EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 09:51:07.765 01/01/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 09:51:07.785 01/01/07 Sev=Warning/2 CVPND/0xA3400011 Error -14 sending packet. Dst Addr: 0xFFFFFFFF, Src Addr: 0xC0A80102 (DRVIFACE:1199). 3 09:51:07.805 01/01/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 4 09:51:07.805 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 5 09:51:07.825 01/01/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1306 for TCP connection. 6 09:51:08.095 01/01/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 7 09:51:08.095 01/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 8 09:51:08.095 01/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1306, dst port 4005 9 09:51:08.095 01/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1306 10 09:51:08.095 01/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1306, dst port 4005 11 09:51:08.095 01/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 12 09:51:08.596 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 13 09:51:08.646 01/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 14 09:51:08.666 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 15 09:51:08.906 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 16 09:51:08.906 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 17 09:51:08.906 01/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 09:51:08.906 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 09:51:08.906 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 09:51:08.906 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 09:51:08.916 01/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 09:51:08.916 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 23 09:51:08.916 01/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 09:51:08.916 01/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 09:51:09.017 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 26 09:51:09.017 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 27 09:51:09.017 01/01/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 28 09:51:09.017 01/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=05261DBFBCC9FDC2 R_Cookie=C4CDC3E5B018ECC4) reason = DEL_REASON_LOAD_BALANCING 29 09:51:09.017 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 30 09:51:09.597 01/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=05261DBFBCC9FDC2 R_Cookie=C4CDC3E5B018ECC4) reason = DEL_REASON_LOAD_BALANCING 31 09:51:09.597 01/01/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 09:51:09.597 01/01/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 33 09:51:09.597 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 34 09:51:09.597 01/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 09:51:10.098 01/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1306, dst port 4005 36 09:51:10.098 01/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1306, dst port 4005 37 09:51:14.605 01/01/07 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "128.221.195.16" 38 09:51:14.605 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 39 09:51:15.766 01/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 40 09:51:15.766 01/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1306, dst port 4005 41 09:51:15.766 01/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1306, dst port 4005 42 09:51:16.607 01/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1306 43 09:51:16.607 01/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1306, dst port 4005 44 09:51:16.607 01/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 45 09:51:17.108 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 46 09:51:17.118 01/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 47 09:51:17.118 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 48 09:51:17.288 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 49 09:51:17.288 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 50 09:51:17.288 01/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 51 09:51:17.288 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 52 09:51:17.288 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 53 09:51:17.288 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 54 09:51:17.298 01/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 55 09:51:17.298 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 56 09:51:17.298 01/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 57 09:51:17.298 01/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 58 09:51:17.318 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 59 09:51:17.318 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 60 09:51:17.318 01/01/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 61 09:51:17.318 01/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0D81FCE65F6018EF R_Cookie=0393B48A31ADB8C6) reason = DEL_REASON_LOAD_BALANCING 62 09:51:17.318 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 63 09:51:18.110 01/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0D81FCE65F6018EF R_Cookie=0393B48A31ADB8C6) reason = DEL_REASON_LOAD_BALANCING 64 09:51:18.110 01/01/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 65 09:51:18.110 01/01/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 66 09:51:18.110 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 67 09:51:18.110 01/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 68 09:51:18.610 01/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1306, dst port 4005 69 09:51:18.610 01/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1306, dst port 4005 70 09:51:18.610 01/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1306 71 09:51:18.610 01/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1306, dst port 4005 72 09:51:18.610 01/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 73 09:51:19.111 01/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 74 09:51:19.121 01/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 75 09:51:19.131 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 76 09:51:19.301 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 77 09:51:19.301 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 78 09:51:19.301 01/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 79 09:51:19.301 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 80 09:51:19.301 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 81 09:51:19.301 01/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 82 09:51:19.311 01/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 83 09:51:19.311 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 84 09:51:19.311 01/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 85 09:51:19.311 01/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 86 09:51:19.341 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 87 09:51:19.341 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 88 09:51:19.341 01/01/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 89 09:51:28.084 01/01/07 Sev=Info/4 CM/0x63100017 xAuth application returned 90 09:51:28.084 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 91 09:51:30.537 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 92 09:51:30.537 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 93 09:51:30.537 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 94 09:51:30.537 01/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 95 09:51:31.008 01/01/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 96 09:51:31.008 01/01/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 97 09:51:31.008 01/01/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 98 09:51:31.008 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 99 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 100 09:51:31.899 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 101 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.83 102 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 103 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 104 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 105 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 106 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 107 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 108 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 109 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 110 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 111 09:51:31.899 01/01/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 112 09:51:31.899 01/01/07 Sev=Info/4 CM/0x63100019 Mode Config data received 113 09:51:31.909 01/01/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.83, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 114 09:51:31.909 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 115 09:51:31.949 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 116 09:51:31.949 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 117 09:51:31.949 01/01/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 118 09:51:31.949 01/01/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 12 seconds, setting expiry to 86388 seconds from now 119 09:51:31.960 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 120 09:51:31.960 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 121 09:51:31.960 01/01/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 122 09:51:31.960 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 123 09:51:31.960 01/01/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=354EF218 OUTBOUND SPI = 0x0407EFD8 INBOUND SPI = 0x307E98F0) 124 09:51:31.960 01/01/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0407EFD8 125 09:51:31.960 01/01/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x307E98F0 126 09:51:32.420 01/01/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.83/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 127 09:51:32.460 01/01/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 128 09:51:32.550 01/01/07 Sev=Info/4 CM/0x6310001A One secure connection established 129 09:51:32.570 01/01/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.2. Current address(es): 192.168.1.2, 10.13.8.83, 192.168.6.1, 192.168.5.1. 130 09:51:32.570 01/01/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.83. Current address(es): 192.168.1.2, 10.13.8.83, 192.168.6.1, 192.168.5.1. 131 09:51:32.801 01/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 132 09:51:32.801 01/01/07 Sev=Info/6 IPSEC/0x6370002B Sent 11 packets, 0 were fragmented. 133 09:51:32.801 01/01/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 134 09:51:32.801 01/01/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xd8ef0704 into key list 135 09:51:32.801 01/01/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 136 09:51:32.801 01/01/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf0987e30 into key list 137 09:51:32.801 01/01/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.83 138 09:51:35.635 01/01/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xd8ef0704 for inbound key with SPI=0xf0987e30 139 09:54:06.362 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793398 140 09:54:06.362 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 141 09:54:06.392 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 142 09:54:06.392 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 143 09:54:06.392 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793399, seq# expected = 2732793399 144 09:54:36.905 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793399 145 09:54:36.905 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 146 09:54:36.935 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 147 09:54:36.935 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 148 09:54:36.935 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793400, seq# expected = 2732793400 149 09:56:19.553 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 150 09:58:58.291 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793400 151 09:58:58.291 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 152 09:58:58.662 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 153 09:58:58.662 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 154 09:58:58.662 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793401, seq# expected = 2732793401 155 09:59:08.806 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793401 156 09:59:08.806 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 157 09:59:08.836 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 158 09:59:08.836 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 159 09:59:08.836 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793402, seq# expected = 2732793402 160 09:59:19.322 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793402 161 09:59:19.322 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 162 09:59:19.342 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 163 09:59:19.342 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 164 09:59:19.342 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793403, seq# expected = 2732793403 165 09:59:29.837 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793403 166 09:59:29.837 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 167 09:59:29.867 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 168 09:59:29.867 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 169 09:59:29.867 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793404, seq# expected = 2732793404 170 10:00:50.453 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793404 171 10:00:50.453 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 172 10:00:50.483 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 173 10:00:50.483 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 174 10:00:50.483 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793405, seq# expected = 2732793405 175 10:01:10.982 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793405 176 10:01:10.982 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 177 10:01:15.989 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793406 178 10:01:15.989 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 179 10:01:16.019 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 180 10:01:16.019 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 181 10:01:16.019 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793407, seq# expected = 2732793407 182 10:01:19.995 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 183 10:02:56.634 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793407 184 10:02:56.634 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 185 10:02:56.684 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 186 10:02:56.684 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 187 10:02:56.684 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793408, seq# expected = 2732793408 188 10:06:20.928 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 189 10:07:52.560 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793408 190 10:07:52.560 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 191 10:07:52.590 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 192 10:07:52.590 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 193 10:07:52.590 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793409, seq# expected = 2732793409 194 10:09:53.233 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793409 195 10:09:53.233 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 196 10:09:53.263 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 197 10:09:53.263 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 198 10:09:53.263 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793410, seq# expected = 2732793410 199 10:11:20.448 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 200 10:12:49.146 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793410 201 10:12:49.146 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 202 10:12:49.176 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 203 10:12:49.176 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 204 10:12:49.176 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793411, seq# expected = 2732793411 205 10:12:59.681 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793411 206 10:12:59.681 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 207 10:12:59.701 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 208 10:12:59.701 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 209 10:12:59.701 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793412, seq# expected = 2732793412 210 10:13:35.232 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793412 211 10:13:35.232 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 212 10:13:35.262 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 213 10:13:35.262 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 214 10:13:35.262 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793413, seq# expected = 2732793413 215 10:16:20.971 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 216 10:17:51.100 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793413 217 10:17:51.100 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 10:17:51.130 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 10:17:51.130 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 10:17:51.130 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793414, seq# expected = 2732793414 221 10:20:06.805 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793414 222 10:20:06.805 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 10:20:06.825 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 10:20:06.835 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 10:20:06.835 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793415, seq# expected = 2732793415 226 10:20:22.328 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793415 227 10:20:22.328 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 228 10:20:22.358 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 229 10:20:22.358 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 230 10:20:22.358 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793416, seq# expected = 2732793416 231 10:21:20.912 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 232 10:22:48.037 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793416 233 10:22:48.037 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 234 10:22:48.067 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 235 10:22:48.067 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 236 10:22:48.067 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793417, seq# expected = 2732793417 237 10:24:13.740 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793417 238 10:24:13.740 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 239 10:24:13.821 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 240 10:24:13.821 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 241 10:24:13.821 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793418, seq# expected = 2732793418 242 10:24:49.302 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793418 243 10:24:49.302 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 244 10:24:49.332 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 245 10:24:49.332 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 246 10:24:49.332 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793419, seq# expected = 2732793419 247 10:26:20.933 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 248 10:27:51.063 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793419 249 10:27:51.063 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 250 10:27:51.103 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 251 10:27:51.103 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 252 10:27:51.103 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793420, seq# expected = 2732793420 253 10:30:32.295 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793420 254 10:30:32.295 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 255 10:30:32.375 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 256 10:30:32.375 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 257 10:30:32.375 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793421, seq# expected = 2732793421 258 10:30:47.817 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793421 259 10:30:47.827 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 260 10:30:47.847 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 261 10:30:47.847 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 262 10:30:47.847 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793422, seq# expected = 2732793422 263 10:31:21.365 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 264 10:34:03.659 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793422 265 10:34:03.659 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 266 10:34:03.689 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 267 10:34:03.689 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 268 10:34:03.689 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793423, seq# expected = 2732793423 269 10:36:21.477 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 270 10:39:09.799 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793423 271 10:39:09.799 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 272 10:39:09.829 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 273 10:39:09.829 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 274 10:39:09.829 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793424, seq# expected = 2732793424 275 10:39:55.384 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793424 276 10:39:55.384 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 277 10:39:55.414 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 278 10:39:55.414 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 279 10:39:55.414 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793425, seq# expected = 2732793425 280 10:40:56.542 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793425 281 10:40:56.542 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 282 10:40:56.633 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 283 10:40:56.633 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 284 10:40:56.633 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793426, seq# expected = 2732793426 285 10:41:07.057 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793426 286 10:41:07.057 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 10:41:07.088 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 10:41:07.088 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 10:41:07.088 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793427, seq# expected = 2732793427 290 10:41:21.578 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 291 10:41:22.580 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793427 292 10:41:22.580 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 293 10:41:22.610 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 294 10:41:22.610 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 295 10:41:22.610 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793428, seq# expected = 2732793428 296 10:42:53.230 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793428 297 10:42:53.230 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 298 10:42:53.260 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 299 10:42:53.260 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 300 10:42:53.260 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793429, seq# expected = 2732793429 301 10:46:23.032 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 302 10:47:59.671 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793429 303 10:47:59.671 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 304 10:47:59.691 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 305 10:47:59.691 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 306 10:47:59.691 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793430, seq# expected = 2732793430 307 10:50:05.852 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793430 308 10:50:05.852 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 309 10:50:05.882 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 310 10:50:05.882 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 311 10:50:05.882 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793431, seq# expected = 2732793431 312 10:51:22.462 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 313 10:53:05.631 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793431 314 10:53:05.631 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 315 10:53:05.691 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 316 10:53:05.691 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 317 10:53:05.691 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793432, seq# expected = 2732793432 318 10:53:21.654 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793432 319 10:53:21.654 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 320 10:53:21.694 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 321 10:53:21.694 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 322 10:53:21.694 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793433, seq# expected = 2732793433 323 10:54:02.713 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793433 324 10:54:02.713 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 325 10:54:02.743 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 326 10:54:02.743 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 327 10:54:02.743 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793434, seq# expected = 2732793434 328 10:54:13.228 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793434 329 10:54:13.228 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 330 10:54:13.258 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 331 10:54:13.258 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 332 10:54:13.258 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793435, seq# expected = 2732793435 333 10:56:23.425 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 334 10:57:15.510 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793435 335 10:57:15.510 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 336 10:57:15.540 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 337 10:57:15.540 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 338 10:57:15.540 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793436, seq# expected = 2732793436 339 11:01:23.907 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 340 11:01:57.455 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793436 341 11:01:57.455 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 342 11:01:57.486 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 343 11:01:57.486 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 344 11:01:57.486 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793437, seq# expected = 2732793437 345 11:02:49.550 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793437 346 11:02:49.550 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 347 11:02:49.580 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 348 11:02:49.580 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 349 11:02:49.580 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793438, seq# expected = 2732793438 350 11:03:00.066 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793438 351 11:03:00.066 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 352 11:03:00.096 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 353 11:03:00.096 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 354 11:03:00.096 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793439, seq# expected = 2732793439 355 11:03:57.148 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793439 356 11:03:57.148 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 357 11:03:57.188 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 358 11:03:57.188 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 359 11:03:57.188 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793440, seq# expected = 2732793440 360 11:04:07.653 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793440 361 11:04:07.653 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 362 11:04:07.683 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 363 11:04:07.683 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 364 11:04:07.683 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793441, seq# expected = 2732793441 365 11:06:24.870 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 366 11:07:50.553 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793441 367 11:07:50.553 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 368 11:07:50.593 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 369 11:07:50.593 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 370 11:07:50.593 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793442, seq# expected = 2732793442 371 11:09:13.813 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793442 372 11:09:13.813 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 373 11:09:13.853 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 374 11:09:13.853 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 375 11:09:13.853 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793443, seq# expected = 2732793443 376 11:11:24.501 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 377 11:12:19.670 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793443 378 11:12:19.670 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 379 11:12:19.690 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 380 11:12:19.690 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 381 11:12:19.690 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793444, seq# expected = 2732793444 382 11:12:55.221 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793444 383 11:12:55.221 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 384 11:12:55.261 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 385 11:12:55.261 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 386 11:12:55.261 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793445, seq# expected = 2732793445 387 11:13:20.778 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793445 388 11:13:20.778 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 389 11:13:20.798 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 390 11:13:20.798 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 391 11:13:20.798 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793446, seq# expected = 2732793446 392 11:16:24.032 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 393 11:17:52.158 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793446 394 11:17:52.158 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 395 11:17:52.218 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 396 11:17:52.218 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 397 11:17:52.218 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793447, seq# expected = 2732793447 398 11:22:32.592 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793447 399 11:22:32.592 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 400 11:22:32.622 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 401 11:22:32.622 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 402 11:22:32.622 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793448, seq# expected = 2732793448 403 11:22:53.111 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793448 404 11:22:53.111 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 405 11:22:53.131 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 406 11:22:53.131 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 407 11:22:53.131 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793449, seq# expected = 2732793449 408 11:24:56.288 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793449 409 11:24:56.288 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 410 11:24:56.318 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 411 11:24:56.318 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 412 11:24:56.318 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793450, seq# expected = 2732793450 413 11:25:16.818 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793450 414 11:25:16.818 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 415 11:25:16.858 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 416 11:25:16.858 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 417 11:25:16.858 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793451, seq# expected = 2732793451 418 11:25:27.333 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793451 419 11:25:27.333 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 420 11:25:27.363 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 421 11:25:27.363 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 422 11:25:27.363 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793452, seq# expected = 2732793452 423 11:26:24.926 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 424 11:27:07.978 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793452 425 11:27:07.978 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 426 11:27:08.008 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 427 11:27:08.008 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 428 11:27:08.008 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793453, seq# expected = 2732793453 429 11:29:53.726 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793453 430 11:29:53.726 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 431 11:29:53.756 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 432 11:29:53.756 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 433 11:29:53.756 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793454, seq# expected = 2732793454 434 11:30:09.248 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793454 435 11:30:09.248 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 436 11:30:09.278 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 437 11:30:09.278 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 438 11:30:09.278 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793455, seq# expected = 2732793455 439 11:31:25.358 01/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1306, dst port 4005 440 11:33:05.001 01/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2732793455 441 11:33:05.001 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 442 11:33:05.031 01/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 443 11:33:05.031 01/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 444 11:33:05.031 01/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2732793456, seq# expected = 2732793456 445 11:35:18.353 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 446 11:35:18.353 01/01/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 407EFD8 INBOUND SPI = 307E98F0) 447 11:35:18.353 01/01/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=354EF218 448 11:35:18.353 01/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D6A597DA43F88A39 R_Cookie=05CC8467FE1E3568) reason = DEL_REASON_RESET_SADB 449 11:35:18.353 01/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 450 11:35:18.353 01/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D6A597DA43F88A39 R_Cookie=05CC8467FE1E3568) reason = DEL_REASON_RESET_SADB 451 11:35:18.353 01/01/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 452 11:35:18.353 01/01/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 453 11:35:18.363 01/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 454 11:35:18.363 01/01/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1306 for TCP connection. 455 11:35:18.363 01/01/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 1:43:46 456 11:35:18.363 01/01/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 457 11:35:18.363 01/01/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 458 11:35:18.373 01/01/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 459 07:34:03.323 01/02/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 460 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf0987e30 461 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf0987e30 462 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd8ef0704 463 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd8ef0704 464 07:34:05.440 01/02/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1306, dst port 4005 465 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 466 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 467 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 468 07:34:05.440 01/02/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys