EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 23:19:54.933 02/27/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 23:19:55.063 02/27/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 23:19:55.063 02/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 23:19:55.073 02/27/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1091 for TCP connection. 5 23:19:55.083 02/27/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 23:19:55.083 02/27/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 23:19:55.083 02/27/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1091, dst port 4005 8 23:19:55.794 02/27/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1091 9 23:19:55.794 02/27/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1091, dst port 4005 10 23:19:55.794 02/27/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 23:19:56.295 02/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 23:19:56.315 02/27/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 23:19:56.345 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 23:19:56.515 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 23:19:56.515 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 23:19:56.515 02/27/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 23:19:56.515 02/27/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 23:19:56.515 02/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 23:19:56.515 02/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 23:19:56.545 02/27/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 23:19:56.545 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 23:19:56.545 02/27/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 23:19:56.545 02/27/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 23:19:56.565 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 23:19:56.565 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 23:19:56.565 02/27/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 23:19:56.565 02/27/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8DF8F9A87D8F8D0D R_Cookie=5E9819BC5FB3820D) reason = DEL_REASON_LOAD_BALANCING 28 23:19:56.565 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 23:19:57.296 02/27/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8DF8F9A87D8F8D0D R_Cookie=5E9819BC5FB3820D) reason = DEL_REASON_LOAD_BALANCING 30 23:19:57.296 02/27/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 23:19:57.296 02/27/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 23:19:57.296 02/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 23:19:57.306 02/27/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 23:19:57.797 02/27/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1091, dst port 4005 35 23:19:57.797 02/27/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1091, dst port 4005 36 23:19:57.797 02/27/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1091 37 23:19:57.797 02/27/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1091, dst port 4005 38 23:19:57.797 02/27/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 23:19:58.297 02/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 23:19:58.307 02/27/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 23:19:58.327 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 23:19:58.498 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 23:19:58.498 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 23:19:58.498 02/27/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 23:19:58.498 02/27/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 23:19:58.498 02/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 23:19:58.498 02/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 23:19:58.528 02/27/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 23:19:58.528 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 23:19:58.528 02/27/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 23:19:58.528 02/27/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 23:19:58.548 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 23:19:58.548 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 23:19:58.548 02/27/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 23:20:10.335 02/27/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 23:20:10.335 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 23:20:16.093 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 23:20:16.093 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 23:20:16.093 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 23:20:16.093 02/27/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 23:20:16.173 02/27/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 23:20:16.173 02/27/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 23:20:16.173 02/27/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 23:20:16.173 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 23:20:17.074 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.66 68 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 23:20:17.074 02/27/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 23:20:17.155 02/27/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 23:20:17.175 02/27/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.66, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 23:20:17.175 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 23:20:17.205 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 84 23:20:17.205 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 85 23:20:17.205 02/27/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 23:20:17.205 02/27/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 19 seconds, setting expiry to 86381 seconds from now 87 23:20:17.215 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 88 23:20:17.215 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 89 23:20:17.215 02/27/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 23:20:17.215 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 91 23:20:17.215 02/27/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B9A9642C OUTBOUND SPI = 0x22DEF466 INBOUND SPI = 0xEE1B0D3A) 92 23:20:17.215 02/27/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x22DEF466 93 23:20:17.215 02/27/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xEE1B0D3A 94 23:20:20.139 02/27/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.66/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 23:20:20.269 02/27/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 23:20:20.329 02/27/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 23:20:20.389 02/27/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.104. Current address(es): 192.168.1.104, 10.13.32.66, 192.168.6.1, 192.168.5.1. 98 23:20:20.389 02/27/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.66. Current address(es): 192.168.1.104, 10.13.32.66, 192.168.6.1, 192.168.5.1. 99 23:20:20.619 02/27/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 23:20:20.619 02/27/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 23:20:20.619 02/27/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 23:20:20.619 02/27/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x66f4de22 into key list 103 23:20:20.619 02/27/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 23:20:20.619 02/27/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3a0d1bee into key list 105 23:20:20.619 02/27/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.66 106 23:20:24.836 02/27/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x66f4de22 for inbound key with SPI=0x3a0d1bee 107 23:22:55.502 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928479 108 23:22:55.502 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 23:22:55.532 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 23:22:55.532 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 23:22:55.532 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928480, seq# expected = 2370928480 112 23:24:59.180 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 113 23:28:00.040 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928480 114 23:28:00.040 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 115 23:28:00.110 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 116 23:28:00.110 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 117 23:28:00.110 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928481, seq# expected = 2370928481 118 23:29:58.721 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 119 23:31:31.855 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928481 120 23:31:31.855 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 121 23:31:31.875 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 122 23:31:31.875 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 123 23:31:31.875 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928482, seq# expected = 2370928482 124 23:34:59.653 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 125 23:36:55.400 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928482 126 23:36:55.400 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 127 23:36:55.420 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 128 23:36:55.420 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 129 23:36:55.420 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928483, seq# expected = 2370928483 130 23:39:59.801 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 131 23:45:00.789 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 132 23:50:00.801 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 133 23:52:59.542 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928483 134 23:52:59.542 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 135 23:53:04.550 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928484 136 23:53:04.550 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 137 23:53:04.580 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 138 23:53:04.580 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 139 23:53:04.580 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928485, seq# expected = 2370928485 140 23:55:00.744 02/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 141 23:59:27.960 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928485 142 23:59:27.960 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 143 23:59:27.990 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 144 23:59:27.990 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 145 23:59:27.990 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928486, seq# expected = 2370928486 146 23:59:38.476 02/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928486 147 23:59:38.476 02/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 148 23:59:38.507 02/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 149 23:59:38.507 02/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 150 23:59:38.507 02/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928487, seq# expected = 2370928487 151 00:00:01.011 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 152 00:00:54.594 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928487 153 00:00:54.594 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 154 00:00:54.634 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 155 00:00:54.634 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 156 00:00:54.634 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928488, seq# expected = 2370928488 157 00:05:01.984 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 158 00:10:02.421 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 159 00:15:02.772 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 160 00:20:03.221 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 161 00:22:58.482 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928488 162 00:22:58.482 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 163 00:22:58.512 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 164 00:22:58.512 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 165 00:22:58.512 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928489, seq# expected = 2370928489 166 00:24:54.658 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928489 167 00:24:54.658 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 168 00:24:54.688 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 169 00:24:54.688 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 170 00:24:54.688 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928490, seq# expected = 2370928490 171 00:25:03.170 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 172 00:35:03.804 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 173 00:38:02.690 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928490 174 00:38:02.690 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 175 00:38:02.720 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 176 00:38:02.720 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 177 00:38:02.720 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928491, seq# expected = 2370928491 178 00:40:03.973 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 179 00:45:04.071 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 180 00:50:04.746 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 181 00:55:04.279 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 182 00:55:30.828 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928491 183 00:55:30.828 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 184 00:55:30.858 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 185 00:55:30.858 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 186 00:55:30.858 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928492, seq# expected = 2370928492 187 01:00:04.995 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 188 01:05:04.630 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 189 01:10:04.801 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 190 01:15:05.040 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 191 01:20:05.494 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 192 01:23:03.311 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928492 193 01:23:03.311 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 194 01:23:08.328 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928493 195 01:23:08.328 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 196 01:23:08.358 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 197 01:23:08.358 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 198 01:23:08.358 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928494, seq# expected = 2370928494 199 01:25:05.034 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 200 01:30:05.991 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 201 01:35:06.056 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 202 01:40:06.128 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 203 01:45:05.742 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 204 01:50:06.385 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 205 01:52:59.740 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928494 206 01:52:59.740 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 207 01:52:59.770 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 208 01:52:59.770 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 209 01:52:59.770 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928495, seq# expected = 2370928495 210 01:55:07.015 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 211 02:00:06.634 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 212 02:05:06.804 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 213 02:06:42.457 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928495 214 02:06:42.457 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 215 02:06:42.477 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 216 02:06:42.477 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 217 02:06:42.477 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928496, seq# expected = 2370928496 218 02:08:03.588 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928496 219 02:08:03.588 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 220 02:08:03.608 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 221 02:08:03.608 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 222 02:08:03.618 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928497, seq# expected = 2370928497 223 02:10:07.281 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 224 02:12:42.546 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928497 225 02:12:42.546 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 226 02:12:42.576 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 227 02:12:42.576 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 228 02:12:42.576 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928498, seq# expected = 2370928498 229 02:15:07.858 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 230 02:20:07.434 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 231 02:25:07.480 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 232 02:30:07.137 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 233 02:35:08.072 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 234 02:40:08.774 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 235 02:45:08.776 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 236 02:50:09.228 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 237 02:53:02.036 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928498 238 02:53:02.036 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 239 02:53:02.066 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 240 02:53:02.066 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 241 02:53:02.066 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928499, seq# expected = 2370928499 242 02:55:09.720 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 243 02:57:40.977 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928499 244 02:57:40.977 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 245 02:57:41.007 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 246 02:57:41.007 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 247 02:57:41.007 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928500, seq# expected = 2370928500 248 03:00:09.711 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 249 03:05:09.712 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 250 03:06:41.374 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928500 251 03:06:41.374 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 252 03:06:41.414 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 253 03:06:41.414 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 254 03:06:41.414 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928501, seq# expected = 2370928501 255 03:07:58.996 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928501 256 03:07:58.996 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 257 03:07:59.206 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 258 03:07:59.206 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 259 03:07:59.206 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928502, seq# expected = 2370928502 260 03:09:41.633 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928502 261 03:09:41.633 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 262 03:09:41.664 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 263 03:09:41.664 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 264 03:09:41.664 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928503, seq# expected = 2370928503 265 03:10:09.674 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 266 03:15:10.617 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 267 03:20:10.628 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 268 03:25:11.070 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 269 03:26:02.644 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928503 270 03:26:02.644 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 271 03:26:02.674 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 272 03:26:02.674 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 273 03:26:02.674 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928504, seq# expected = 2370928504 274 03:30:11.512 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 275 03:35:11.944 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 276 03:38:09.710 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928504 277 03:38:09.710 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 278 03:38:09.740 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 279 03:38:09.740 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 280 03:38:09.740 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928505, seq# expected = 2370928505 281 03:40:11.895 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 282 03:45:12.828 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 283 03:50:13.260 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 284 03:53:09.543 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928505 285 03:53:09.543 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 286 03:53:09.574 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 287 03:53:09.574 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 288 03:53:09.574 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928506, seq# expected = 2370928506 289 03:55:13.722 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 290 04:00:14.154 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 291 04:03:02.396 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928506 292 04:03:02.396 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 293 04:03:02.426 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 294 04:03:02.426 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 295 04:03:02.426 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928507, seq# expected = 2370928507 296 04:05:15.097 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 297 04:08:07.855 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928507 298 04:08:07.855 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 299 04:08:07.875 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 300 04:08:07.875 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 301 04:08:07.875 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928508, seq# expected = 2370928508 302 04:10:15.103 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 303 04:15:15.156 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 304 04:20:15.238 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 305 04:25:15.239 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 306 04:30:15.310 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 307 04:35:15.422 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 308 04:38:09.683 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928508 309 04:38:09.683 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 310 04:38:09.713 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 311 04:38:09.713 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 312 04:38:09.713 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928509, seq# expected = 2370928509 313 04:40:16.365 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 314 04:40:56.923 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928509 315 04:40:56.923 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 316 04:40:56.943 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 317 04:40:56.943 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 318 04:40:56.953 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928510, seq# expected = 2370928510 319 04:45:16.296 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 320 04:50:16.745 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 321 04:55:16.808 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 322 04:57:58.896 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928510 323 04:57:58.896 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 324 04:57:58.926 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 325 04:57:58.926 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 326 04:57:58.926 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928511, seq# expected = 2370928511 327 05:00:17.591 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 328 05:05:17.754 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 329 05:10:11.668 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928511 330 05:10:11.668 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 331 05:10:11.698 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 332 05:10:11.698 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 333 05:10:11.698 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928512, seq# expected = 2370928512 334 05:10:17.676 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 335 05:10:22.193 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928512 336 05:10:22.193 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 337 05:10:22.213 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 338 05:10:22.213 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 339 05:10:22.213 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928513, seq# expected = 2370928513 340 05:10:32.697 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928513 341 05:10:32.697 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 342 05:10:32.727 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 343 05:10:32.727 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 344 05:10:32.727 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928514, seq# expected = 2370928514 345 05:11:03.250 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928514 346 05:11:03.250 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 347 05:11:03.270 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 348 05:11:03.270 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 349 05:11:03.270 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928515, seq# expected = 2370928515 350 05:15:18.620 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 351 05:20:19.043 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 352 05:23:09.283 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928515 353 05:23:09.283 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 354 05:23:09.313 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 355 05:23:09.313 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 356 05:23:09.313 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928516, seq# expected = 2370928516 357 05:25:19.466 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 358 05:30:20.390 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 359 05:35:20.312 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 360 05:38:09.550 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928516 361 05:38:09.560 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 362 05:38:09.580 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 363 05:38:09.580 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 364 05:38:09.580 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928517, seq# expected = 2370928517 365 05:40:20.735 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 366 05:44:44.606 02/28/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x66f4de22 is about to expire, requesting a new one 367 05:44:44.606 02/28/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.66, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 368 05:44:44.606 02/28/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=FD07FE82) Initiator = ID=10.13.32.66 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 369 05:44:44.606 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 370 05:44:44.647 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 371 05:44:44.647 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 372 05:44:44.647 02/28/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 373 05:44:44.647 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 374 05:44:44.647 02/28/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=FD07FE82 OUTBOUND SPI = 0x3D188507 INBOUND SPI = 0x11FCF89A) 375 05:44:44.647 02/28/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3D188507 376 05:44:44.647 02/28/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x11FCF89A 377 05:44:44.647 02/28/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 378 05:44:45.107 02/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 379 05:44:45.107 02/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0785183d into key list 380 05:44:45.107 02/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 381 05:44:45.107 02/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9af8fc11 into key list 382 05:45:14.639 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 383 05:45:14.639 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 384 05:45:14.639 02/28/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 22DEF466 INBOUND SPI = EE1B0D3A) 385 05:45:14.639 02/28/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B9A9642C 386 05:45:14.659 02/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3a0d1bee 387 05:45:14.659 02/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3a0d1bee 388 05:45:14.659 02/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x66f4de22 389 05:45:14.659 02/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x66f4de22 390 05:45:20.657 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 391 05:45:34.176 02/28/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x0785183d for inbound key with SPI=0x9af8fc11 392 05:50:21.581 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 393 05:53:05.910 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928517 394 05:53:05.910 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 395 05:53:05.930 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 396 05:53:05.940 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 397 05:53:05.940 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928518, seq# expected = 2370928518 398 05:55:21.700 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 399 06:00:21.739 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 400 06:05:21.766 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 401 06:08:07.557 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928518 402 06:08:07.557 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 403 06:08:07.587 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 404 06:08:07.587 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 405 06:08:07.587 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928519, seq# expected = 2370928519 406 06:10:21.793 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 407 06:15:21.830 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 408 06:20:21.356 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 409 06:23:09.151 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928519 410 06:23:09.151 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 411 06:23:09.181 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 412 06:23:09.181 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 413 06:23:09.181 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928520, seq# expected = 2370928520 414 06:25:22.385 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 415 06:30:21.911 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 416 06:35:21.938 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 417 06:40:21.965 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 418 06:45:22.493 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 419 06:50:22.030 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 420 06:55:22.548 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 421 06:57:45.299 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928520 422 06:57:45.299 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 423 06:57:45.329 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 424 06:57:45.329 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 425 06:57:45.329 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928521, seq# expected = 2370928521 426 07:00:22.713 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 427 07:05:23.101 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 428 07:10:23.495 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 429 07:15:23.869 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 430 07:20:24.253 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 431 07:25:24.137 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 432 07:30:25.021 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 433 07:35:25.295 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 434 07:37:59.492 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 2370928521 435 07:37:59.492 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 436 07:37:59.522 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 437 07:37:59.522 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 438 07:37:59.522 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 2370928522, seq# expected = 2370928522 439 07:40:25.179 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 440 07:45:25.563 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 441 07:50:25.947 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 442 07:55:26.421 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 443 08:00:26.725 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1091, dst port 4005 444 08:00:52.738 02/28/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 445 08:00:52.738 02/28/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 446 08:00:52.738 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 447 08:00:52.738 02/28/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3D188507 INBOUND SPI = 11FCF89A) 448 08:00:52.738 02/28/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=FD07FE82 449 08:00:52.738 02/28/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=BD06FC4C3FD2ABF8 R_Cookie=16399D867D06A6F8) reason = DEL_REASON_RESET_SADB 450 08:00:52.738 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 451 08:00:52.738 02/28/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=BD06FC4C3FD2ABF8 R_Cookie=16399D867D06A6F8) reason = DEL_REASON_RESET_SADB 452 08:00:52.738 02/28/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 453 08:00:52.738 02/28/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 454 08:00:52.738 02/28/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 455 08:00:52.738 02/28/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1091 for TCP connection. 456 08:00:52.738 02/28/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 8:40:32 457 08:00:52.798 02/28/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 458 08:00:54.850 02/28/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 459 08:00:54.850 02/28/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 460 08:00:54.850 02/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9af8fc11 461 08:00:54.850 02/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9af8fc11 462 08:00:54.850 02/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0785183d 463 08:00:54.850 02/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0785183d 464 08:00:54.860 02/28/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1091, dst port 4005 465 08:00:54.860 02/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 466 08:00:54.860 02/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 467 08:00:54.860 02/28/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 468 08:00:54.860 02/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys