EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 23:22:13.156 02/21/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 23:22:13.226 02/21/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 23:22:13.226 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 23:22:13.246 02/21/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1907 for TCP connection. 5 23:22:13.246 02/21/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 23:22:13.246 02/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 23:22:13.246 02/21/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1907, dst port 4005 8 23:22:14.138 02/21/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1907 9 23:22:14.138 02/21/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1907, dst port 4005 10 23:22:14.138 02/21/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 23:22:14.638 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 23:22:14.658 02/21/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 23:22:14.709 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 23:22:14.889 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 23:22:14.889 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 23:22:14.889 02/21/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 23:22:14.889 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 23:22:14.889 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 23:22:14.889 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 23:22:14.909 02/21/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 23:22:14.909 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 23:22:14.909 02/21/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 23:22:14.909 02/21/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 23:22:14.959 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 23:22:14.959 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 23:22:14.959 02/21/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 23:22:14.959 02/21/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=644516E3AD153739 R_Cookie=6BC2B8AA374E9D56) reason = DEL_REASON_LOAD_BALANCING 28 23:22:14.959 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 23:22:15.640 02/21/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=644516E3AD153739 R_Cookie=6BC2B8AA374E9D56) reason = DEL_REASON_LOAD_BALANCING 30 23:22:15.640 02/21/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 23:22:15.640 02/21/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 23:22:15.640 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 23:22:15.660 02/21/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 23:22:16.151 02/21/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1907, dst port 4005 35 23:22:16.151 02/21/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1907, dst port 4005 36 23:22:16.151 02/21/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1907 37 23:22:16.151 02/21/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1907, dst port 4005 38 23:22:16.151 02/21/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 23:22:16.641 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 23:22:16.661 02/21/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 23:22:16.691 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 23:22:16.862 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 23:22:16.862 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 23:22:16.862 02/21/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 23:22:16.862 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 23:22:16.862 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 23:22:16.862 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 23:22:16.872 02/21/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 23:22:16.872 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 23:22:16.872 02/21/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 23:22:16.872 02/21/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 23:22:16.892 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 23:22:16.892 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 23:22:16.892 02/21/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 23:22:25.444 02/21/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 23:22:25.444 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 23:22:27.707 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 23:22:27.707 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 23:22:27.707 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 23:22:27.707 02/21/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0B5377CEAC3900F7 R_Cookie=7E86FDCC7228F7A8) reason = DEL_REASON_WE_FAILED_AUTH 61 23:22:27.707 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 62 23:22:27.777 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 63 23:22:27.777 02/21/07 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=0B5377CEAC3900F7 R_Cookie=7E86FDCC7228F7A8 64 23:22:27.777 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 137.69.115.17 65 23:22:28.178 02/21/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.17, src port 4005, dst port 1907 66 23:22:28.659 02/21/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0B5377CEAC3900F7 R_Cookie=7E86FDCC7228F7A8) reason = DEL_REASON_WE_FAILED_AUTH 67 23:22:28.659 02/21/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.17" because of "DEL_REASON_WE_FAILED_AUTH" 68 23:22:28.659 02/21/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 69 23:22:28.659 02/21/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 70 23:22:28.659 02/21/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1907 for TCP connection. 71 23:22:28.659 02/21/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 72 23:22:28.679 02/21/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1907, dst port 4005 73 23:22:28.679 02/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 23:22:28.679 02/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 75 23:22:28.679 02/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 23:22:28.679 02/21/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 77 23:22:37.822 02/21/07 Sev=Info/4 CM/0x63100002 Begin connection process 78 23:22:37.832 02/21/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 79 23:22:37.832 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 80 23:22:37.832 02/21/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1915 for TCP connection. 81 23:22:38.172 02/21/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 82 23:22:38.172 02/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 83 23:22:38.172 02/21/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 84 23:22:38.172 02/21/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1915, dst port 4005 85 23:22:38.172 02/21/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1915 86 23:22:38.172 02/21/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1915, dst port 4005 87 23:22:38.172 02/21/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 88 23:22:38.683 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 89 23:22:38.703 02/21/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 90 23:22:38.723 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 91 23:22:38.903 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 92 23:22:38.903 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 93 23:22:38.903 02/21/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 94 23:22:38.903 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 95 23:22:38.903 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 96 23:22:38.903 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 97 23:22:38.913 02/21/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 98 23:22:38.913 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 99 23:22:38.913 02/21/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 100 23:22:38.913 02/21/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 101 23:22:38.933 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 102 23:22:38.933 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 103 23:22:38.933 02/21/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 104 23:22:38.933 02/21/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C10B2AAC5F477F9B R_Cookie=A7AC49893BF2C96F) reason = DEL_REASON_LOAD_BALANCING 105 23:22:38.933 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 106 23:22:39.674 02/21/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C10B2AAC5F477F9B R_Cookie=A7AC49893BF2C96F) reason = DEL_REASON_LOAD_BALANCING 107 23:22:39.674 02/21/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 108 23:22:39.674 02/21/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 109 23:22:39.674 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 110 23:22:39.684 02/21/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 111 23:22:40.185 02/21/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1915, dst port 4005 112 23:22:40.185 02/21/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1915, dst port 4005 113 23:22:40.185 02/21/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1915 114 23:22:40.185 02/21/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1915, dst port 4005 115 23:22:40.185 02/21/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 116 23:22:40.676 02/21/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 117 23:22:40.696 02/21/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 118 23:22:40.716 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 119 23:22:40.896 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 120 23:22:40.896 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 121 23:22:40.896 02/21/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 122 23:22:40.896 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 123 23:22:40.896 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 124 23:22:40.896 02/21/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 125 23:22:40.916 02/21/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 126 23:22:40.916 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 127 23:22:40.916 02/21/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 128 23:22:40.916 02/21/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 129 23:22:40.936 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 130 23:22:40.936 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 131 23:22:40.936 02/21/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 132 23:22:58.311 02/21/07 Sev=Info/4 CM/0x63100017 xAuth application returned 133 23:22:58.311 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 134 23:23:00.765 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 135 23:23:00.765 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 136 23:23:00.765 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 137 23:23:00.775 02/21/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 138 23:23:00.825 02/21/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 139 23:23:00.825 02/21/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 140 23:23:00.825 02/21/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 141 23:23:00.825 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 142 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 143 23:23:01.846 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 144 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.4 145 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 146 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 147 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 148 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 149 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 150 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 151 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 152 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 153 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 154 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 155 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 156 23:23:01.846 02/21/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 157 23:23:01.846 02/21/07 Sev=Info/4 CM/0x63100019 Mode Config data received 158 23:23:01.866 02/21/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.4, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 159 23:23:01.866 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 160 23:23:01.866 02/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 161 23:23:01.866 02/21/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 162 23:23:01.896 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 163 23:23:01.906 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 164 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 165 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 21 seconds, setting expiry to 86379 seconds from now 166 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 23:23:01.906 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 168 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 169 23:23:01.906 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 170 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=831C759C OUTBOUND SPI = 0x02E48602 INBOUND SPI = 0xA707873C) 171 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x02E48602 172 23:23:01.906 02/21/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xA707873C 173 23:23:04.250 02/21/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.4/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 174 23:23:04.330 02/21/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 175 23:23:04.350 02/21/07 Sev=Info/4 CM/0x6310001A One secure connection established 176 23:23:04.430 02/21/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.13.8.4, 192.168.6.1, 192.168.5.1. 177 23:23:04.430 02/21/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.4. Current address(es): 192.168.1.104, 10.13.8.4, 192.168.6.1, 192.168.5.1. 178 23:23:04.650 02/21/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 179 23:23:04.650 02/21/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0286e402 into key list 180 23:23:04.650 02/21/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 181 23:23:04.650 02/21/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3c8707a7 into key list 182 23:23:04.650 02/21/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x0286e402 for inbound key with SPI=0x3c8707a7 183 23:23:04.650 02/21/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.4 184 23:27:41.220 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 185 23:28:52.621 02/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213597 186 23:28:52.621 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 23:28:52.651 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 23:28:52.651 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 23:28:52.651 02/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213598, seq# expected = 177213598 190 23:30:28.758 02/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213598 191 23:30:28.758 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 192 23:30:28.798 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 193 23:30:28.798 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 194 23:30:28.798 02/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213599, seq# expected = 177213599 195 23:32:41.948 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 196 23:37:41.879 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 197 23:42:42.305 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 198 23:45:30.517 02/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213599 199 23:45:30.517 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 200 23:45:30.547 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 201 23:45:30.547 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 202 23:45:30.547 02/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213600, seq# expected = 177213600 203 23:47:42.696 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 204 23:52:43.104 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 205 23:55:31.143 02/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213600 206 23:55:31.143 02/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 207 23:55:31.173 02/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 208 23:55:31.173 02/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 209 23:55:31.173 02/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213601, seq# expected = 177213601 210 23:57:43.338 02/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 211 00:02:43.362 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 212 00:07:43.787 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 213 00:12:44.222 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 214 00:17:45.140 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 215 00:22:45.063 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 216 00:25:29.800 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213601 217 00:25:29.800 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 00:25:29.880 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 00:25:29.890 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 00:25:29.890 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213602, seq# expected = 177213602 221 00:27:45.495 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 222 00:32:45.926 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 223 00:35:25.654 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213602 224 00:35:25.654 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 225 00:35:25.734 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 226 00:35:25.734 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 227 00:35:25.734 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213603, seq# expected = 177213603 228 00:37:46.356 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 229 00:40:32.595 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213603 230 00:40:32.595 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 231 00:40:32.625 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 232 00:40:32.625 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 233 00:40:32.625 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213604, seq# expected = 177213604 234 00:42:46.798 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 235 00:47:31.707 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213604 236 00:47:31.707 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 237 00:47:31.788 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 238 00:47:31.788 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 239 00:47:31.788 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213605, seq# expected = 177213605 240 00:47:46.729 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 241 00:52:47.657 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 242 00:57:48.068 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 243 00:59:30.715 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213605 244 00:59:30.715 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 245 00:59:30.735 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 246 00:59:30.735 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 247 00:59:30.735 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213606, seq# expected = 177213606 248 01:02:48.500 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 249 01:07:48.515 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 250 01:10:30.793 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213606 251 01:10:30.793 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 01:10:35.811 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213607 253 01:10:35.811 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 254 01:10:35.831 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 255 01:10:35.831 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 256 01:10:35.831 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213608, seq# expected = 177213608 257 01:12:48.521 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 258 01:17:49.504 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 259 01:22:49.015 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 260 01:25:30.759 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213608 261 01:25:30.759 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 262 01:25:30.779 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 263 01:25:30.779 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 264 01:25:30.779 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213609, seq# expected = 177213609 265 01:27:49.843 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 266 01:32:49.831 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 267 01:35:27.606 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213609 268 01:35:27.606 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 269 01:35:27.636 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 270 01:35:27.636 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 271 01:35:27.636 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213610, seq# expected = 177213610 272 01:37:50.320 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 273 01:38:53.921 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213610 274 01:38:53.921 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 275 01:38:53.941 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 276 01:38:53.941 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 277 01:38:53.941 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213611, seq# expected = 177213611 278 01:42:50.438 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 279 01:45:10.143 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213611 280 01:45:10.143 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 281 01:45:10.203 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 282 01:45:10.203 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 283 01:45:10.203 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213612, seq# expected = 177213612 284 01:47:38.857 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213612 285 01:47:38.857 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 286 01:47:43.874 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213613 287 01:47:43.874 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 288 01:47:43.894 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 289 01:47:43.894 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 290 01:47:43.894 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213614, seq# expected = 177213614 291 01:47:50.364 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 292 01:47:54.369 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213614 293 01:47:54.369 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 294 01:47:54.390 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 295 01:47:54.390 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 296 01:47:54.390 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213615, seq# expected = 177213615 297 01:52:51.296 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 298 01:57:51.728 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 299 02:02:52.170 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 300 02:07:52.132 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 301 02:12:53.565 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 302 02:17:53.517 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 303 02:22:53.954 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 304 02:27:54.413 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 305 02:32:55.363 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 306 02:37:55.301 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 307 02:42:56.231 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 308 02:47:56.159 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 309 02:52:56.607 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 310 02:57:57.557 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 311 03:02:57.996 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 312 03:07:57.924 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 313 03:10:30.142 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213615 314 03:10:30.142 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 315 03:10:30.172 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 316 03:10:30.172 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 317 03:10:30.172 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213616, seq# expected = 177213616 318 03:12:58.353 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 319 03:17:58.782 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 320 03:22:59.227 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 321 03:28:00.205 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 322 03:33:00.159 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 323 03:38:00.634 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 324 03:43:01.570 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 325 03:48:01.504 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 326 03:53:01.959 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 327 03:58:01.879 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 328 04:03:02.159 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 329 04:08:03.582 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 330 04:13:03.513 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 331 04:18:03.444 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 332 04:23:04.367 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 333 04:28:04.799 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 334 04:33:05.243 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 335 04:38:05.676 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 336 04:43:06.609 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 337 04:48:06.550 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 338 04:53:06.482 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 339 04:58:07.414 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 340 05:03:07.846 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 341 05:08:07.798 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 342 05:13:09.231 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 343 05:18:09.152 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 344 05:23:09.084 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 345 05:28:10.517 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 346 05:33:10.959 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 347 05:38:10.400 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 348 05:43:11.332 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 349 05:47:01.663 02/22/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x0286e402 is about to expire, requesting a new one 350 05:47:01.663 02/22/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.4, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 351 05:47:01.663 02/22/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=7B85BC0C) Initiator = ID=10.13.8.4 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 352 05:47:01.663 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 353 05:47:01.694 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 354 05:47:01.694 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 355 05:47:01.694 02/22/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 356 05:47:01.694 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 357 05:47:01.704 02/22/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=7B85BC0C OUTBOUND SPI = 0x4212D71B INBOUND SPI = 0x27558C5A) 358 05:47:01.704 02/22/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4212D71B 359 05:47:01.704 02/22/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x27558C5A 360 05:47:01.704 02/22/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 361 05:47:02.184 02/22/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 362 05:47:02.184 02/22/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x1bd71242 into key list 363 05:47:02.184 02/22/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 364 05:47:02.184 02/22/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x5a8c5527 into key list 365 05:47:31.697 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 366 05:47:31.697 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 367 05:47:31.697 02/22/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2E48602 INBOUND SPI = A707873C) 368 05:47:31.697 02/22/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=831C759C 369 05:47:31.717 02/22/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3c8707a7 370 05:47:31.717 02/22/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3c8707a7 371 05:47:31.717 02/22/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0286e402 372 05:47:31.717 02/22/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0286e402 373 05:47:32.217 02/22/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x1bd71242 for inbound key with SPI=0x5a8c5527 374 05:48:11.274 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 375 05:53:12.196 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 376 05:58:12.628 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 377 06:03:13.060 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 378 06:08:13.502 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 379 06:13:13.934 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 380 06:18:14.366 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 381 06:23:14.308 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 382 06:28:15.230 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 383 06:33:15.702 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 384 06:38:16.635 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 385 06:43:17.067 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 386 06:48:16.989 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 387 06:53:17.397 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 388 06:58:17.836 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 389 07:03:18.265 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 390 07:08:18.694 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 391 07:13:19.123 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 392 07:18:19.572 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 393 07:23:20.011 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 394 07:28:20.440 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 395 07:33:20.869 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 396 07:38:20.847 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 397 07:43:21.777 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 398 07:48:22.706 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 399 07:53:22.134 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 400 07:55:30.818 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213616 401 07:55:30.818 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 402 07:55:35.826 02/22/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 177213617 403 07:55:35.826 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 404 07:55:35.856 02/22/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 405 07:55:35.856 02/22/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 406 07:55:35.856 02/22/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 177213618, seq# expected = 177213618 407 07:58:23.592 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 408 08:03:22.842 02/22/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1915, dst port 4005 409 08:07:53.578 02/22/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 410 08:07:53.578 02/22/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 411 08:07:53.578 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 412 08:07:53.578 02/22/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4212D71B INBOUND SPI = 27558C5A) 413 08:07:53.578 02/22/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=7B85BC0C 414 08:07:53.578 02/22/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=9BD397E32671BC84 R_Cookie=92E6C045593EB70C) reason = DEL_REASON_RESET_SADB 415 08:07:53.578 02/22/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 416 08:07:53.578 02/22/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=9BD397E32671BC84 R_Cookie=92E6C045593EB70C) reason = DEL_REASON_RESET_SADB 417 08:07:53.578 02/22/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 418 08:07:53.578 02/22/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 419 08:07:53.578 02/22/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 420 08:07:53.578 02/22/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1915 for TCP connection. 421 08:07:53.578 02/22/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 8:44:49 422 08:07:53.588 02/22/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 423 08:07:55.090 02/22/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 424 08:07:55.100 02/22/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 425 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x5a8c5527 426 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x5a8c5527 427 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x1bd71242 428 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x1bd71242 429 08:07:55.100 02/22/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1915, dst port 4005 430 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 431 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 432 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 433 08:07:55.100 02/22/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys