EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 01:59:58.596 02/08/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 01:59:58.797 02/08/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 01:59:58.797 02/08/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 01:59:58.848 02/08/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1089 for TCP connection. 5 01:59:58.848 02/08/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 01:59:58.848 02/08/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 01:59:58.848 02/08/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1089, dst port 4005 8 01:59:59.823 02/08/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1089 9 01:59:59.823 02/08/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1089, dst port 4005 10 01:59:59.823 02/08/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 02:00:00.326 02/08/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 02:00:00.346 02/08/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 02:00:00.376 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 02:00:00.557 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 02:00:00.557 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 02:00:00.557 02/08/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 02:00:00.557 02/08/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 02:00:00.557 02/08/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 02:00:00.557 02/08/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 02:00:00.577 02/08/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 02:00:00.577 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 02:00:00.577 02/08/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 02:00:00.577 02/08/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 02:00:00.607 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 02:00:00.607 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 02:00:00.607 02/08/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 02:00:00.607 02/08/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=AD18BD79B93B9C9D R_Cookie=F394887A41423E0B) reason = DEL_REASON_LOAD_BALANCING 28 02:00:00.607 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 02:00:01.331 02/08/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=AD18BD79B93B9C9D R_Cookie=F394887A41423E0B) reason = DEL_REASON_LOAD_BALANCING 30 02:00:01.331 02/08/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 02:00:01.331 02/08/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 02:00:01.331 02/08/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 02:00:01.341 02/08/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 02:00:01.834 02/08/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1089, dst port 4005 35 02:00:01.834 02/08/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1089, dst port 4005 36 02:00:01.834 02/08/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1089 37 02:00:01.844 02/08/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1089, dst port 4005 38 02:00:01.844 02/08/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 02:00:02.336 02/08/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 02:00:02.336 02/08/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 02:00:02.346 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 02:00:02.517 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 02:00:02.517 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 02:00:02.517 02/08/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 02:00:02.517 02/08/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 02:00:02.517 02/08/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 02:00:02.517 02/08/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 02:00:02.527 02/08/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 02:00:02.527 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 02:00:02.527 02/08/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 02:00:02.527 02/08/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 02:00:02.558 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 02:00:02.558 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 02:00:02.558 02/08/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 02:00:23.812 02/08/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 02:00:23.812 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 02:00:26.286 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 02:00:26.286 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 02:00:26.286 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 02:00:26.286 02/08/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 02:00:26.356 02/08/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 02:00:26.356 02/08/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 02:00:26.356 02/08/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 02:00:26.356 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 02:00:27.241 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.75 68 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 02:00:27.241 02/08/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 02:00:27.321 02/08/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 02:00:27.341 02/08/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.75, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 02:00:27.341 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 02:00:27.372 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 02:00:27.372 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 02:00:27.372 02/08/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 02:00:27.372 02/08/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 25 seconds, setting expiry to 86375 seconds from now 87 02:00:27.382 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 02:00:27.382 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 02:00:27.382 02/08/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 02:00:27.382 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 02:00:27.382 02/08/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=78C01C62 OUTBOUND SPI = 0x4CB8BBAE INBOUND SPI = 0x260BFC66) 92 02:00:27.382 02/08/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4CB8BBAE 93 02:00:27.382 02/08/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x260BFC66 94 02:00:30.478 02/08/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.75/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 02:00:30.708 02/08/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 02:00:30.748 02/08/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 02:00:30.808 02/08/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.13.8.75, 192.168.6.1, 192.168.5.1. 98 02:00:30.808 02/08/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.75. Current address(es): 192.168.1.104, 10.13.8.75, 192.168.6.1, 192.168.5.1. 99 02:00:31.029 02/08/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 02:00:31.029 02/08/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 02:00:31.029 02/08/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 02:00:31.029 02/08/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xaebbb84c into key list 103 02:00:31.029 02/08/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 02:00:31.029 02/08/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x66fc0b26 into key list 105 02:00:31.029 02/08/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.75 106 02:00:33.993 02/08/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xaebbb84c for inbound key with SPI=0x66fc0b26 107 02:02:32.664 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108747 108 02:02:32.664 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 02:02:32.694 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 02:02:32.694 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 02:02:32.694 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108748, seq# expected = 2350108748 112 02:03:04.219 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108748 113 02:03:04.219 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 02:03:04.239 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 02:03:04.239 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 02:03:04.239 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108749, seq# expected = 2350108749 117 02:05:02.399 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 118 02:10:02.831 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 119 02:15:03.774 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 120 02:20:04.216 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 121 02:25:04.678 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 122 02:30:05.130 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 123 02:35:05.562 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 124 02:40:05.994 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 125 02:45:06.426 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 126 02:50:06.878 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 127 02:55:07.310 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 128 03:00:07.742 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 129 03:05:08.174 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 130 03:10:08.375 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 131 03:15:08.817 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 132 03:20:09.249 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 133 03:25:09.681 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 134 03:30:10.113 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 135 03:35:10.545 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 136 03:40:10.977 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 137 03:45:11.409 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 138 03:50:11.851 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 139 03:55:11.793 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 140 04:00:12.715 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 141 04:05:13.147 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 142 04:10:13.579 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 143 04:15:14.021 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 144 04:20:14.453 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 145 04:25:14.885 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 146 04:30:15.327 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 147 04:35:15.759 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 148 04:45:16.623 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 149 04:50:17.055 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 150 04:55:17.487 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 151 05:00:17.930 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 152 05:05:18.362 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 153 05:10:18.804 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 154 05:15:18.745 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 155 05:20:19.698 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 156 05:25:20.130 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 157 05:30:20.572 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 158 05:35:21.014 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 159 05:40:21.456 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 160 05:45:21.407 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 161 05:50:22.340 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 162 05:55:22.782 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 163 06:00:23.214 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 164 06:05:23.145 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 165 06:10:24.088 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 166 06:15:24.530 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 167 06:17:23.701 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108749 168 06:17:23.701 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 169 06:17:23.721 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 170 06:17:23.721 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 171 06:17:23.721 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108750, seq# expected = 2350108750 172 06:18:04.259 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108750 173 06:18:04.259 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 174 06:18:04.279 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 175 06:18:04.279 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 176 06:18:04.279 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108751, seq# expected = 2350108751 177 06:20:24.962 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 178 06:25:25.414 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 179 06:30:25.425 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 180 06:35:25.857 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 181 06:40:26.289 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 182 06:45:27.222 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 183 06:50:26.682 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 184 06:55:27.615 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 185 07:00:27.576 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 186 07:05:28.499 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 187 07:10:28.941 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 188 07:15:29.393 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 189 07:20:29.835 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 190 07:25:30.297 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 191 07:30:30.729 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 192 07:35:31.171 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 193 07:40:32.104 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 194 07:45:32.045 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 195 07:50:31.977 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 196 07:55:32.939 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 197 08:00:33.401 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 198 08:05:33.853 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 199 08:10:34.285 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 200 08:15:34.727 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 201 08:17:24.886 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108751 202 08:17:24.886 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 203 08:17:24.916 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 204 08:17:24.916 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 205 08:17:24.916 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108752, seq# expected = 2350108752 206 08:18:05.454 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108752 207 08:18:05.454 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 208 08:18:05.474 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 209 08:18:05.474 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 210 08:18:05.474 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108753, seq# expected = 2350108753 211 08:20:35.169 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 212 08:24:28.004 02/08/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xaebbb84c is about to expire, requesting a new one 213 08:24:28.004 02/08/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.75, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 214 08:24:28.004 02/08/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=6B2467E8) Initiator = ID=10.13.8.75 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 215 08:24:28.004 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 216 08:24:28.034 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 217 08:24:28.034 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 218 08:24:28.034 02/08/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 219 08:24:28.034 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 220 08:24:28.034 02/08/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=6B2467E8 OUTBOUND SPI = 0x0F6A384C INBOUND SPI = 0xDDC30E13) 221 08:24:28.034 02/08/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0F6A384C 222 08:24:28.034 02/08/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xDDC30E13 223 08:24:28.034 02/08/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 224 08:24:28.525 02/08/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 225 08:24:28.525 02/08/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4c386a0f into key list 226 08:24:28.525 02/08/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 227 08:24:28.525 02/08/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x130ec3dd into key list 228 08:24:58.037 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 229 08:24:58.037 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 230 08:24:58.037 02/08/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4CB8BBAE INBOUND SPI = 260BFC66) 231 08:24:58.037 02/08/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=78C01C62 232 08:24:58.057 02/08/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x66fc0b26 233 08:24:58.057 02/08/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x66fc0b26 234 08:24:58.057 02/08/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xaebbb84c 235 08:24:58.057 02/08/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xaebbb84c 236 08:24:59.550 02/08/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4c386a0f for inbound key with SPI=0x130ec3dd 237 08:25:35.101 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 238 08:30:36.033 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 239 08:35:36.465 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 240 08:40:37.408 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 241 08:45:36.839 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 242 08:50:37.771 02/08/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1089, dst port 4005 243 08:53:21.507 02/08/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2350108753 244 08:53:21.507 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 245 08:53:21.547 02/08/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 246 08:53:21.547 02/08/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 247 08:53:21.557 02/08/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2350108754, seq# expected = 2350108754 248 08:53:34.606 02/08/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 249 08:53:34.606 02/08/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 250 08:53:34.606 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 251 08:53:34.606 02/08/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = F6A384C INBOUND SPI = DDC30E13) 252 08:53:34.606 02/08/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=6B2467E8 253 08:53:34.606 02/08/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=52CC70ACE7F4A0C9 R_Cookie=6418D6403FD660FA) reason = DEL_REASON_RESET_SADB 254 08:53:34.606 02/08/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 255 08:53:34.606 02/08/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=52CC70ACE7F4A0C9 R_Cookie=6418D6403FD660FA) reason = DEL_REASON_RESET_SADB 256 08:53:34.606 02/08/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 257 08:53:34.606 02/08/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 258 08:53:34.706 02/08/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 259 08:53:34.706 02/08/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1089 for TCP connection. 260 08:53:34.706 02/08/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 6:53:4 261 08:53:34.716 02/08/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 262 08:53:36.458 02/08/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 263 08:53:36.468 02/08/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 264 08:53:36.468 02/08/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x130ec3dd 265 08:53:36.468 02/08/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x130ec3dd 266 08:53:36.468 02/08/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4c386a0f 267 08:53:36.478 02/08/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4c386a0f 268 08:53:36.478 02/08/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1089, dst port 4005 269 08:53:36.478 02/08/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 270 08:53:36.478 02/08/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 271 08:53:36.478 02/08/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 272 08:53:36.478 02/08/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys