EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:22:17.010 01/30/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:22:17.039 01/30/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:22:17.039 01/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:22:17.128 01/30/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1096 for TCP connection. 5 21:22:17.672 01/30/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:22:17.672 01/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:22:17.672 01/30/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1096, dst port 4005 8 21:22:17.672 01/30/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1096 9 21:22:17.672 01/30/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1096, dst port 4005 10 21:22:17.672 01/30/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:22:18.166 01/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:22:18.176 01/30/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:22:18.295 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:22:18.670 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:22:18.670 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:22:18.670 01/30/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:22:18.670 01/30/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:22:18.670 01/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:22:18.670 01/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:22:18.710 01/30/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:22:18.710 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:22:18.710 01/30/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:22:18.710 01/30/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:22:18.947 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:22:18.947 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:22:18.947 01/30/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 21:22:18.947 01/30/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B396F35E76F12EE6 R_Cookie=21F0787228D74E41) reason = DEL_REASON_LOAD_BALANCING 28 21:22:18.947 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:22:19.649 01/30/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B396F35E76F12EE6 R_Cookie=21F0787228D74E41) reason = DEL_REASON_LOAD_BALANCING 30 21:22:19.649 01/30/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:22:19.649 01/30/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 21:22:19.649 01/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 21:22:19.649 01/30/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:22:20.637 01/30/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1096, dst port 4005 35 21:22:20.637 01/30/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1096, dst port 4005 36 21:22:20.637 01/30/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1096 37 21:22:20.637 01/30/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1096, dst port 4005 38 21:22:20.637 01/30/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 21:22:21.131 01/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 21:22:21.131 01/30/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 21:22:21.141 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 21:22:21.319 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 21:22:21.319 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 21:22:21.319 01/30/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:22:21.319 01/30/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:22:21.319 01/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:22:21.319 01/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:22:21.319 01/30/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:22:21.319 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 21:22:21.319 01/30/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:22:21.319 01/30/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:22:21.349 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 21:22:21.349 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 21:22:21.349 01/30/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:22:42.798 01/30/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:22:42.798 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 21:22:47.217 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 21:22:47.217 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 21:22:47.217 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 21:22:47.217 01/30/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:22:47.286 01/30/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:22:47.286 01/30/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:22:47.286 01/30/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:22:47.286 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 21:22:48.294 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.57 68 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:22:48.294 01/30/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:22:48.373 01/30/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:22:48.373 01/30/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.57, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 21:22:48.373 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 21:22:48.373 01/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 21:22:48.373 01/30/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 21:22:48.413 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 21:22:48.413 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 21:22:48.413 01/30/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 21:22:48.413 01/30/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 27 seconds, setting expiry to 86373 seconds from now 89 21:22:48.423 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 21:22:48.423 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 21:22:48.423 01/30/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 21:22:48.423 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 21:22:48.423 01/30/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=FAB234D2 OUTBOUND SPI = 0x23487245 INBOUND SPI = 0x2BEDB27C) 94 21:22:48.423 01/30/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x23487245 95 21:22:48.423 01/30/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x2BEDB27C 96 21:22:51.072 01/30/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.57/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 21:22:51.122 01/30/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 21:22:51.152 01/30/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 21:22:51.242 01/30/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.13.8.57, 192.168.6.1, 192.168.5.1. 100 21:22:51.252 01/30/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.57. Current address(es): 192.168.1.104, 10.13.8.57, 192.168.6.1, 192.168.5.1. 101 21:22:51.412 01/30/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:22:51.412 01/30/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x45724823 into key list 103 21:22:51.412 01/30/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:22:51.412 01/30/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7cb2ed2b into key list 105 21:22:51.412 01/30/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.57 106 21:22:54.286 01/30/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x45724823 for inbound key with SPI=0x7cb2ed2b 107 21:24:22.413 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864978 108 21:24:22.413 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 21:24:22.443 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 21:24:22.443 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 21:24:22.443 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864979, seq# expected = 2396864979 112 21:24:42.943 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864979 113 21:24:42.943 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 21:24:42.973 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 21:24:42.973 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 21:24:42.973 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864980, seq# expected = 2396864980 117 21:25:23.501 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864980 118 21:25:23.501 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 119 21:25:23.521 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 120 21:25:23.521 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 121 21:25:23.521 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864981, seq# expected = 2396864981 122 21:27:21.170 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 123 21:32:22.113 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 124 21:37:22.545 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 125 21:47:23.409 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 126 21:52:23.841 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 127 21:57:24.283 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 128 22:02:24.725 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 129 22:07:25.167 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 130 22:12:25.599 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 131 22:17:26.041 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 132 22:22:26.483 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 133 22:27:26.925 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 134 22:27:40.444 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864981 135 22:27:40.444 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 136 22:27:40.465 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 137 22:27:40.465 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 138 22:27:40.465 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864982, seq# expected = 2396864982 139 22:32:27.357 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 140 22:37:27.789 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 141 22:39:42.453 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864982 142 22:39:42.453 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 22:39:42.483 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 22:39:42.483 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 22:39:42.483 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864983, seq# expected = 2396864983 146 22:40:23.011 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864983 147 22:40:23.011 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 148 22:40:23.041 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 149 22:40:23.041 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 150 22:40:23.041 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864984, seq# expected = 2396864984 151 22:42:28.191 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 152 22:47:28.633 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 153 22:48:19.206 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864984 154 22:48:19.206 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 155 22:48:19.246 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 156 22:48:19.246 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 157 22:48:19.246 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864985, seq# expected = 2396864985 158 22:51:39.994 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864985 159 22:51:39.994 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 160 22:51:40.025 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 161 22:51:40.025 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 162 22:51:40.025 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864986, seq# expected = 2396864986 163 22:52:20.553 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864986 164 22:52:20.553 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 165 22:52:20.573 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 166 22:52:20.573 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 167 22:52:20.573 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864987, seq# expected = 2396864987 168 22:52:28.564 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 169 22:55:21.313 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864987 170 22:55:21.313 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 171 22:55:21.343 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 172 22:55:21.343 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 173 22:55:21.343 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864988, seq# expected = 2396864988 174 22:57:29.507 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 175 23:02:29.929 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 176 23:07:30.381 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 177 23:10:23.129 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864988 178 23:10:23.129 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 179 23:10:23.159 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 180 23:10:23.159 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 181 23:10:23.159 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864989, seq# expected = 2396864989 182 23:12:30.813 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 183 23:17:31.746 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 184 23:22:31.677 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 185 23:25:19.919 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864989 186 23:25:19.919 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 23:25:19.969 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 23:25:19.969 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 23:25:19.969 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864990, seq# expected = 2396864990 190 23:27:32.119 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 191 23:31:00.919 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864990 192 23:31:00.919 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 193 23:31:00.949 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 194 23:31:00.949 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 195 23:31:00.949 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864991, seq# expected = 2396864991 196 23:32:32.020 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 197 23:37:32.943 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 198 23:40:23.188 01/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864991 199 23:40:23.188 01/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 200 23:40:23.208 01/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 201 23:40:23.208 01/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 202 23:40:23.208 01/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864992, seq# expected = 2396864992 203 23:42:33.375 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 204 23:47:33.477 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 205 23:52:33.738 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 206 23:57:33.950 01/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 207 00:02:34.132 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 208 00:07:34.313 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 209 00:22:34.818 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 210 00:27:34.960 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 211 00:32:35.071 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 212 00:37:35.183 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 213 00:42:35.364 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 214 00:47:35.446 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 215 00:52:35.577 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 216 00:57:35.659 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 217 01:02:35.740 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 218 01:07:35.772 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 219 01:12:36.074 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 220 01:17:36.315 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 221 01:22:36.587 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 222 01:27:36.859 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 223 01:32:37.641 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 224 01:37:37.372 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 225 01:42:37.614 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 226 01:47:37.956 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 227 01:52:38.278 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 228 01:57:38.480 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 229 02:02:38.561 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 230 02:07:38.592 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 231 02:12:38.694 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 232 02:17:39.156 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 233 02:27:39.700 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 234 02:32:40.202 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 235 02:37:40.674 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 236 02:42:41.166 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 237 02:47:42.159 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 238 02:52:41.840 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 239 02:57:41.971 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 240 03:02:42.083 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 241 03:07:42.174 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 242 03:12:42.646 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 243 03:17:43.108 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 244 03:22:43.130 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 245 03:27:43.592 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 246 03:32:43.663 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 247 03:37:44.125 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 248 03:42:44.607 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 249 03:46:49.029 01/31/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x45724823 is about to expire, requesting a new one 250 03:46:49.029 01/31/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.57, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 251 03:46:49.029 01/31/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=1ACE87B4) Initiator = ID=10.13.8.57 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 252 03:46:49.029 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 253 03:46:49.059 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 254 03:46:49.059 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 255 03:46:49.059 01/31/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 256 03:46:49.059 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 257 03:46:49.059 01/31/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=1ACE87B4 OUTBOUND SPI = 0x417B4324 INBOUND SPI = 0x32AD6678) 258 03:46:49.059 01/31/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x417B4324 259 03:46:49.059 01/31/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x32AD6678 260 03:46:49.059 01/31/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 261 03:46:49.540 01/31/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 262 03:46:49.540 01/31/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x24437b41 into key list 263 03:46:49.540 01/31/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 264 03:46:49.540 01/31/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7866ad32 into key list 265 03:47:19.062 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 266 03:47:19.062 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 267 03:47:19.062 01/31/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 23487245 INBOUND SPI = 2BEDB27C) 268 03:47:19.062 01/31/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=FAB234D2 269 03:47:19.072 01/31/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7cb2ed2b 270 03:47:19.072 01/31/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7cb2ed2b 271 03:47:19.072 01/31/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x45724823 272 03:47:19.072 01/31/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x45724823 273 03:47:20.073 01/31/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x24437b41 for inbound key with SPI=0x7866ad32 274 03:47:44.609 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 275 03:52:45.151 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 276 03:57:45.643 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 277 04:02:45.674 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 278 04:07:45.756 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 279 04:12:46.198 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 280 04:16:37.531 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864992 281 04:16:37.531 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 282 04:16:42.558 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864993 283 04:16:42.558 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 284 04:16:42.588 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 285 04:16:42.588 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 286 04:16:42.588 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864994, seq# expected = 2396864994 287 04:17:23.617 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864994 288 04:17:23.617 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 289 04:17:23.647 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 290 04:17:23.647 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 291 04:17:23.647 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864995, seq# expected = 2396864995 292 04:17:46.149 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 293 04:22:47.092 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 294 04:27:47.093 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 295 04:31:03.165 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864995 296 04:31:03.165 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 297 04:31:03.195 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 298 04:31:03.195 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 299 04:31:03.195 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864996, seq# expected = 2396864996 300 04:32:46.864 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 301 04:42:48.309 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 302 04:47:48.771 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 303 04:52:49.193 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 304 04:55:02.425 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864996 305 04:55:02.425 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 306 04:55:02.455 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 307 04:55:02.455 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 308 04:55:02.455 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864997, seq# expected = 2396864997 309 04:55:22.954 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864997 310 04:55:22.954 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 311 04:55:22.974 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 312 04:55:22.974 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 313 04:55:22.974 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864998, seq# expected = 2396864998 314 04:57:49.675 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 315 05:02:50.107 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 316 05:07:50.539 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 317 05:12:51.001 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 318 05:14:15.122 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864998 319 05:14:15.122 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 320 05:14:15.152 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 321 05:14:15.152 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 322 05:14:15.152 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396864999, seq# expected = 2396864999 323 05:14:25.637 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396864999 324 05:14:25.637 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 325 05:14:25.667 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 326 05:14:25.667 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 327 05:14:25.667 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865000, seq# expected = 2396865000 328 05:17:51.463 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 329 05:20:01.681 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865000 330 05:20:01.681 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 331 05:20:01.711 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 332 05:20:01.711 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 333 05:20:01.711 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865001, seq# expected = 2396865001 334 05:22:51.925 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 335 05:27:52.367 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 336 05:32:52.799 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 337 05:37:53.231 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 338 05:42:53.543 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 339 05:47:53.975 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 340 05:52:54.407 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 341 05:55:03.593 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865001 342 05:55:03.593 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 343 05:55:03.623 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 344 05:55:03.623 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 345 05:55:03.623 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865002, seq# expected = 2396865002 346 05:55:19.115 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865002 347 05:55:19.115 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 348 05:55:19.135 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 349 05:55:19.135 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 350 05:55:19.135 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865003, seq# expected = 2396865003 351 05:57:54.839 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 352 06:02:55.271 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 353 06:07:55.703 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 354 06:12:17.089 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865003 355 06:12:17.089 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 356 06:12:17.129 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 357 06:12:17.129 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 358 06:12:17.129 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865004, seq# expected = 2396865004 359 06:12:32.611 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865004 360 06:12:32.611 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 361 06:12:32.642 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 362 06:12:32.642 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 363 06:12:32.642 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865005, seq# expected = 2396865005 364 06:12:53.141 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865005 365 06:12:53.141 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 366 06:12:53.171 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 367 06:12:53.171 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 368 06:12:53.171 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865006, seq# expected = 2396865006 369 06:12:55.645 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 370 06:17:56.577 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 371 06:22:57.019 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 372 06:25:19.725 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865006 373 06:25:19.725 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 374 06:25:19.755 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 375 06:25:19.755 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 376 06:25:19.755 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865007, seq# expected = 2396865007 377 06:27:57.451 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 378 06:32:57.883 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 379 06:37:58.315 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 380 06:42:58.757 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 381 06:47:59.179 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 382 06:52:59.611 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 383 06:55:23.328 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865007 384 06:55:23.328 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 385 06:55:23.358 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 386 06:55:23.358 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 387 06:55:23.358 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865008, seq# expected = 2396865008 388 06:58:00.053 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 389 07:01:40.881 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865008 390 07:01:40.881 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 391 07:01:40.911 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 392 07:01:40.911 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 393 07:01:40.911 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865009, seq# expected = 2396865009 394 07:02:59.995 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 395 07:07:01.842 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865009 396 07:07:01.842 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 397 07:07:01.872 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 398 07:07:01.872 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 399 07:07:01.872 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865010, seq# expected = 2396865010 400 07:08:00.427 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 401 07:13:01.369 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 402 07:13:17.893 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865010 403 07:13:17.893 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 404 07:13:17.913 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 405 07:13:17.913 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 406 07:13:17.913 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865011, seq# expected = 2396865011 407 07:18:01.801 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 408 07:23:02.243 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 409 07:25:19.941 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865011 410 07:25:19.941 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 411 07:25:19.971 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 412 07:25:19.971 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 413 07:25:19.971 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865012, seq# expected = 2396865012 414 07:28:02.675 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 415 07:31:00.942 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865012 416 07:31:00.942 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 417 07:31:00.972 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 418 07:31:00.972 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 419 07:31:00.972 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865013, seq# expected = 2396865013 420 07:33:03.618 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 421 07:38:03.549 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 422 07:42:57.973 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865013 423 07:42:57.973 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 424 07:42:58.003 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 425 07:42:58.003 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 426 07:42:58.003 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865014, seq# expected = 2396865014 427 07:43:03.481 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 428 07:48:04.423 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 429 07:50:45.645 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865014 430 07:50:45.645 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 431 07:50:45.675 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 432 07:50:45.675 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 433 07:50:45.675 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865015, seq# expected = 2396865015 434 07:53:04.355 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 435 07:55:02.024 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865015 436 07:55:02.024 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 437 07:55:02.064 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 438 07:55:02.064 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 439 07:55:02.064 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865016, seq# expected = 2396865016 440 07:55:22.553 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865016 441 07:55:22.553 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 442 07:55:22.583 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 443 07:55:22.583 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 444 07:55:22.583 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865017, seq# expected = 2396865017 445 07:58:05.287 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 446 08:03:05.719 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 447 08:06:29.512 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865017 448 08:06:29.512 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 449 08:06:29.542 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 450 08:06:29.542 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 451 08:06:29.542 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865018, seq# expected = 2396865018 452 08:07:00.056 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865018 453 08:07:00.056 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 454 08:07:00.076 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 455 08:07:00.076 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 456 08:07:00.076 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865019, seq# expected = 2396865019 457 08:08:06.151 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 458 08:13:06.583 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 459 08:19:03.617 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865019 460 08:19:03.617 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 461 08:19:03.647 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 462 08:19:03.647 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 463 08:19:03.647 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865020, seq# expected = 2396865020 464 08:20:04.204 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865020 465 08:20:04.204 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 466 08:20:04.224 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 467 08:20:04.224 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 468 08:20:04.224 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865021, seq# expected = 2396865021 469 08:21:29.827 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865021 470 08:21:29.827 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 471 08:21:29.857 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 472 08:21:29.857 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 473 08:21:29.857 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865022, seq# expected = 2396865022 474 08:23:06.967 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 475 08:25:20.659 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865022 476 08:25:20.659 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 477 08:25:20.689 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 478 08:25:20.689 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 479 08:25:20.689 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865023, seq# expected = 2396865023 480 08:28:07.909 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 481 08:31:02.661 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865023 482 08:31:02.661 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 483 08:31:02.701 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 484 08:31:02.701 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 485 08:31:02.701 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865024, seq# expected = 2396865024 486 08:33:08.351 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 487 08:33:54.928 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865024 488 08:33:54.928 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 489 08:33:54.968 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 490 08:33:54.968 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 491 08:33:54.968 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865025, seq# expected = 2396865025 492 08:34:15.508 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865025 493 08:34:15.508 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 494 08:34:15.538 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 495 08:34:15.538 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 496 08:34:15.538 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865026, seq# expected = 2396865026 497 08:38:07.992 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 498 08:43:08.945 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 499 08:48:09.417 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 500 08:53:10.370 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 501 08:55:00.538 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865026 502 08:55:00.538 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 503 08:55:00.568 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 504 08:55:00.568 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 505 08:55:00.568 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865027, seq# expected = 2396865027 506 08:55:21.068 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865027 507 08:55:21.068 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 508 08:55:21.098 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 509 08:55:21.098 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 510 08:55:21.098 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865028, seq# expected = 2396865028 511 08:58:10.361 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 512 09:03:09.912 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 513 09:08:10.905 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 514 09:13:10.956 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 515 09:18:10.988 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 516 09:22:30.361 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865028 517 09:22:30.361 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 518 09:22:30.381 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 519 09:22:30.381 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 520 09:22:30.391 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865029, seq# expected = 2396865029 521 09:23:10.919 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 522 09:25:21.607 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865029 523 09:25:21.607 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 524 09:25:21.657 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 525 09:25:21.657 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 526 09:25:21.657 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865030, seq# expected = 2396865030 527 09:28:11.872 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 528 09:33:12.324 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 529 09:35:15.561 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865030 530 09:35:15.561 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 531 09:35:15.591 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 532 09:35:15.591 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 533 09:35:15.591 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865031, seq# expected = 2396865031 534 09:38:12.395 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 535 09:42:58.877 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865031 536 09:42:58.877 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 537 09:42:58.897 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 538 09:42:58.897 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 539 09:42:58.897 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865032, seq# expected = 2396865032 540 09:43:11.916 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 541 09:48:12.839 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 542 09:53:13.271 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 543 09:55:00.425 01/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2396865032 544 09:55:00.425 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 545 09:55:00.455 01/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 546 09:55:00.455 01/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 547 09:55:00.455 01/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2396865033, seq# expected = 2396865033 548 09:58:13.703 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 549 10:03:14.135 01/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1096, dst port 4005 550 10:06:24.288 01/31/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 551 10:06:24.288 01/31/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 552 10:06:24.288 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 553 10:06:24.288 01/31/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 417B4324 INBOUND SPI = 32AD6678) 554 10:06:24.288 01/31/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=1ACE87B4 555 10:06:24.288 01/31/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C610C094C9A9AE52 R_Cookie=702F4B2EF10B1558) reason = DEL_REASON_RESET_SADB 556 10:06:24.288 01/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 557 10:06:24.288 01/31/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C610C094C9A9AE52 R_Cookie=702F4B2EF10B1558) reason = DEL_REASON_RESET_SADB 558 10:06:24.288 01/31/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 559 10:06:24.288 01/31/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 560 10:06:24.318 01/31/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 561 10:06:24.318 01/31/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1096 for TCP connection. 562 10:06:24.318 01/31/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 12:43:33 563 10:06:24.328 01/31/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 564 10:06:25.850 01/31/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 565 10:06:25.850 01/31/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 566 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7866ad32 567 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7866ad32 568 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x24437b41 569 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x24437b41 570 10:06:25.860 01/31/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1096, dst port 4005 571 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 572 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 573 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 574 10:06:25.860 01/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys