EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 04:17:14.845 02/23/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 04:17:14.905 02/23/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 04:17:14.905 02/23/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 04:17:15.045 02/23/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1092 for TCP connection. 5 04:17:15.045 02/23/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 04:17:15.045 02/23/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 04:17:15.045 02/23/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1092, dst port 4005 8 04:17:15.787 02/23/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1092 9 04:17:15.787 02/23/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1092, dst port 4005 10 04:17:15.787 02/23/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 04:17:16.287 02/23/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 04:17:16.307 02/23/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 04:17:16.377 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 04:17:16.548 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 04:17:16.548 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 04:17:16.548 02/23/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 04:17:16.548 02/23/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 04:17:16.548 02/23/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 04:17:16.558 02/23/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 04:17:16.578 02/23/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 04:17:16.578 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 04:17:16.578 02/23/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 04:17:16.578 02/23/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 04:17:16.608 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 04:17:16.608 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 04:17:16.608 02/23/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 04:17:16.608 02/23/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B2F71FE60CE62EA9 R_Cookie=1EFE7BB62D54CCAA) reason = DEL_REASON_LOAD_BALANCING 28 04:17:16.608 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 04:17:17.289 02/23/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B2F71FE60CE62EA9 R_Cookie=1EFE7BB62D54CCAA) reason = DEL_REASON_LOAD_BALANCING 30 04:17:17.289 02/23/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 04:17:17.289 02/23/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 04:17:17.289 02/23/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 04:17:17.299 02/23/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 04:17:17.789 02/23/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1092, dst port 4005 35 04:17:17.789 02/23/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1092, dst port 4005 36 04:17:17.789 02/23/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1092 37 04:17:17.789 02/23/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1092, dst port 4005 38 04:17:17.799 02/23/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 04:17:18.290 02/23/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 04:17:18.310 02/23/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 04:17:18.330 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 04:17:18.500 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 04:17:18.500 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 04:17:18.500 02/23/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 04:17:18.500 02/23/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 04:17:18.500 02/23/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 04:17:18.500 02/23/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 04:17:18.510 02/23/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 04:17:18.510 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 04:17:18.510 02/23/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 04:17:18.510 02/23/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 04:17:48.544 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 04:17:48.544 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 04:17:48.544 02/23/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 04:18:00.070 02/23/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 04:18:00.070 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 04:18:03.365 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 04:18:03.365 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 04:18:03.365 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 04:18:03.365 02/23/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 04:18:03.455 02/23/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 04:18:03.455 02/23/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 04:18:03.455 02/23/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 04:18:03.455 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 04:18:04.386 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 04:18:04.386 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 04:18:04.386 02/23/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.147 68 04:18:04.386 02/23/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 04:18:04.386 02/23/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 04:18:04.386 02/23/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 04:18:04.396 02/23/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 04:18:04.497 02/23/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 04:18:04.517 02/23/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.147, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 04:18:04.517 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 04:18:04.517 02/23/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 04:18:04.517 02/23/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 04:18:04.557 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 46 seconds, setting expiry to 86354 seconds from now 89 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 04:18:04.557 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 04:18:04.557 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=46E76CCD OUTBOUND SPI = 0x764C2D87 INBOUND SPI = 0x8B2FB424) 94 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x764C2D87 95 04:18:04.557 02/23/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x8B2FB424 96 04:18:07.311 02/23/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.147/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 04:18:07.361 02/23/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 04:18:07.411 02/23/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 04:18:07.501 02/23/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.13.32.147, 192.168.6.1, 192.168.5.1. 100 04:18:07.521 02/23/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.147. Current address(es): 192.168.1.104, 10.13.32.147, 192.168.6.1, 192.168.5.1. 101 04:18:07.691 02/23/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 04:18:07.691 02/23/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x872d4c76 into key list 103 04:18:07.691 02/23/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 04:18:07.691 02/23/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x24b42f8b into key list 105 04:18:07.691 02/23/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x872d4c76 for inbound key with SPI=0x24b42f8b 106 04:18:07.691 02/23/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.147 107 04:19:39.274 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989053 108 04:19:39.274 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 04:19:39.305 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 04:19:39.305 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 04:19:39.305 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989054, seq# expected = 31989054 112 04:20:25.445 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989054 113 04:20:25.445 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 114 04:20:25.475 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 115 04:20:25.475 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 116 04:20:25.475 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989055, seq# expected = 31989055 117 04:22:18.363 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 118 04:27:19.444 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 119 04:32:19.846 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 120 04:37:19.291 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 121 04:42:20.223 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 122 04:45:25.493 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989055 123 04:45:25.493 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 124 04:45:25.523 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 125 04:45:25.523 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 126 04:45:25.523 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989056, seq# expected = 31989056 127 04:47:20.160 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 128 04:52:21.099 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 129 04:57:21.983 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 130 05:02:21.895 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 131 05:05:39.167 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989056 132 05:05:39.167 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 133 05:05:39.197 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 134 05:05:39.197 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 135 05:05:39.197 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989057, seq# expected = 31989057 136 05:07:21.808 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 137 05:12:22.770 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 138 05:17:23.228 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 139 05:20:41.008 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989057 140 05:20:41.008 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 141 05:20:41.038 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 142 05:20:41.038 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 143 05:20:41.038 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989058, seq# expected = 31989058 144 05:22:23.153 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 145 05:27:24.082 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 146 05:32:24.530 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 147 05:35:38.295 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989058 148 05:35:38.295 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 149 05:35:43.302 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989059 150 05:35:43.302 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 151 05:35:43.332 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 152 05:35:43.332 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 153 05:35:43.332 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989060, seq# expected = 31989060 154 05:37:24.446 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 155 05:42:25.372 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 156 05:44:56.590 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989060 157 05:44:56.590 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 158 05:44:56.620 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 159 05:44:56.620 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 160 05:44:56.620 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989061, seq# expected = 31989061 161 05:45:07.105 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989061 162 05:45:07.105 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 163 05:45:07.125 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 164 05:45:07.125 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 165 05:45:07.125 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989062, seq# expected = 31989062 166 05:47:26.308 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 167 05:52:26.246 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 168 05:57:26.172 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 169 06:02:27.111 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 170 06:05:40.396 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989062 171 06:05:40.396 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 172 06:05:40.426 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 173 06:05:40.426 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 174 06:05:40.426 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989063, seq# expected = 31989063 175 06:07:27.048 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 176 06:07:51.583 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989063 177 06:07:51.583 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 178 06:07:51.633 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 179 06:07:51.633 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 180 06:07:51.633 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989064, seq# expected = 31989064 181 06:12:27.978 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 182 06:17:28.407 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 183 06:20:41.182 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989064 184 06:20:41.182 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 185 06:20:41.212 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 186 06:20:41.212 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 187 06:20:41.212 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989065, seq# expected = 31989065 188 06:20:56.704 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989065 189 06:20:56.704 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 190 06:20:56.724 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 191 06:20:56.724 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 192 06:20:56.724 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989066, seq# expected = 31989066 193 06:22:28.335 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 194 06:27:29.265 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 195 06:32:29.704 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 196 06:34:24.868 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989066 197 06:34:24.868 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 198 06:34:24.898 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 199 06:34:24.898 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 200 06:34:24.898 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989067, seq# expected = 31989067 201 06:35:40.476 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989067 202 06:35:40.476 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 06:35:40.506 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 06:35:40.506 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 06:35:40.506 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989068, seq# expected = 31989068 206 06:37:29.632 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 207 06:42:30.562 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 208 06:46:26.899 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989068 209 06:46:26.899 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 210 06:46:26.929 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 211 06:46:26.929 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 212 06:46:26.929 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989069, seq# expected = 31989069 213 06:47:30.500 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 214 06:49:38.172 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989069 215 06:49:38.172 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 216 06:49:38.192 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 217 06:49:38.192 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 218 06:49:38.192 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989070, seq# expected = 31989070 219 06:50:38.759 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989070 220 06:50:38.759 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 221 06:50:38.789 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 222 06:50:38.789 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 223 06:50:38.789 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989071, seq# expected = 31989071 224 06:52:30.920 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 225 06:57:31.370 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 226 06:58:24.946 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989071 227 06:58:24.946 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 228 06:58:24.976 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 229 06:58:24.976 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 230 06:58:24.976 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989072, seq# expected = 31989072 231 07:02:32.300 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 232 07:05:41.079 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989072 233 07:05:41.079 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 234 07:05:41.109 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 235 07:05:41.109 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 236 07:05:41.109 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989073, seq# expected = 31989073 237 07:07:32.238 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 238 07:10:23.483 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989073 239 07:10:23.483 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 240 07:10:23.513 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 241 07:10:23.513 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 242 07:10:23.513 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989074, seq# expected = 31989074 243 07:12:33.170 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 244 07:17:33.600 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 245 07:18:47.205 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989074 246 07:18:47.205 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 07:18:47.235 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 07:18:47.235 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 07:18:47.235 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989075, seq# expected = 31989075 250 07:22:34.029 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 251 07:27:34.458 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 252 07:29:52.164 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989075 253 07:29:52.164 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 254 07:29:52.194 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 255 07:29:52.194 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 256 07:29:52.194 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989076, seq# expected = 31989076 257 07:34:19.035 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989076 258 07:34:19.035 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 259 07:34:19.065 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 260 07:34:19.065 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 261 07:34:19.065 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989077, seq# expected = 31989077 262 07:35:39.650 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989077 263 07:35:39.650 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 264 07:35:39.680 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 265 07:35:39.680 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 266 07:35:39.680 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989078, seq# expected = 31989078 267 07:37:35.316 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 268 07:42:35.745 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 269 07:46:23.610 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989078 270 07:46:23.610 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 271 07:46:23.640 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 272 07:46:23.640 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 273 07:46:23.640 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989079, seq# expected = 31989079 274 07:47:35.724 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 275 07:52:36.677 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 276 07:55:06.902 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989079 277 07:55:06.902 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 07:55:06.932 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 07:55:06.932 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 07:55:06.932 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989080, seq# expected = 31989080 281 07:57:36.626 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 282 07:58:27.703 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989080 283 07:58:27.703 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 284 07:58:27.733 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 285 07:58:27.733 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 286 07:58:27.733 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989081, seq# expected = 31989081 287 08:02:38.078 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 288 08:05:40.351 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989081 289 08:05:40.351 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 290 08:05:40.381 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 291 08:05:40.381 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 292 08:05:40.381 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989082, seq# expected = 31989082 293 08:07:37.526 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 294 08:08:11.076 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989082 295 08:08:11.076 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 296 08:08:11.116 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 297 08:08:11.116 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 298 08:08:11.116 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989083, seq# expected = 31989083 299 08:10:27.280 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989083 300 08:10:27.280 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 301 08:10:27.310 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 302 08:10:27.310 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 303 08:10:27.310 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989084, seq# expected = 31989084 304 08:12:38.477 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 305 08:17:38.927 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 306 08:20:41.210 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989084 307 08:20:41.210 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 308 08:20:41.230 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 309 08:20:41.230 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 310 08:20:41.230 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989085, seq# expected = 31989085 311 08:22:38.886 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 312 08:27:39.837 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 313 08:32:40.287 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 314 08:34:26.446 02/23/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 31989085 315 08:34:26.446 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 316 08:34:26.476 02/23/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 317 08:34:26.476 02/23/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 318 08:34:26.476 02/23/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 31989086, seq# expected = 31989086 319 08:37:40.737 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 320 08:42:41.187 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 321 08:47:41.687 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 322 08:52:42.137 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 323 08:57:42.587 02/23/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1092, dst port 4005 324 09:00:21.605 02/23/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 325 09:00:21.605 02/23/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 326 09:00:21.605 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 327 09:00:21.605 02/23/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 764C2D87 INBOUND SPI = 8B2FB424) 328 09:00:21.605 02/23/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=46E76CCD 329 09:00:21.605 02/23/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=75F84922F7BC2A91 R_Cookie=63DC4834315BADC3) reason = DEL_REASON_RESET_SADB 330 09:00:21.605 02/23/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 331 09:00:21.605 02/23/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=75F84922F7BC2A91 R_Cookie=63DC4834315BADC3) reason = DEL_REASON_RESET_SADB 332 09:00:21.605 02/23/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 333 09:00:21.605 02/23/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 334 09:00:21.615 02/23/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 335 09:00:21.615 02/23/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1092 for TCP connection. 336 09:00:21.615 02/23/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 4:42:14 337 09:00:21.705 02/23/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 338 09:00:24.689 02/23/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 339 09:00:24.689 02/23/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 340 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x24b42f8b 341 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x24b42f8b 342 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x872d4c76 343 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x872d4c76 344 09:00:24.699 02/23/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1092, dst port 4005 345 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 346 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 347 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 348 09:00:24.699 02/23/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys