:46:15.305 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 650 07:49:09.055 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001100 651 07:49:09.055 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 652 07:49:09.085 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 653 07:49:09.085 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 654 07:49:09.085 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001101, seq# expected = 1158001101 655 07:49:19.570 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001101 656 07:49:19.570 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 657 07:49:19.600 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 658 07:49:19.600 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 659 07:49:19.600 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001102, seq# expected = 1158001102 660 07:50:05.136 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001102 661 07:50:05.136 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 662 07:50:05.166 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 663 07:50:05.166 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 664 07:50:05.166 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001103, seq# expected = 1158001103 665 07:50:40.687 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001103 666 07:50:40.687 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 667 07:50:40.727 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 668 07:50:40.727 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 669 07:50:40.727 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001104, seq# expected = 1158001104 670 07:51:15.737 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 671 07:53:26.425 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001104 672 07:53:26.425 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 673 07:53:26.455 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 674 07:53:26.455 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 675 07:53:26.455 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001105, seq# expected = 1158001105 676 07:55:07.080 11/07/06 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 1158001105 677 07:55:07.080 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 678 07:55:07.110 11/07/06 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 679 07:55:07.110 11/07/06 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 680 07:55:07.110 11/07/06 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 1158001106, seq# expected = 1158001106 681 07:56:16.179 11/07/06 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1135, dst port 4005 682 07:56:59.231 11/07/06 Sev=Info/4 CM/0x6310000A Secure connections terminated 683 07:56:59.231 11/07/06 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 684 07:56:59.231 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 685 07:56:59.231 11/07/06 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3D55F4B INBOUND SPI = 4F04C98A) 686 07:56:59.231 11/07/06 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=8B9A3AC8 687 07:56:59.231 11/07/06 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=43B36B5007E1E1DA R_Cookie=77D5A25C93F199A1) reason = DEL_REASON_RESET_SADB 688 07:56:59.231 11/07/06 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 689 07:56:59.231 11/07/06 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=43B36B5007E1E1DA R_Cookie=77D5A25C93F199A1) reason = DEL_REASON_RESET_SADB 690 07:56:59.231 11/07/06 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 691 07:56:59.231 11/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 692 07:56:59.281 11/07/06 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 693 07:56:59.281 11/07/06 Sev=Info/6 CM/0x63100030 Removed local TCP port 1135 for TCP connection. 694 07:56:59.281 11/07/06 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 4:30:51 695 07:56:59.291 11/07/06 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 696 07:57:00.843 11/07/06 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 697 07:57:00.843 11/07/06 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 698 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8ac9044f 699 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8ac9044f 700 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4b5fd503 701 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4b5fd503 702 07:57:00.843 11/07/06 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1135, dst port 4005 703 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 704 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 705 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 706 07:57:00.843 11/07/06 Sev=Info/4 IPSEC/0x63700014 Deleted all keys