EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 09:33:42.765 02/10/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 09:33:43.236 02/10/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 09:33:43.236 02/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 09:33:43.306 02/10/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1088 for TCP connection. 5 09:33:43.316 02/10/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 09:33:43.316 02/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 09:33:43.316 02/10/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1088, dst port 4005 8 09:33:44.217 02/10/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1088 9 09:33:44.217 02/10/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1088, dst port 4005 10 09:33:44.217 02/10/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 09:33:44.718 02/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 09:33:44.758 02/10/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 09:33:44.808 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 09:33:44.968 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 09:33:44.968 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 09:33:44.968 02/10/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 09:33:44.968 02/10/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 09:33:44.968 02/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 09:33:44.968 02/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 09:33:44.998 02/10/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 09:33:44.998 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 09:33:44.998 02/10/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 09:33:44.998 02/10/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 09:33:45.018 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 09:33:45.018 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 09:33:45.018 02/10/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 09:33:45.018 02/10/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C58A0022FCE3CBD8 R_Cookie=6C91E4169A4BBCA1) reason = DEL_REASON_LOAD_BALANCING 28 09:33:45.018 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 09:33:45.719 02/10/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C58A0022FCE3CBD8 R_Cookie=6C91E4169A4BBCA1) reason = DEL_REASON_LOAD_BALANCING 30 09:33:45.719 02/10/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 09:33:45.719 02/10/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 09:33:45.719 02/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 09:33:45.729 02/10/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 09:33:46.220 02/10/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1088, dst port 4005 35 09:33:46.220 02/10/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1088, dst port 4005 36 09:33:46.230 02/10/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1088 37 09:33:46.230 02/10/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1088, dst port 4005 38 09:33:46.230 02/10/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 09:33:46.721 02/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 09:33:46.741 02/10/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 09:33:46.761 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 09:33:46.931 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 09:33:46.931 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 09:33:46.931 02/10/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 09:33:46.931 02/10/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 09:33:46.931 02/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 09:33:46.931 02/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 09:33:46.941 02/10/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 09:33:46.941 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 09:33:46.941 02/10/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 09:33:46.941 02/10/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 09:33:46.971 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 09:33:46.971 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 09:33:46.971 02/10/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 09:33:55.604 02/10/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 09:33:55.604 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 09:34:00.050 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 09:34:00.050 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 09:34:00.050 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 09:34:00.060 02/10/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 09:34:00.150 02/10/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 09:34:00.150 02/10/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 09:34:00.150 02/10/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 09:34:00.150 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 09:34:01.082 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.130 68 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 09:34:01.082 02/10/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 09:34:01.202 02/10/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 09:34:01.212 02/10/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.130, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 09:34:01.212 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 09:34:01.212 02/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 09:34:01.212 02/10/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 09:34:01.272 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 15 seconds, setting expiry to 86385 seconds from now 89 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 09:34:01.272 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 09:34:01.272 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=D2C3C25A OUTBOUND SPI = 0x5CE2747E INBOUND SPI = 0xD86C2CA8) 94 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x5CE2747E 95 09:34:01.272 02/10/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xD86C2CA8 96 09:34:04.086 02/10/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.130/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 09:34:04.186 02/10/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 09:34:04.216 02/10/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 09:34:04.366 02/10/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.13.32.130, 192.168.6.1, 192.168.5.1. 100 09:34:04.376 02/10/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.130. Current address(es): 192.168.1.104, 10.13.32.130, 192.168.6.1, 192.168.5.1. 101 09:34:04.557 02/10/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 09:34:04.557 02/10/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7e74e25c into key list 103 09:34:04.557 02/10/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 09:34:04.557 02/10/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa82c6cd8 into key list 105 09:34:04.557 02/10/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.130 106 09:34:16.263 02/10/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7e74e25c for inbound key with SPI=0xa82c6cd8 107 09:36:10.428 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395705 108 09:36:10.428 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 09:36:10.458 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 09:36:10.458 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 09:36:10.458 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395706, seq# expected = 3278395706 112 09:38:47.654 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 113 09:41:08.356 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395706 114 09:41:08.356 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 115 09:41:08.386 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 116 09:41:08.386 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 117 09:41:08.386 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395707, seq# expected = 3278395707 118 09:41:18.871 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395707 119 09:41:18.871 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 120 09:41:18.901 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 121 09:41:18.901 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 122 09:41:18.901 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395708, seq# expected = 3278395708 123 09:41:29.386 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395708 124 09:41:29.386 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 125 09:41:29.416 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 126 09:41:29.416 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 127 09:41:29.416 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395709, seq# expected = 3278395709 128 09:42:25.487 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395709 129 09:42:25.487 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 130 09:42:25.507 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 131 09:42:25.507 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 132 09:42:25.507 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395710, seq# expected = 3278395710 133 09:43:47.605 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 134 09:46:13.805 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395710 135 09:46:13.805 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 136 09:46:13.845 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 137 09:46:13.845 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 138 09:46:13.845 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395711, seq# expected = 3278395711 139 09:46:29.828 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395711 140 09:46:29.828 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 09:46:29.848 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 09:46:29.848 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 09:46:29.848 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395712, seq# expected = 3278395712 144 09:48:48.528 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 145 09:51:32.110 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395712 146 09:51:32.110 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 147 09:51:32.140 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 148 09:51:32.140 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 149 09:51:32.140 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395713, seq# expected = 3278395713 150 09:53:48.664 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 151 09:56:14.858 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395713 152 09:56:14.868 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 153 09:56:14.898 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 154 09:56:14.898 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 155 09:56:14.898 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395714, seq# expected = 3278395714 156 09:58:49.110 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 157 09:59:12.644 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395714 158 09:59:12.644 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 159 09:59:12.674 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 160 09:59:12.674 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 161 09:59:12.674 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395715, seq# expected = 3278395715 162 10:01:13.317 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395715 163 10:01:13.317 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 164 10:01:13.358 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 165 10:01:13.358 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 166 10:01:13.358 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395716, seq# expected = 3278395716 167 10:01:28.840 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395716 168 10:01:28.840 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 169 10:01:28.870 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 170 10:01:28.870 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 171 10:01:28.870 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395717, seq# expected = 3278395717 172 10:02:29.427 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395717 173 10:02:29.427 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 174 10:02:29.447 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 175 10:02:29.447 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 176 10:02:29.447 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395718, seq# expected = 3278395718 177 10:03:49.041 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 178 10:06:22.262 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395718 179 10:06:22.262 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 180 10:06:22.292 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 181 10:06:22.292 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 182 10:06:22.292 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395719, seq# expected = 3278395719 183 10:08:49.479 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 184 10:11:21.704 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395719 185 10:11:21.704 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 186 10:11:21.734 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 187 10:11:21.734 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 188 10:11:21.734 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395720, seq# expected = 3278395720 189 10:11:32.220 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395720 190 10:11:32.220 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 191 10:11:32.250 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 192 10:11:32.250 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 193 10:11:32.250 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395721, seq# expected = 3278395721 194 10:13:50.422 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 195 10:14:29.981 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395721 196 10:14:29.981 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 197 10:14:30.011 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 198 10:14:30.011 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 199 10:14:30.011 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395722, seq# expected = 3278395722 200 10:16:20.663 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395722 201 10:16:20.663 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 202 10:16:20.693 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 203 10:16:20.693 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 204 10:16:20.693 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395723, seq# expected = 3278395723 205 10:16:31.679 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395723 206 10:16:31.679 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 207 10:16:31.699 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 208 10:16:31.699 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 209 10:16:31.699 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395724, seq# expected = 3278395724 210 10:18:50.893 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 211 10:21:13.102 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395724 212 10:21:13.102 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 213 10:21:13.122 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 214 10:21:13.132 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 215 10:21:13.132 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395725, seq# expected = 3278395725 216 10:21:29.126 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395725 217 10:21:29.126 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 218 10:21:29.156 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 219 10:21:29.156 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 220 10:21:29.156 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395726, seq# expected = 3278395726 221 10:23:51.332 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 222 10:26:17.026 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395726 223 10:26:17.026 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 224 10:26:17.057 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 225 10:26:17.057 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 226 10:26:17.057 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395727, seq# expected = 3278395727 227 10:26:27.541 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395727 228 10:26:27.541 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 229 10:26:27.591 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 230 10:26:27.591 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 231 10:26:27.591 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395728, seq# expected = 3278395728 232 10:28:52.237 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 233 10:33:51.667 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 234 10:36:21.883 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395728 235 10:36:21.883 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 236 10:36:21.913 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 237 10:36:21.913 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 238 10:36:21.913 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395729, seq# expected = 3278395729 239 10:38:28.565 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395729 240 10:38:28.565 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 241 10:38:28.605 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 242 10:38:28.605 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 243 10:38:28.605 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395730, seq# expected = 3278395730 244 10:38:52.099 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 245 10:41:14.812 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395730 246 10:41:14.812 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 10:41:14.842 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 10:41:14.842 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 10:41:14.842 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395731, seq# expected = 3278395731 250 10:43:53.032 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 251 10:46:29.281 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395731 252 10:46:29.281 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 253 10:46:29.311 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 10:46:29.311 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 255 10:46:29.311 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395732, seq# expected = 3278395732 256 10:48:53.487 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 257 10:50:15.103 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395732 258 10:50:15.103 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 259 10:50:15.134 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 260 10:50:15.134 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 261 10:50:15.134 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395733, seq# expected = 3278395733 262 10:51:20.697 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395733 263 10:51:20.697 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 264 10:51:20.737 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 265 10:51:20.737 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 266 10:51:20.737 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395734, seq# expected = 3278395734 267 10:52:46.830 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395734 268 10:52:46.830 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 269 10:52:46.860 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 270 10:52:46.860 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 271 10:52:46.860 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395735, seq# expected = 3278395735 272 10:53:53.435 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 273 10:56:15.128 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395735 274 10:56:15.128 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 275 10:56:15.168 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 10:56:15.168 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 277 10:56:15.168 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395736, seq# expected = 3278395736 278 10:58:54.363 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 279 11:01:29.108 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395736 280 11:01:29.108 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 281 11:01:29.138 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 282 11:01:29.138 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 283 11:01:29.138 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395737, seq# expected = 3278395737 284 11:02:30.711 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395737 285 11:02:30.711 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 286 11:02:30.731 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 287 11:02:30.731 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 288 11:02:30.731 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395738, seq# expected = 3278395738 289 11:03:54.823 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 290 11:06:18.541 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395738 291 11:06:18.541 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 292 11:06:18.571 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 293 11:06:18.571 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 294 11:06:18.571 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395739, seq# expected = 3278395739 295 11:08:55.268 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 296 11:11:16.983 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395739 297 11:11:16.983 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 298 11:11:17.013 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 299 11:11:17.013 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 300 11:11:17.013 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395740, seq# expected = 3278395740 301 11:13:56.214 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 302 11:16:20.413 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395740 303 11:16:20.413 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 304 11:16:20.453 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 305 11:16:20.453 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 306 11:16:20.453 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395741, seq# expected = 3278395741 307 11:18:56.626 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 308 11:21:19.827 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395741 309 11:21:19.827 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 11:21:19.857 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 311 11:21:19.857 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 312 11:21:19.857 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395742, seq# expected = 3278395742 313 11:23:56.551 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 314 11:26:16.751 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395742 315 11:26:16.751 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 316 11:26:16.781 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 317 11:26:16.781 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 318 11:26:16.781 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395743, seq# expected = 3278395743 319 11:26:32.273 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395743 320 11:26:32.273 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 321 11:26:32.303 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 322 11:26:32.303 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 323 11:26:32.303 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395744, seq# expected = 3278395744 324 11:27:50.395 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395744 325 11:27:50.395 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 326 11:27:50.425 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 327 11:27:50.425 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 328 11:27:50.425 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395745, seq# expected = 3278395745 329 11:28:57.000 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 330 11:31:16.689 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395745 331 11:31:16.689 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 332 11:31:16.719 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 333 11:31:16.719 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 334 11:31:16.719 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395746, seq# expected = 3278395746 335 11:33:57.426 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 336 11:36:20.137 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395746 337 11:36:20.137 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 338 11:36:20.167 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 339 11:36:20.167 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 340 11:36:20.167 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395747, seq# expected = 3278395747 341 11:38:57.364 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 342 11:39:49.939 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395747 343 11:39:49.939 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 344 11:39:49.969 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 345 11:39:49.969 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 346 11:39:49.969 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395748, seq# expected = 3278395748 347 11:41:15.562 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395748 348 11:41:15.562 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 349 11:41:15.582 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 350 11:41:15.582 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 351 11:41:15.582 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395749, seq# expected = 3278395749 352 11:41:31.085 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395749 353 11:41:31.085 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 354 11:41:31.115 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 355 11:41:31.115 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 356 11:41:31.115 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395750, seq# expected = 3278395750 357 11:43:58.296 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 358 11:48:58.728 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 359 11:51:23.440 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395750 360 11:51:23.440 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 361 11:51:23.490 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 362 11:51:23.490 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 363 11:51:23.490 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395751, seq# expected = 3278395751 364 11:51:48.976 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395751 365 11:51:48.976 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 366 11:51:49.006 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 367 11:51:49.006 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 368 11:51:49.006 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395752, seq# expected = 3278395752 369 11:53:59.168 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 370 11:56:20.391 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395752 371 11:56:20.391 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 372 11:56:20.441 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 373 11:56:20.451 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 374 11:56:20.451 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395753, seq# expected = 3278395753 375 11:59:00.141 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 376 12:01:30.848 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395753 377 12:01:30.848 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 378 12:01:30.878 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 379 12:01:30.878 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 380 12:01:30.878 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395754, seq# expected = 3278395754 381 12:01:46.871 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395754 382 12:01:46.871 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 383 12:01:46.921 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 384 12:01:46.921 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 385 12:01:46.931 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395755, seq# expected = 3278395755 386 12:03:47.544 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395755 387 12:03:47.554 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 388 12:03:47.584 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 389 12:03:47.584 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 390 12:03:47.584 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395756, seq# expected = 3278395756 391 12:04:00.062 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 392 12:06:23.770 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395756 393 12:06:23.770 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 394 12:06:23.820 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 395 12:06:23.820 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 396 12:06:23.820 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395757, seq# expected = 3278395757 397 12:09:00.518 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 398 12:11:18.719 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395757 399 12:11:18.719 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 400 12:11:18.739 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 401 12:11:18.749 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 402 12:11:18.749 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395758, seq# expected = 3278395758 403 12:14:00.942 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 404 12:15:46.094 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395758 405 12:15:46.094 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 406 12:15:46.124 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 407 12:15:46.124 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 408 12:15:46.124 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395759, seq# expected = 3278395759 409 12:16:19.141 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395759 410 12:16:19.141 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 411 12:16:19.171 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 412 12:16:19.171 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 413 12:16:19.171 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395760, seq# expected = 3278395760 414 12:16:29.666 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395760 415 12:16:29.666 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 416 12:16:29.696 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 417 12:16:29.696 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 418 12:16:29.696 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395761, seq# expected = 3278395761 419 12:19:01.384 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 420 12:21:24.590 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395761 421 12:21:24.590 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 422 12:21:24.630 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 423 12:21:24.630 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 424 12:21:24.630 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395762, seq# expected = 3278395762 425 12:24:01.324 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 426 12:26:18.016 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395762 427 12:26:18.016 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 428 12:26:18.046 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 429 12:26:18.046 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 430 12:26:18.046 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395763, seq# expected = 3278395763 431 12:27:44.137 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395763 432 12:27:44.137 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 433 12:27:44.157 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 434 12:27:44.157 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 435 12:27:44.157 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395764, seq# expected = 3278395764 436 12:29:01.749 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 437 12:31:16.442 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395764 438 12:31:16.442 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 439 12:31:16.472 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 440 12:31:16.472 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 441 12:31:16.472 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395765, seq# expected = 3278395765 442 12:31:31.965 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395765 443 12:31:31.965 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 444 12:31:31.995 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 445 12:31:31.995 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 446 12:31:31.995 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395766, seq# expected = 3278395766 447 12:34:02.691 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 448 12:39:03.133 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 449 12:41:15.826 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395766 450 12:41:15.826 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 451 12:41:15.866 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 452 12:41:15.866 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 453 12:41:15.866 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395767, seq# expected = 3278395767 454 12:41:31.359 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395767 455 12:41:31.359 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 456 12:41:31.399 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 457 12:41:31.399 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 458 12:41:31.399 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395768, seq# expected = 3278395768 459 12:44:03.080 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 460 12:46:22.802 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395768 461 12:46:22.802 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 462 12:46:22.842 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 463 12:46:22.842 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 464 12:46:22.842 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395769, seq# expected = 3278395769 465 12:49:04.033 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 466 12:51:21.231 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395769 467 12:51:21.231 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 468 12:51:21.271 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 469 12:51:21.271 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 470 12:51:21.271 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395770, seq# expected = 3278395770 471 12:51:46.767 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395770 472 12:51:46.767 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 473 12:51:46.797 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 474 12:51:46.797 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 475 12:51:46.797 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395771, seq# expected = 3278395771 476 12:54:04.465 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 477 12:56:20.661 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395771 478 12:56:20.661 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 479 12:56:20.691 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 480 12:56:20.691 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 481 12:56:20.701 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395772, seq# expected = 3278395772 482 12:57:16.241 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395772 483 12:57:16.241 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 484 12:57:16.261 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 485 12:57:16.261 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 486 12:57:16.261 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395773, seq# expected = 3278395773 487 12:57:26.756 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395773 488 12:57:26.756 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 489 12:57:26.786 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 490 12:57:26.786 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 491 12:57:26.786 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395774, seq# expected = 3278395774 492 12:59:04.397 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 493 13:03:45.801 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395774 494 13:03:45.801 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 495 13:03:45.831 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 496 13:03:45.831 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 497 13:03:45.831 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395775, seq# expected = 3278395775 498 13:04:04.829 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 499 13:06:22.547 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395775 500 13:06:22.547 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 501 13:06:22.617 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 502 13:06:22.617 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 503 13:06:22.627 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395776, seq# expected = 3278395776 504 13:09:05.291 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 505 13:11:24.992 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395776 506 13:11:24.992 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 507 13:11:25.022 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 508 13:11:25.022 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 509 13:11:25.022 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395777, seq# expected = 3278395777 510 13:14:06.714 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 511 13:15:44.351 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395777 512 13:15:44.351 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 513 13:15:44.381 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 514 13:15:44.381 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 515 13:15:44.381 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395778, seq# expected = 3278395778 516 13:16:30.416 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395778 517 13:16:30.416 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 518 13:16:30.446 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 519 13:16:30.446 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 520 13:16:30.446 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395779, seq# expected = 3278395779 521 13:19:06.636 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 522 13:21:17.824 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395779 523 13:21:17.824 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 524 13:21:17.854 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 525 13:21:17.854 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 526 13:21:17.854 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395780, seq# expected = 3278395780 527 13:24:07.075 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 528 13:25:15.173 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395780 529 13:25:15.173 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 530 13:25:15.223 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 531 13:25:15.223 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 532 13:25:15.223 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395781, seq# expected = 3278395781 533 13:26:16.771 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395781 534 13:26:16.771 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 535 13:26:16.801 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 536 13:26:16.801 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 537 13:26:16.801 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395782, seq# expected = 3278395782 538 13:27:42.884 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395782 539 13:27:42.884 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 540 13:27:42.924 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 541 13:27:42.924 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 542 13:27:42.924 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395783, seq# expected = 3278395783 543 13:29:07.004 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 544 13:31:23.198 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395783 545 13:31:23.198 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 546 13:31:23.228 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 547 13:31:23.228 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 548 13:31:23.228 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395784, seq# expected = 3278395784 549 13:34:07.933 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 550 13:39:08.372 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 551 13:39:44.915 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395784 552 13:39:44.915 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 553 13:39:44.945 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 554 13:39:44.945 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 555 13:39:44.945 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395785, seq# expected = 3278395785 556 13:41:17.046 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395785 557 13:41:17.046 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 558 13:41:17.066 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 559 13:41:17.066 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 560 13:41:17.066 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395786, seq# expected = 3278395786 561 13:44:08.791 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 562 13:46:16.474 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395786 563 13:46:16.474 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 564 13:46:16.504 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 565 13:46:16.504 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 566 13:46:16.504 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395787, seq# expected = 3278395787 567 13:46:31.996 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395787 568 13:46:31.996 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 569 13:46:32.026 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 570 13:46:32.026 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 571 13:46:32.026 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395788, seq# expected = 3278395788 572 13:49:09.232 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 573 13:51:17.417 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395788 574 13:51:17.417 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 575 13:51:17.447 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 576 13:51:17.447 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 577 13:51:17.447 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395789, seq# expected = 3278395789 578 13:51:48.462 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395789 579 13:51:48.462 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 580 13:51:48.492 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 581 13:51:48.492 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 582 13:51:48.492 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395790, seq# expected = 3278395790 583 13:54:09.665 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 584 13:55:46.804 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395790 585 13:55:46.804 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 586 13:55:46.824 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 587 13:55:46.824 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 588 13:55:46.824 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395791, seq# expected = 3278395791 589 13:56:12.841 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395791 590 13:56:12.841 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 591 13:56:12.861 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 592 13:56:12.861 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 593 13:56:12.861 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395792, seq# expected = 3278395792 594 13:59:10.595 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 595 14:01:33.299 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395792 596 14:01:33.299 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 597 14:01:33.349 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 598 14:01:33.349 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 599 14:01:33.349 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395793, seq# expected = 3278395793 600 14:03:46.489 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395793 601 14:03:46.489 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 602 14:03:46.519 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 603 14:03:46.519 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 604 14:03:46.519 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395794, seq# expected = 3278395794 605 14:04:10.523 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 606 14:06:18.716 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395794 607 14:06:18.716 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 608 14:06:18.746 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 609 14:06:18.746 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 610 14:06:18.746 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395795, seq# expected = 3278395795 611 14:09:10.472 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 612 14:11:12.636 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395795 613 14:11:12.646 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 614 14:11:12.666 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 615 14:11:12.666 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 616 14:11:12.666 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395796, seq# expected = 3278395796 617 14:14:11.892 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 618 14:15:44.524 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395796 619 14:15:44.524 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 620 14:15:44.554 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 621 14:15:44.554 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 622 14:15:44.554 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395797, seq# expected = 3278395797 623 14:19:11.820 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 624 14:24:12.257 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 625 14:26:16.443 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395797 626 14:26:16.443 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 627 14:26:16.483 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 628 14:26:16.483 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 629 14:26:16.483 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395798, seq# expected = 3278395798 630 14:26:31.966 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395798 631 14:26:31.966 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 632 14:26:31.996 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 633 14:26:31.996 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 634 14:26:31.996 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395799, seq# expected = 3278395799 635 14:27:48.579 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395799 636 14:27:48.579 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 637 14:27:48.609 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 638 14:27:48.609 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 639 14:27:48.609 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395800, seq# expected = 3278395800 640 14:29:12.210 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 641 14:34:13.132 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 642 14:36:17.311 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395800 643 14:36:17.311 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 644 14:36:17.351 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 645 14:36:17.351 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 646 14:36:17.351 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395801, seq# expected = 3278395801 647 14:39:14.065 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 648 14:44:13.996 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 649 14:47:07.756 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395801 650 14:47:07.756 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 651 14:47:07.836 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 652 14:47:07.836 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 653 14:47:07.836 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395802, seq# expected = 3278395802 654 14:47:18.271 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395802 655 14:47:18.271 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 656 14:47:18.291 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 657 14:47:18.291 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 658 14:47:18.291 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395803, seq# expected = 3278395803 659 14:47:28.817 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395803 660 14:47:28.817 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 661 14:47:28.857 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 662 14:47:28.857 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 663 14:47:28.857 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395804, seq# expected = 3278395804 664 14:47:54.383 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395804 665 14:47:54.383 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 666 14:47:54.413 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 667 14:47:54.413 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 668 14:47:54.413 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395805, seq# expected = 3278395805 669 14:48:04.918 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395805 670 14:48:04.918 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 671 14:48:04.949 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 672 14:48:04.949 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 673 14:48:04.949 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395806, seq# expected = 3278395806 674 14:49:13.587 02/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1088, dst port 4005 675 14:51:16.925 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395806 676 14:51:16.925 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 677 14:51:21.932 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395807 678 14:51:21.932 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 679 14:51:21.962 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 680 14:51:21.962 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 681 14:51:21.962 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395808, seq# expected = 3278395808 682 14:51:32.457 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395808 683 14:51:32.457 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 684 14:51:32.477 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 685 14:51:32.477 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 686 14:51:32.477 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395809, seq# expected = 3278395809 687 14:54:10.744 02/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3278395809 688 14:54:10.744 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 689 14:54:10.775 02/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 690 14:54:10.775 02/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 691 14:54:10.785 02/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3278395810, seq# expected = 3278395810 692 14:54:12.187 02/10/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 693 14:54:12.187 02/10/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 694 14:54:12.187 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 695 14:54:12.187 02/10/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 5CE2747E INBOUND SPI = D86C2CA8) 696 14:54:12.187 02/10/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=D2C3C25A 697 14:54:12.187 02/10/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8B17C440C5F33DB3 R_Cookie=80C694D9F319F1F0) reason = DEL_REASON_RESET_SADB 698 14:54:12.187 02/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 699 14:54:12.187 02/10/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8B17C440C5F33DB3 R_Cookie=80C694D9F319F1F0) reason = DEL_REASON_RESET_SADB 700 14:54:12.187 02/10/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 701 14:54:12.187 02/10/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 702 14:54:12.237 02/10/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 703 14:54:12.237 02/10/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1088 for TCP connection. 704 14:54:12.237 02/10/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 5:20:8 705 14:54:12.257 02/10/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 706 14:54:14.019 02/10/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 707 14:54:14.019 02/10/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 708 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa82c6cd8 709 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa82c6cd8 710 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7e74e25c 711 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7e74e25c 712 14:54:14.029 02/10/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1088, dst port 4005 713 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 714 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 715 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 716 14:54:14.029 02/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys