EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:54:11.257 02/28/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:54:11.337 02/28/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:54:11.337 02/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:54:11.357 02/28/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1101 for TCP connection. 5 21:54:11.407 02/28/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:54:11.407 02/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:54:11.407 02/28/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1101, dst port 4005 8 21:54:11.407 02/28/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1101 9 21:54:11.407 02/28/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1101, dst port 4005 10 21:54:11.407 02/28/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:54:11.908 02/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:54:11.928 02/28/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:54:11.968 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:54:12.148 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:54:12.148 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:54:12.148 02/28/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:54:12.148 02/28/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:54:12.148 02/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:54:12.148 02/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:54:12.178 02/28/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:54:12.178 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:54:12.178 02/28/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:54:12.178 02/28/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:54:12.198 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:54:12.198 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:54:12.198 02/28/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 21:54:12.198 02/28/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=24ADEB17F357BA15 R_Cookie=1A5C60CEA3DF84FC) reason = DEL_REASON_LOAD_BALANCING 28 21:54:12.198 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:54:12.909 02/28/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=24ADEB17F357BA15 R_Cookie=1A5C60CEA3DF84FC) reason = DEL_REASON_LOAD_BALANCING 30 21:54:12.909 02/28/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:54:12.909 02/28/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 21:54:12.909 02/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 21:54:12.929 02/28/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:54:13.410 02/28/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1101, dst port 4005 35 21:54:13.410 02/28/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1101, dst port 4005 36 21:54:13.410 02/28/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1101 37 21:54:13.410 02/28/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1101, dst port 4005 38 21:54:13.410 02/28/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 21:54:13.911 02/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 21:54:13.931 02/28/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 21:54:13.951 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 21:54:14.121 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 21:54:14.121 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 21:54:14.121 02/28/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:54:14.121 02/28/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:54:14.131 02/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:54:14.131 02/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:54:14.151 02/28/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:54:14.151 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 21:54:14.151 02/28/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:54:14.151 02/28/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:54:14.171 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 21:54:14.171 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 21:54:14.171 02/28/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:54:25.457 02/28/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:54:25.457 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 21:54:28.141 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 21:54:28.141 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 21:54:28.141 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 21:54:28.141 02/28/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:54:28.241 02/28/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:54:28.241 02/28/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:54:28.251 02/28/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:54:28.251 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 21:54:29.143 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.27 68 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:54:29.143 02/28/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:54:29.243 02/28/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:54:29.253 02/28/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.27, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 21:54:29.253 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 21:54:29.253 02/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 21:54:29.253 02/28/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 21:54:29.293 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 21:54:29.293 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 21:54:29.293 02/28/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 21:54:29.293 02/28/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 16 seconds, setting expiry to 86384 seconds from now 89 21:54:29.293 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 21:54:29.293 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 21:54:29.293 02/28/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 21:54:29.293 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 21:54:29.303 02/28/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=73BF0B6A OUTBOUND SPI = 0x14DFDEAF INBOUND SPI = 0xBD467D8C) 94 21:54:29.303 02/28/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x14DFDEAF 95 21:54:29.303 02/28/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xBD467D8C 96 21:54:32.077 02/28/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.27/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 21:54:32.187 02/28/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 21:54:32.217 02/28/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 21:54:32.327 02/28/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.100. Current address(es): 192.168.1.100, 10.13.8.27, 192.168.6.1, 192.168.5.1. 100 21:54:32.327 02/28/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.27. Current address(es): 192.168.1.100, 10.13.8.27, 192.168.6.1, 192.168.5.1. 101 21:54:32.537 02/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:54:32.537 02/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xafdedf14 into key list 103 21:54:32.537 02/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:54:32.537 02/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8c7d46bd into key list 105 21:54:32.537 02/28/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xafdedf14 for inbound key with SPI=0x8c7d46bd 106 21:54:32.537 02/28/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.27 107 21:57:09.652 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609100 108 21:57:09.652 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 21:57:09.682 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 21:57:09.682 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 21:57:09.682 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609101, seq# expected = 1210609101 112 21:59:14.706 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 113 22:02:11.210 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609101 114 22:02:11.210 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 115 22:02:11.240 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 116 22:02:11.240 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 117 22:02:11.240 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609102, seq# expected = 1210609102 118 22:04:14.899 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 119 22:06:24.085 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609102 120 22:06:24.085 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 121 22:06:24.166 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 122 22:06:24.166 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 123 22:06:24.166 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609103, seq# expected = 1210609103 124 22:09:14.841 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 125 22:10:36.448 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609103 126 22:10:36.448 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 127 22:10:36.468 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 128 22:10:36.468 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 129 22:10:36.468 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609104, seq# expected = 1210609104 130 22:10:46.963 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609104 131 22:10:46.963 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 132 22:10:46.984 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 133 22:10:46.984 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 134 22:10:46.984 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609105, seq# expected = 1210609105 135 22:12:48.130 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609105 136 22:12:48.130 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 137 22:12:48.160 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 138 22:12:48.160 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 139 22:12:48.160 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609106, seq# expected = 1210609106 140 22:14:15.242 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 141 22:18:15.104 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609106 142 22:18:15.104 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 22:18:20.612 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609107 144 22:18:20.612 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 145 22:18:20.652 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 146 22:18:20.652 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 147 22:18:20.652 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609108, seq# expected = 1210609108 148 22:19:16.186 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 149 22:21:42.380 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609108 150 22:21:42.380 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 151 22:21:42.410 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 152 22:21:42.410 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 153 22:21:42.410 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609109, seq# expected = 1210609109 154 22:23:13.030 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609109 155 22:23:13.030 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 156 22:23:13.050 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 157 22:23:13.050 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 158 22:23:13.050 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609110, seq# expected = 1210609110 159 22:24:16.114 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 160 22:24:29.131 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609110 161 22:24:29.131 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 162 22:24:29.151 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 163 22:24:29.151 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 164 22:24:29.151 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609111, seq# expected = 1210609111 165 22:24:49.658 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609111 166 22:24:49.658 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 167 22:24:49.679 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 168 22:24:49.679 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 169 22:24:49.679 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609112, seq# expected = 1210609112 170 22:25:15.192 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609112 171 22:25:15.192 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 172 22:25:15.212 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 173 22:25:15.212 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 174 22:25:15.212 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609113, seq# expected = 1210609113 175 22:26:40.836 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609113 176 22:26:40.836 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 177 22:26:40.856 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 178 22:26:40.856 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 179 22:26:40.856 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609114, seq# expected = 1210609114 180 22:26:51.350 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609114 181 22:26:51.350 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 182 22:26:51.370 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 183 22:26:51.370 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 184 22:26:51.370 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609115, seq# expected = 1210609115 185 22:29:17.055 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 186 22:34:17.149 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 187 22:39:16.726 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 188 22:44:17.394 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 189 22:47:09.392 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609115 190 22:47:09.392 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 191 22:47:09.422 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 192 22:47:09.422 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 193 22:47:09.422 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609116, seq# expected = 1210609116 194 22:49:17.552 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 195 22:54:17.930 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 196 22:57:12.161 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609116 197 22:57:12.161 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 198 22:57:17.169 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609117 199 22:57:17.169 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 200 22:57:22.177 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609118 201 22:57:22.177 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 202 22:57:22.197 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 203 22:57:22.197 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 204 22:57:22.197 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609119, seq# expected = 1210609119 205 22:59:07.841 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609119 206 22:59:07.841 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 207 22:59:07.861 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 208 22:59:07.861 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 209 22:59:07.861 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609120, seq# expected = 1210609120 210 22:59:17.857 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 211 23:04:18.742 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 212 23:09:18.912 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 213 23:11:09.048 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609120 214 23:11:09.048 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 215 23:11:09.078 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 216 23:11:09.078 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 217 23:11:09.078 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609121, seq# expected = 1210609121 218 23:12:14.629 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609121 219 23:12:14.629 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 220 23:12:14.649 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 221 23:12:14.649 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 222 23:12:14.649 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609122, seq# expected = 1210609122 223 23:14:19.284 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 224 23:19:19.669 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 225 23:23:11.088 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609122 226 23:23:11.088 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 227 23:23:11.108 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 228 23:23:11.108 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 229 23:23:11.108 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609123, seq# expected = 1210609123 230 23:24:19.221 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 231 23:29:20.151 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 232 23:34:20.553 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 233 23:39:21.006 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 234 23:42:13.818 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609123 235 23:42:13.818 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 236 23:42:13.838 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 237 23:42:13.838 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 238 23:42:13.838 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609124, seq# expected = 1210609124 239 23:43:29.424 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609124 240 23:43:29.424 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 241 23:43:29.444 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 242 23:43:29.444 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 243 23:43:29.444 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609125, seq# expected = 1210609125 244 23:44:20.996 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 245 23:49:21.913 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 246 23:54:22.332 02/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 247 23:55:01.895 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609125 248 23:55:01.895 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 249 23:55:01.915 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 250 23:55:01.915 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 251 23:55:01.915 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609126, seq# expected = 1210609126 252 23:55:32.444 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609126 253 23:55:32.444 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 254 23:55:32.464 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 255 23:55:32.464 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 256 23:55:32.464 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609127, seq# expected = 1210609127 257 23:57:13.103 02/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609127 258 23:57:13.103 02/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 23:57:13.123 02/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 23:57:13.123 02/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 23:57:13.123 02/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609128, seq# expected = 1210609128 262 00:04:23.231 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 263 00:09:23.654 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 264 00:12:14.899 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609128 265 00:12:14.899 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 266 00:12:14.919 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 267 00:12:14.929 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 268 00:12:14.929 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609129, seq# expected = 1210609129 269 00:14:24.091 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 270 00:18:00.906 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609129 271 00:18:00.906 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 272 00:18:00.926 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 273 00:18:00.926 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 274 00:18:00.926 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609130, seq# expected = 1210609130 275 00:19:24.023 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 276 00:24:24.947 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 277 00:27:12.683 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609130 278 00:27:12.683 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 00:27:12.703 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 00:27:12.703 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 00:27:12.703 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609131, seq# expected = 1210609131 282 00:29:25.376 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 283 00:31:38.579 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609131 284 00:31:38.579 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 285 00:31:38.609 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 286 00:31:38.609 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 287 00:31:38.609 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609132, seq# expected = 1210609132 288 00:34:25.827 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 289 00:39:26.256 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 290 00:42:14.997 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609132 291 00:42:14.997 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 292 00:42:15.017 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 293 00:42:15.017 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 294 00:42:15.017 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609133, seq# expected = 1210609133 295 00:43:35.612 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609133 296 00:43:35.612 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 297 00:43:35.632 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 298 00:43:35.632 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 299 00:43:35.632 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609134, seq# expected = 1210609134 300 00:44:26.184 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 301 00:45:01.234 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609134 302 00:45:01.234 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 303 00:45:01.264 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 304 00:45:01.264 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 305 00:45:01.264 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609135, seq# expected = 1210609135 306 00:49:27.074 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 307 00:54:27.503 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 308 00:55:38.104 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609135 309 00:55:38.104 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 310 00:55:38.124 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 311 00:55:38.124 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 312 00:55:38.124 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609136, seq# expected = 1210609136 313 00:59:27.932 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 314 01:04:28.361 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 315 01:09:28.810 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 316 01:12:15.047 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609136 317 01:12:15.047 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 01:12:15.067 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 01:12:15.067 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 01:12:15.067 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609137, seq# expected = 1210609137 321 01:14:29.239 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 322 01:19:29.668 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 323 01:24:30.143 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 324 01:27:11.883 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609137 325 01:27:11.883 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 326 01:27:11.903 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 327 01:27:11.903 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 328 01:27:11.903 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609138, seq# expected = 1210609138 329 01:29:30.588 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 330 01:31:42.783 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609138 331 01:31:42.783 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 332 01:31:42.803 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 333 01:31:42.803 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 334 01:31:42.803 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609139, seq# expected = 1210609139 335 01:34:31.032 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 336 01:39:31.476 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 337 01:42:14.217 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609139 338 01:42:14.217 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 339 01:42:14.237 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 340 01:42:14.237 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 341 01:42:14.237 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609140, seq# expected = 1210609140 342 01:43:44.851 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609140 343 01:43:44.851 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 344 01:43:44.871 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 345 01:43:44.871 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 346 01:43:44.871 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609141, seq# expected = 1210609141 347 01:44:31.419 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 348 01:49:32.364 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 349 01:54:32.789 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 350 01:55:11.331 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609141 351 01:55:11.331 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 352 01:55:11.351 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 353 01:55:11.351 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 354 01:55:11.351 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609142, seq# expected = 1210609142 355 01:55:41.865 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609142 356 01:55:41.865 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 357 01:55:41.885 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 358 01:55:41.885 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 359 01:55:41.885 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609143, seq# expected = 1210609143 360 01:57:12.465 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609143 361 01:57:12.465 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 362 01:57:12.485 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 363 01:57:12.485 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 364 01:57:12.485 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609144, seq# expected = 1210609144 365 01:59:33.135 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 366 02:04:33.558 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 367 02:09:33.981 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 368 02:12:14.206 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609144 369 02:12:14.206 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 370 02:12:14.226 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 371 02:12:14.226 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 372 02:12:14.226 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609145, seq# expected = 1210609145 373 02:14:34.404 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 374 02:18:15.215 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609145 375 02:18:15.215 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 376 02:18:15.235 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 377 02:18:15.235 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 378 02:18:15.235 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609146, seq# expected = 1210609146 379 02:19:34.326 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 380 02:19:40.835 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609146 381 02:19:40.835 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 382 02:19:40.855 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 383 02:19:40.855 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 384 02:19:40.855 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609147, seq# expected = 1210609147 385 02:24:35.250 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 386 02:27:11.970 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609147 387 02:27:11.970 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 388 02:27:11.990 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 389 02:27:11.990 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 390 02:27:11.990 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609148, seq# expected = 1210609148 391 02:29:35.694 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 392 02:31:37.893 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609148 393 02:31:37.893 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 394 02:31:37.913 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 02:31:37.913 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 396 02:31:37.913 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609149, seq# expected = 1210609149 397 02:34:36.164 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 398 02:39:36.593 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 399 02:42:14.318 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609149 400 02:42:14.318 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 401 02:42:14.338 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 402 02:42:14.338 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 403 02:42:14.338 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609150, seq# expected = 1210609150 404 02:43:34.933 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609150 405 02:43:34.933 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 406 02:43:34.953 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 407 02:43:34.953 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 408 02:43:34.953 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609151, seq# expected = 1210609151 409 02:44:36.521 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 410 02:49:37.451 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 411 02:54:37.880 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 412 02:55:36.463 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609151 413 02:55:36.463 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 414 02:55:36.483 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 415 02:55:36.483 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 416 02:55:36.483 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609152, seq# expected = 1210609152 417 02:57:12.100 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609152 418 02:57:12.100 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 419 02:57:12.120 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 420 02:57:12.120 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 421 02:57:12.120 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609153, seq# expected = 1210609153 422 02:59:37.808 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 423 03:04:38.243 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 424 03:09:39.199 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 425 03:12:14.420 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609153 426 03:12:14.420 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 427 03:12:14.440 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 428 03:12:14.440 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 429 03:12:14.440 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609154, seq# expected = 1210609154 430 03:14:39.628 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 431 03:19:35.550 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609154 432 03:19:35.550 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 433 03:19:35.570 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 434 03:19:35.570 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 435 03:19:35.570 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609155, seq# expected = 1210609155 436 03:19:39.556 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 437 03:24:40.486 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 438 03:27:11.702 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609155 439 03:27:11.702 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 440 03:27:11.722 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 441 03:27:11.722 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 442 03:27:11.722 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609156, seq# expected = 1210609156 443 03:29:40.915 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 444 03:31:32.574 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609156 445 03:31:32.574 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 446 03:31:32.594 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 447 03:31:32.594 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 448 03:31:32.594 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609157, seq# expected = 1210609157 449 03:34:41.344 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 450 03:39:41.773 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 451 03:42:13.990 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609157 452 03:42:13.990 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 453 03:42:14.010 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 454 03:42:14.010 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 455 03:42:14.010 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609158, seq# expected = 1210609158 456 03:43:34.605 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609158 457 03:43:34.605 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 458 03:43:34.625 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 459 03:43:34.625 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 460 03:43:34.625 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609159, seq# expected = 1210609159 461 03:44:41.701 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 462 03:49:42.631 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 463 03:54:43.060 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 464 03:55:31.128 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609159 465 03:55:31.128 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 466 03:55:31.158 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 467 03:55:31.158 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 468 03:55:31.158 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609160, seq# expected = 1210609160 469 03:57:11.772 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609160 470 03:57:11.772 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 471 03:57:11.792 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 472 03:57:11.792 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 473 03:57:11.792 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609161, seq# expected = 1210609161 474 03:59:43.489 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 475 04:04:43.918 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 476 04:09:44.347 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 477 04:12:13.574 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609161 478 04:12:13.574 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 04:12:13.594 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 480 04:12:13.594 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 481 04:12:13.594 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609162, seq# expected = 1210609162 482 04:14:44.808 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 483 04:18:29.636 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609162 484 04:18:29.636 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 485 04:18:29.667 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 486 04:18:29.667 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 487 04:18:29.667 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609163, seq# expected = 1210609163 488 04:18:30.137 03/01/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xafdedf14 is about to expire, requesting a new one 489 04:18:30.137 03/01/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.27, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 490 04:18:30.137 03/01/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=BBA7A815) Initiator = ID=10.13.8.27 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 491 04:18:30.137 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 492 04:18:30.167 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 493 04:18:30.167 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 494 04:18:30.167 03/01/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 495 04:18:30.167 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 496 04:18:30.167 03/01/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=BBA7A815 OUTBOUND SPI = 0x347906F2 INBOUND SPI = 0x19C66E0B) 497 04:18:30.167 03/01/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x347906F2 498 04:18:30.167 03/01/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x19C66E0B 499 04:18:30.167 03/01/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 500 04:18:30.658 03/01/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 501 04:18:30.658 03/01/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf2067934 into key list 502 04:18:30.658 03/01/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 503 04:18:30.658 03/01/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0b6ec619 into key list 504 04:18:40.152 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609163 505 04:18:40.152 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 506 04:18:40.172 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 507 04:18:40.172 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 508 04:18:40.172 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609164, seq# expected = 1210609164 509 04:19:00.161 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 510 04:19:00.161 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 511 04:19:00.161 03/01/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 14DFDEAF INBOUND SPI = BD467D8C) 512 04:19:00.161 03/01/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=73BF0B6A 513 04:19:00.181 03/01/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8c7d46bd 514 04:19:00.181 03/01/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8c7d46bd 515 04:19:00.181 03/01/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xafdedf14 516 04:19:00.181 03/01/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xafdedf14 517 04:19:30.725 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609164 518 04:19:30.725 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 519 04:19:30.745 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 520 04:19:30.745 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 521 04:19:30.745 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609165, seq# expected = 1210609165 522 04:19:44.745 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 523 04:20:17.292 03/01/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xf2067934 for inbound key with SPI=0x0b6ec619 524 04:24:45.681 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 525 04:27:11.893 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609165 526 04:27:11.893 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 527 04:27:11.913 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 528 04:27:11.913 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 529 04:27:11.913 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609166, seq# expected = 1210609166 530 04:29:46.116 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 531 04:31:32.770 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609166 532 04:31:32.770 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 533 04:31:32.790 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 534 04:31:32.790 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 535 04:31:32.790 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609167, seq# expected = 1210609167 536 04:34:46.551 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 537 04:39:46.986 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 538 04:42:14.199 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609167 539 04:42:14.199 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 540 04:42:14.219 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 541 04:42:14.229 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 542 04:42:14.229 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609168, seq# expected = 1210609168 543 04:43:29.809 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609168 544 04:43:29.809 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 545 04:43:29.829 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 546 04:43:29.829 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 547 04:43:29.829 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609169, seq# expected = 1210609169 548 04:44:46.920 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 549 04:49:47.856 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 550 04:54:48.291 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 551 04:57:11.999 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609169 552 04:57:11.999 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 553 04:57:12.019 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 554 04:57:12.019 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 555 04:57:12.019 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609170, seq# expected = 1210609170 556 04:59:48.726 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 557 05:04:49.161 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 558 05:09:49.596 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 559 05:12:13.805 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609170 560 05:12:13.805 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 561 05:12:13.825 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 562 05:12:13.825 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 563 05:12:13.825 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609171, seq# expected = 1210609171 564 05:14:50.031 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 565 05:19:29.924 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609171 566 05:19:29.924 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 567 05:19:29.944 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 568 05:19:29.944 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 569 05:19:29.944 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609172, seq# expected = 1210609172 570 05:19:49.948 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 571 05:24:50.833 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 572 05:27:11.031 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609172 573 05:27:11.031 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 574 05:27:11.052 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 575 05:27:11.052 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 576 05:27:11.052 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609173, seq# expected = 1210609173 577 05:29:51.259 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 578 05:31:26.894 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609173 579 05:31:26.894 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 580 05:31:26.914 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 581 05:31:26.914 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 582 05:31:26.914 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609174, seq# expected = 1210609174 583 05:34:51.685 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 584 05:39:52.111 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 585 05:42:13.311 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609174 586 05:42:13.311 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 587 05:42:13.341 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 588 05:42:13.341 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 589 05:42:13.341 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609175, seq# expected = 1210609175 590 05:43:28.918 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609175 591 05:43:28.918 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 592 05:43:33.925 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609176 593 05:43:33.925 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 594 05:43:33.945 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 595 05:43:33.945 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 596 05:43:33.945 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609177, seq# expected = 1210609177 597 05:44:52.036 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 598 05:49:52.462 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 599 05:54:53.389 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 600 05:55:25.935 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609177 601 05:55:25.935 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 602 05:55:25.955 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 603 05:55:25.955 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 604 05:55:25.955 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609178, seq# expected = 1210609178 605 05:57:11.585 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609178 606 05:57:11.585 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 607 05:57:11.605 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 608 05:57:11.605 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 609 05:57:11.605 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609179, seq# expected = 1210609179 610 05:59:53.815 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 611 06:04:54.241 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 612 06:09:54.667 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 613 06:12:13.363 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609179 614 06:12:13.363 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 615 06:12:13.383 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 616 06:12:13.383 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 617 06:12:13.383 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609180, seq# expected = 1210609180 618 06:14:55.093 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 619 06:19:34.489 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609180 620 06:19:34.489 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 621 06:19:34.509 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 622 06:19:34.509 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 623 06:19:34.509 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609181, seq# expected = 1210609181 624 06:19:55.018 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 625 06:24:55.945 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 626 06:27:10.642 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609181 627 06:27:10.642 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 628 06:27:10.662 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 629 06:27:10.662 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 630 06:27:10.662 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609182, seq# expected = 1210609182 631 06:29:56.425 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 632 06:31:31.587 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609182 633 06:31:31.587 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 634 06:31:31.607 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 635 06:31:31.607 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 636 06:31:31.607 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609183, seq# expected = 1210609183 637 06:34:56.887 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 638 06:39:57.319 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 639 06:43:33.130 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609183 640 06:43:33.130 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 641 06:43:33.150 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 642 06:43:33.150 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 643 06:43:33.150 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609184, seq# expected = 1210609184 644 06:44:57.251 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 645 06:49:58.183 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 646 06:54:58.615 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 647 06:55:34.667 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609184 648 06:55:34.667 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 649 06:55:34.687 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 650 06:55:34.687 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 651 06:55:34.687 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609185, seq# expected = 1210609185 652 06:57:10.305 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609185 653 06:57:10.305 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 654 06:57:10.325 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 655 06:57:10.325 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 656 06:57:10.325 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609186, seq# expected = 1210609186 657 06:59:59.047 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 658 07:04:59.479 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 659 07:09:59.911 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 660 07:15:00.343 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 661 07:20:00.775 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 662 07:25:01.207 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 663 07:30:01.639 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 664 07:35:02.071 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 665 07:40:02.489 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 666 07:42:11.173 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609186 667 07:42:11.173 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 668 07:42:11.213 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 669 07:42:11.213 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 670 07:42:11.213 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609187, seq# expected = 1210609187 671 07:43:36.796 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609187 672 07:43:36.796 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 673 07:43:36.817 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 674 07:43:36.817 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 675 07:43:36.817 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609188, seq# expected = 1210609188 676 07:45:02.420 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 677 07:50:02.852 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 678 07:55:03.814 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 679 07:55:33.868 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609188 680 07:55:33.868 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 681 07:55:33.888 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 682 07:55:33.888 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 683 07:55:33.888 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609189, seq# expected = 1210609189 684 07:55:59.394 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609189 685 07:55:59.394 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 686 07:55:59.414 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 687 07:55:59.414 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 688 07:55:59.414 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609190, seq# expected = 1210609190 689 07:57:15.003 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609190 690 07:57:15.003 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 691 07:57:15.033 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 692 07:57:15.033 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 693 07:57:15.033 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609191, seq# expected = 1210609191 694 07:59:11.170 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609191 695 07:59:11.170 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 696 07:59:11.190 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 697 07:59:11.190 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 698 07:59:11.190 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609192, seq# expected = 1210609192 699 08:00:03.746 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 700 08:04:03.591 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609192 701 08:04:03.591 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 702 08:04:03.611 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 703 08:04:03.611 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 704 08:04:03.611 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609193, seq# expected = 1210609193 705 08:04:54.664 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609193 706 08:04:54.664 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 707 08:04:54.694 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 708 08:04:54.694 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 709 08:04:54.694 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609194, seq# expected = 1210609194 710 08:05:04.178 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1101, dst port 4005 711 08:07:10.359 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1210609194 712 08:07:10.359 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 713 08:07:10.429 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 714 08:07:10.429 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 715 08:07:10.429 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1210609195, seq# expected = 1210609195 716 08:07:13.484 03/01/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 717 08:07:13.484 03/01/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 718 08:07:13.484 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 719 08:07:13.484 03/01/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 347906F2 INBOUND SPI = 19C66E0B) 720 08:07:13.484 03/01/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=BBA7A815 721 08:07:13.484 03/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=6A65785F04AF06E9 R_Cookie=12048C0A65C96F61) reason = DEL_REASON_RESET_SADB 722 08:07:13.484 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 723 08:07:13.484 03/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=6A65785F04AF06E9 R_Cookie=12048C0A65C96F61) reason = DEL_REASON_RESET_SADB 724 08:07:13.484 03/01/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 725 08:07:13.484 03/01/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 726 08:07:13.654 03/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 727 08:07:13.654 03/01/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1101 for TCP connection. 728 08:07:13.654 03/01/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 10:12:41 729 08:07:13.734 03/01/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 730 08:07:16.688 03/01/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 731 08:07:16.698 03/01/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 732 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0b6ec619 733 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0b6ec619 734 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf2067934 735 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf2067934 736 08:07:16.698 03/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1101, dst port 4005 737 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 738 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 739 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 740 08:07:16.698 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys